{"type":"video","version":"1.0","html":"<iframe src=\"https://www.loom.com/embed/73477dc7e3f04dd1878a0962ea895bc6\" frameborder=\"0\" width=\"1920\" height=\"1440\" webkitallowfullscreen mozallowfullscreen allowfullscreen></iframe>","height":1440,"width":1920,"provider_name":"Loom","provider_url":"https://www.loom.com","thumbnail_height":1440,"thumbnail_width":1920,"thumbnail_url":"https://cdn.loom.com/sessions/thumbnails/73477dc7e3f04dd1878a0962ea895bc6-205986fcf441bb2f.gif","duration":351.167,"title":"Exploring Public Key Encryption: A Custom Algorithm Implementation","description":"In this video, I walk you through an assignment I completed at NYIT for my master's program in cybersecurity, focusing on a public key encryption algorithm I developed. I detail how I set parameters for both Alice and Bob, ensuring they agree on a large prime number and perform necessary calculations to generate shared secrets. I also demonstrate the program's execution, highlighting the importance of mathematical operations and efficiency in establishing secure connections. I encourage you to watch how the program runs and see the results for yourself. Thank you for your attention!"}