How did the NSA hack our emails?



Professor Edward Frenkel discusses the mathematics behind the NSA Surveillance controversy – see links in full description.
More links & stuff in full description below ↓↓↓

More from this interview: http://youtu.be/1O69uBL22nY
Professor Frenkel’s book (Love & Math): http://bit.ly/loveandmath
The NIST document: http://bit.ly/NIST_numberphile

More encryption from Numberphile
RSA: http://youtu.be/M7kEpw1tn50
Enigma: http://youtu.be/G2_Q9FoD-oQ

Professor Edward Frenkel: http://bit.ly/Frenkel_Numberphile

IF YOU LIKE THIS YOU MIGHT LIKE OUT COMPUTERPHILE CHANNEL:
http://www.youtube.com/Computerphile

Support us on Patreon: http://www.patreon.com/numberphile

NUMBERPHILE
Website: http://www.numberphile.com/
Numberphile on Facebook: http://www.facebook.com/numberphile
Numberphile tweets: https://twitter.com/numberphile
Subscribe: http://bit.ly/Numberphile_Sub

Numberphile is supported by the Mathematical Sciences Research Institute (MSRI): http://bit.ly/MSRINumberphile

Videos by Brady Haran

Brady’s videos subreddit: http://www.reddit.com/r/BradyHaran/

Brady’s latest videos across all channels: http://www.bradyharanblog.com/

Sign up for (occasional) emails: http://eepurl.com/YdjL9

Numberphile T-Shirts: https://teespring.com/stores/numberphile
Other merchandise: https://store.dftba.com/collections/numberphile

source

48 thoughts on “How did the NSA hack our emails?

  1. PurposeFilms September 25, 2017 at 8:09 pm

    Easy way to hack emails is by communicating in drafts basically the username and password give to receiver so the email is not officially sent so it's anonymous

  2. Mahmoud Kharsa September 25, 2017 at 8:09 pm

    what do you exactly mean by a relation between the two solutions ? do you mean like one is equal to some mathematical operations being done on the other ? and we need to find these operation to get the relation ?

  3. I Love Apache Nutch September 25, 2017 at 8:09 pm

    Professor Edward Frenkel was never heard again

  4. Jan Shegers September 25, 2017 at 8:09 pm

    well… in most parts of the world they do write 14.00 but say 2, kinda confusing

  5. Sanzhur Tursunov September 25, 2017 at 8:09 pm

    make video with Grigori Perelman….make him talk…….

  6. Thumbsdown Bandit September 25, 2017 at 8:09 pm

    Who woulda thunk? If you wanna know how the NSA did it, ask a Russian…

  7. imran876339 September 25, 2017 at 8:09 pm

    Help I think I might have dyscalculia, I can't understand it

  8. Sinsearach September 25, 2017 at 8:09 pm

    by FAR mostest favoritest guest on NumeroPhilia channel, go to see him more.

  9. J September 25, 2017 at 8:09 pm

    you had me at "zillions of zillions of zillions" 🙂

  10. - - September 25, 2017 at 8:09 pm

    why encrypt your Credit Card number when everyone can read it on the Card????

  11. Truth DeFacto September 25, 2017 at 8:09 pm

    NEVER USE HUSHMAIL! They were hacked by the US Government! They do
    nothing to help you recover you password, even if you have a paid
    account. This is the nastiest email service ever. Its so secure, you
    can't even get in to it! NO HUSHMAIL EVER!

  12. Ondrus21 September 25, 2017 at 8:09 pm

    They don't read your e-mail. Do you know how many messages they would have to read every day? No, they just store your messages, and maybe search interesing keywords and are ready to use it against you any time, for instance when you run for the US President.

  13. Benjamin B September 25, 2017 at 8:09 pm

    In the USA youtube watches you

  14. Kingsley. A September 25, 2017 at 8:09 pm

    public key and private key encryption in messaging sending.

  15. Ricko769 September 25, 2017 at 8:09 pm

    It should have been obvious the government was gaming the whole thing. What does it say that it took a whistle-blower to expose this? I think it says we're too complacent – too lazy, too trusting or both. How could NIST have any credibility whatsoever after this? Only a complete fool would trust an encryption system that the government has had any hand in "helping" to develop.

  16. Angus Dorbie September 25, 2017 at 8:09 pm

    It's modulo, not modular.

  17. realcygnus September 25, 2017 at 8:09 pm

    Jean-Claude VanDamme CROSS Max Tegmark = Edward Frenkel

  18. Dmitriy Getman September 25, 2017 at 8:09 pm

    NSA is designer of SHA algorithms, it's all you need to know.

  19. Dank puma September 25, 2017 at 8:09 pm

    Of course Russian Jaime Lannister would know all about hacking one's enemies…

  20. Jaroslav Šebok September 25, 2017 at 8:09 pm

    So that was just a complicated version of "They give them their private keys to decypher everything."

  21. Sirran Haal September 25, 2017 at 8:09 pm

    Vault 7 brought me back here

  22. Berelore September 25, 2017 at 8:09 pm

    They didn't crack shite all our stuff was being transmitted in the clear.

  23. MaQuGo119 September 25, 2017 at 8:09 pm

    Thanks Obama

  24. PongoXBongo September 25, 2017 at 8:09 pm

    Can you use your own P & Q, cutting out the NSA entirely? Or wouldn't that be illegal, if only for commercial use.

  25. PongoXBongo September 25, 2017 at 8:09 pm

    Backdoors, lots and lots of backdoors. And corporations kowtowing to "national security concerns". If only we had a perfect, 100% backdoor free encryption system. No legal access. Perfect privacy. A recipe for perfect paranoia?

  26. Markus Kylberg September 25, 2017 at 8:09 pm

    More videos with edward please! 🙂

  27. Μάριος Σπύρου September 25, 2017 at 8:09 pm

    I  find it difficult to understand that something can be completely random.I mean there must be a certain mechanism in order to generate randomness.If I am wrong pls somenone enlighten me.

  28. abc def September 25, 2017 at 8:09 pm

    just dont send text email, you use your EXE program that scrambles your text email and descrambles your email.

  29. Rodrigo Moraga September 25, 2017 at 8:09 pm

    They didn't reverse engineered 'niothing'. They stoled P and Q or worst, the NIST gave them to the NSA.

  30. Otto September 25, 2017 at 8:09 pm

    我听不懂,我数学水平太低

  31. Simon Metais September 25, 2017 at 8:09 pm

    What to think of the effectiveness of email encryption solutions like GNU Privacy Guard facing an issue like email communications mass surveillance by NSA ?
    Are they just reassuring for the IT security neophytes ?
    (question addressed to the people knowledgeable on the subject)

  32. Michael Murphy September 25, 2017 at 8:09 pm

    So the solution seems pretty straightforward, use your own P and Q!

  33. Merlijn Pieron September 25, 2017 at 8:09 pm

    Do I get this right? Somebody gives you to random numbers…and you don't wonder if this magician might by lying and pretend it is magic :P. If that is the case…we deserved to be hacked :P. Or whatever the term for legally sanctioned hacking is :P.

  34. Monstrous Moonshine September 25, 2017 at 8:09 pm

    On the whiteboard, he was doing some calculations in string theory. Probably W-algebra.

  35. John Wood September 25, 2017 at 8:09 pm

    In the beginning of the video, they state that 9+5=2(mod12). but that's not necessarily true. 9+5 (14) is in the same congruence class as 2(mod12) meaning it's a member of the set {…,-22,-10,2,14,26,…} so the sign should look like an equals sign with an extra line on top, because 14!=2(mod12) but it is congruent to 2(mod12).

  36. Jack September 25, 2017 at 8:09 pm

    Run up on me NSA I will catch a body you feel dawg?

  37. Archangel10123 September 25, 2017 at 8:09 pm

    Thanks, Snowden.

  38. Ilestun September 25, 2017 at 8:09 pm

    Truth is, the higher prime number you find, the more secure you are. That's why many people think that Riemann's hypothesis is maybe already solved and that…………""we"" know all the prime numbers already (Riemann's hypothesis is linked to prime numbers), it's not just in public domain because it's a critical thing for encryption.

  39. Oj Min September 25, 2017 at 8:09 pm

    I never understood none

  40. Jenn W September 25, 2017 at 8:09 pm

    that "monkey wrench" was a caliper..

  41. jutubaeh September 25, 2017 at 8:09 pm

    they didnt häc mine…

    they brüt förced id -.-

  42. Yoshiiro September 25, 2017 at 8:09 pm

    "There are less solutions ?"
    "Yes, there are fewer solutions."
    GOLD

  43. Insert Name Here September 25, 2017 at 8:09 pm

    ;tl;dr they didnt
    help pac-nsa ate my entropy

  44. exadakt September 25, 2017 at 8:09 pm

    u r an USSR agent who speaks english… u don't fool us

  45. Valen Cheung September 25, 2017 at 8:09 pm

    The China one though..

  46. 4BoltClevo September 25, 2017 at 8:09 pm

    I like the fact that the Titan supercomputer that was ranked number one in the world (until the chinese one took over) only cost $100 million. Anyone who thinks the NSA hasn't spent at least $10 billion on something a hundred times more powerful is delusional.

  47. Dhul Qarnayn September 25, 2017 at 8:09 pm

    As soon as he began talking about Elliptic Curves, and seeing as the title mentions NSA, no doubt: this is going to be about Dual_EC_DRBG.

  48. Lin Le September 25, 2017 at 8:09 pm

    中X人民共和国国家安全部

Leave a Reply