Connecting on the Internet

Login to rate this video.

You can place this video on your website by inserting the (X)HTML code below:

Embed code:
<iframe src="" width="400" height="330" frameborder="0"></iframe>

You can email this video to your friends by entering their addresses below:

Your information:

add Add another recipient

Human verification:

People who liked this video also liked

The world's only float-through McDonalds
Dinosaurs - the true story
1223 Pound Giant Pumpkin Timelapse
Nov. 10, 1989: Celebration at the Berlin Wall
Zoom out from earth
Wingsuit Flying over the Maldives Islands


19 comments posted so far. Login to add a comment.

Expand all comments

Picture of TrollyAtsam46 achievements

+33 1. TrollyAtsam commented 10 years ago

I feel so nerdy for understanding this video. 8-)
Picture of LightAng3l49 achievements
Comment rated too low. Show this comment

-18 2. LightAng3l commented 10 years ago

The question is: Is your secret so important that it's worth doing math over?
Picture of dragonon38 achievements

+13 3. dragonon commented 10 years ago

Damn, now i understand that i don't understand logarithms.
Picture of irishgek50 achievements
Comment rated too low. Show this comment

-7 4. irishgek commented 10 years ago

Well explained , but in reality no encryption is safe other wise hackers would not exist
Picture of Burimi59 achievements

+12 5. Burimi commented 10 years ago

I'm daltonist, I can't get it!!!! :S
Picture of batman3428 achievements

+17 6. batman34 commented 10 years ago

finally i understand private key vpn encryption. 8-)
Picture of Rigel36 achievements

-2 7. Rigel commented 10 years ago

No,no, it's easy. You just need to subtract the second number by the first number. HOLYMOTHEROFGOD I'M BRILLIANT
Picture of Thanny37 achievements

+2 8. Thanny commented 10 years ago

#4 When you see a "hacker" in a movie or TV show decrypting information, you're seeing fiction, not reality.

Unless it's incredibly weak encryption that can be brute-forced in short order, the only way a "hacker" might get access is to guess the passphrase that generated the key, which itself can be done via social engineering or brute force only for weak passwords.

Solid encryption with a strong password is unbreakable.
Picture of etplayer35 achievements

+24 9. etplayer commented 10 years ago

I was with him up until the rope and clock thing. Then he went hyperdrive on my ass :(.
Picture of moskwiz36 achievements

+4 10. moskwiz commented 10 years ago

Yeah everything's groovy except for the fact that Alice and Bob should be higher mathematicians =D
Picture of cyberdevil32 achievements

+5 11. cyberdevil commented 10 years ago

I was going to say this was real easy to understand, but that was before it started getting numerical. Really informative video regardless, enjoyed watch.
Picture of mmmendal46 achievements

+8 12. mmmendal commented 10 years ago

The title is wrong. It should say something like Public Key Cryptography.
Here is a more fun explanation:
Picture of Tarc37 achievements

+14 13. Tarc commented 10 years ago

I think he failed to explain the "mod" function well enough so that it's easier to understand.
"46 mod 12" simply means the REMAINDER of the 46/12 operation, if you take how many times 12 (as a whole) goes into 46. It's three times (36) with 10 remaining.

It's much easier to understand with 10:
"<any number> mod 10" gives you a single digit, the last digit of the original number. This is the remainder of a division by 10.
"46 mod 10" = 6, because 10 goes into 46 four times, with 6 as the remainder.

An interesting example is a "x mod 2" operation.
"<any number> mod 2" results in either 1 or 0.
If it's even, the remainder will be zero, otherwise 1, hence determining whether the number is odd or even :)

46 mod 2 is 0 because 2 goes into 46 23 times without any remainder.
47 mod 2 is 1 because 2 goes into 47 23 times with a 1 remainder.

The result is always either 1 or 0 and one can quickly check a number's parity with a simple "mod 2" operation :p
Picture of archis51 achievements

+6 14. archis commented 10 years ago

Why the sign''='' has 3 lines? Is it some sort more equal then equal :D ?
Picture of loadrunner54 achievements
Comment rated too low. Show this comment

-5 15. loadrunner commented 10 years ago

If a message is really secret, meet in private, tell it, and never write the message down
Picture of utalok30 achievements

+7 16. utalok commented 10 years ago

#14 that is a special equality for congruence relation.
Picture of Granko25 achievements

+3 17. Granko commented 10 years ago

#12 well, not really, it has something to do with PKI but in this case it's just about exchanging a secret key (diffie-hellman)...
Picture of glassweaver20 achievements

+4 18. glassweaver commented 10 years ago

#2 this is why computer scientists get paid many times more than you to work on computer algorithms. Most people have your same mentality, yet enjoy online banking/facebook/private ims/non-public email.
Picture of manxman29 achievements

+1 19. manxman commented 10 years ago

ok, i've wrapped my rope round the clock, cut it to a random length and found my number. now what? do i send the rope to my mate or the clock or the number? oh hang it, i'll see him at work tomorrow and just tell him.