Skip to player
Skip to main content
Search
Connect
Watch fullscreen
Like
Bookmark
Share
More
Add to Playlist
Report
Clock_Math_&_Digital_Security
explainexplore
Follow
5 months ago
Category
📚
Learning
Transcript
Display full video transcript
00:00
Have you ever really thought about that invisible shield protecting your entire digital life?
00:05
I mean, it's not a physical lock or some team of guards, right? It's math. And today,
00:10
we're going to pull back the curtain on this unseen engine that keeps all your secrets safe.
00:14
Let's dig in and see how this thing actually works.
00:17
It really is the question at the heart of our modern world. I mean, think about it. Every
00:22
single time you send a private message or check your bank account or buy something online,
00:25
you're placing this incredible amount of trust that your information is for your eyes only.
00:31
So how? How does that actually happen? Well, the answer is a secret code, a really powerful
00:38
mathematically generated code that basically scrambles your information into complete
00:42
gibberish for anyone trying to snoop. And then almost like magic, it reassembles it perfectly
00:47
for the person who's supposed to get it. This whole art and science is called cryptography.
00:53
So to really get a handle on these digital locks, we first have to understand the problem they're
00:58
solving. How do you communicate securely when pretty much anyone could be listening in?
01:02
The solution, as it turns out, is surprisingly elegant.
01:06
Yeah, even though it sounds super complex, the foundation of modern cryptography isn't some
01:11
kind of impossible calculus that only a few people on Earth understand. No, it's built on a principle
01:16
so familiar, you've actually been using it your whole life, probably without even realizing it.
01:21
So what is this brilliant, simple idea? Well, we're going to call it clock math. Now,
01:28
its formal name is modulo arithmetic, but honestly, clock math just perfectly captures what's going on
01:34
here. Okay, I know, that sounds super technical, but stick with me here. The idea itself is really
01:40
simple. All this is saying is that in this special system, the only thing we care about is the remainder
01:45
after you divide one number by another. If two totally different numbers leave the same remainder
01:50
when they're divided by our special number N, then in this system, we treat them as the same.
01:55
They're congruent. And the absolute best way to picture this is with a clock, right? On a normal
02:01
12-hour clock, there's no such thing as 13 o'clock. What happens? It just wraps around and becomes one
02:08
o'clock again. See? 13 divided by 12 leaves a remainder of one. What about 25 o'clock? That would also be
02:16
one o'clock. So in the world of a clock, the numbers 13, 25, and 1 are all basically the same
02:23
thing. They are congruent modulo 12. Let's try it with a different number. How about 5? Take a look
02:29
at these numbers, 3, 8, 13, and 38. They seem totally random, right? In regular math, they're just
02:36
different. But in the world of modulo 5, when you divide each of them by 5, you find out they all leave
02:42
the exact same remainder, 3. So in this system, they're all treated as if they're the same.
02:47
Now, here's what's so powerful about this. This system creates a finite, predictable world of
02:53
numbers. If you're working in modulo 5, the only possible answers you can ever get are 0, 1, 2, 3,
03:01
or 4. That's it. Anything bigger just wraps back around to the beginning. And this wrapping around
03:06
property, that is the secret ingredient. Okay, so to turn this wrapping around math into a super
03:13
secure code, we need one last piece of the puzzle, the idea of being relatively prime. It just means
03:19
that two numbers don't share any common factors, except for good old number 1. For instance, 9 and
03:25
10. Neither of them are prime numbers, but the only factor they share is 1, so they're relatively prime.
03:30
And this property is absolutely vital. All right, we have our tools, clock math, and relatively prime
03:37
numbers. Now, let's actually forge an unbreakable code. This is where all the magic happens.
03:44
So here's a simplified recipe for how this all works. First up, your message gets turned into a
03:49
really, really big number. We'll call it A. Then, the system secretly picks two massive prime numbers
03:55
and multiplies them together to get a number M, which is made public. Your number A is then scrambled
04:00
into a new number B using a public key, that's K, and our clock math. This scrambled number is what
04:06
actually travels across the internet. Finally, the receiver uses their private secret key, we'll call
04:12
it K-bar, to run the calculation in reverse. Only their secret key can correctly unscramble the
04:18
message and get back to the original number A. So why is this so secure? It's not because the math
04:24
is some kind of magic. It's because one specific part of this math is just ridiculously, almost
04:28
impossibly, difficult to do in reverse. Here's the bottom line. An eavesdropper can see the public
04:35
number M, and they can see the scrambled message B. But to unscramble it, they need that secret
04:41
decoding key. And to figure out that key, they have to know the two original prime numbers,
04:46
P1 and P2, that were multiplied together to create M in the first place. This right here,
04:52
this simple comparison is the absolute core of all modern security. A computer can multiply
04:58
two gigantic prime numbers together in a blink of an eye. That's the easy part. But trying to
05:02
take that massive resulting number and work backwards to find the two original primes you
05:07
started with? That is a fundamentally hard problem. For a big enough number, it could take the fastest
05:12
supercomputers we have today literally billions of years to figure it out. And we're not just talking
05:17
about little numbers like 77, which is obviously 7 times 11. We're talking about prime numbers that
05:22
are hundreds of digits long. The sheer scale is almost impossible to imagine. And it's that scale
05:27
that creates our digital fortress. So let's wrap all this up. What does this really elegant piece of
05:33
number theory actually mean for you and me every single day? It means that the simple, intuitive idea
05:39
of a clock wrapping around is the actual foundation for creating these virtually unbreakable codes.
05:46
It's this clock math that protects your banking info, your private messages, your identity online.
05:52
All of it hangs on that one beautiful lopsided idea, a mathematical door that's incredibly easy
05:57
to lock, but nearly impossible for anyone else to unlock. This whole system is the bedrock of security
06:03
for our digital world right now. But that leaves us with a pretty fascinating and frankly urgent
06:08
question for the future. What happens when our computers, maybe quantum computers, get powerful
06:14
enough to solve that impossible problem? Well, the search for the next generation of unbreakable codes
06:19
is already on.
Be the first to comment
Add your comment
Recommended
10:20
|
Up next
The Clock Is Ticking
essencemagazine
4 years ago
1:28
1207
explainexplore
6 weeks ago
6:52
how computer works
explainexplore
2 months ago
6:49
The Tale of Two Machines
explainexplore
5 months ago
18:40
FACTORING polynomials trinomial case 1
explainexplore
1 year ago
1:28
SHS GAS party entourage
explainexplore
1 year ago
0:10
Funny videos
explainexplore
1 year ago
0:23
Comedy Skit of guessing interview
explainexplore
1 year ago
4:17
Case of psychological Bullying
explainexplore
1 year ago
0:32
iOS 18 in IP 11 Updates
explainexplore
1 year ago
1:00
EASILY DONE adopting Binary Systems | Possible Outcomes Binary Clip |Probability and Statistics
explainexplore
2 years ago
1:17
Pinoy Sports Sepak Takraw
explainexplore
2 years ago
7:53
Mail merge using office 365 and Canva for layout
explainexplore
2 years ago
4:31
Factors of Trinomial, factorization
explainexplore
2 years ago
0:58
When you met the most hated person of your life? soul land 2
explainexplore
2 years ago
1:01
RECOMMENDED HORROR MOVIES 2023
explainexplore
2 years ago
19:47
factoring trinomial
explainexplore
2 years ago
0:53
Factoring Trinomial Case 1
explainexplore
2 years ago
0:29
Tornado or 'Buhawi' captured recently in the Philippines
explainexplore
2 years ago
14:09
Propositional Logic
explainexplore
2 years ago
1:57
Digital Creator Must Know First
explainexplore
2 years ago
3:29
Are you still typing bank details? High risk of errors! Try QR
explainexplore
1 year ago
0:51
Former Aide Claims She Was Asked to Make a ‘Hit List’ For Trump
Veuer
2 years ago
1:08
Musk’s X Is ‘the Platform With the Largest Ratio of Misinformation or Disinformation’ Amongst All Social Media Platforms
Veuer
2 years ago
4:50
59 companies that are changing the world: From Tesla to Chobani
Fortune
2 years ago
Be the first to comment