Will Quantum Computers break encryption?

Will Quantum Computers break encryption?

How do you secure messages over the internet? How do quantum computers break it? How do you fix it? Why don’t you watch the video to find out? Why does this description have so many questions? Why are you still reading? What is the meaning of life?

Facebook: https://www.facebook.com/frameofessence
Twitter: https://twitter.com/frameofessence
YouTube: https://www.youtube.com/user/frameofessence

CLARIFICATIONS:
You don’t actually need a quantum computer to do quantum-safe encryption. As briefly mentioned at 7:04 , there are encryption schemes that can be run on regular computers that can’t be broken by quantum computers.

CORRECTIONS:

[2:18] Technically, you can use any key to encrypt or decrypt whatever you want. But there’s a specific way to use them that’s useful, which is what’s shown in the video.
[5:36] In RSA, depending on exactly what you mean by “private key”, neither key is actually derivable from the other. When they are created, they are generated together from a common base (not just the public key from the private key). But typically, the file that stores the “private key” actually contains a bit more information than just the private key. For example, in PKCS #1 RSA private key format ( https://tools.ietf.org/html/rfc3447#appendix-A.1.2 ), the file technically contains the entire public key too. So in short, you technically can’t get the public key from the private key or vice versa, but the file that contains the private key can hold more than just the private key alone, making it possible to retrieve the public key from it.

Video links:

Encryption and HUGE numbers – Numberphile

The No Cloning Theorem – minutephysics

Quantum Entanglement & Spooky Action at a Distance – Veritasium

Sources:

Quantum Computing for Computer Scientists
http://books.google.ca/books/about/Quantum_Computing_for_Computer_Scientist.html?id=eTT0FsHA5DAC

Random person talking about Quantum MITM attacks
http://crypto.stackexchange.com/questions/2719/is-quantum-key-distribution-safe-against-mitm-attacks-too

The Ekert Protocol (i.e. E91)
http://www.ux1.eiu.edu/~nilic/Nina’s-article.pdf

Annealing vs. Universal Quantum Computers
https://medium.com/quantum-bits/what-s-the-difference-between-quantum-annealing-and-universal-gate-quantum-computers-c5e5099175a1

Images, Documents, and Screenshots:

Post-Quantum Cryptography initiatives
http://csrc.nist.gov/groups/ST/post-quantum-crypto/cfp-announce-dec2016.html
http://pqcrypto.eu.org/docs/initial-recommendations.pdf

Internet map (Carna Botnet)
http://census2012.sourceforge.net/

Quantum network maps

http://www.secoqc.net/html/press/pressmedia.html

IBM Quantum
http://research.ibm.com/ibm-q/

Music:

YouTube audio library:
Blue Skies

Incompetech:
Jay Jay
Pamgaea
The House of Leaves

Premium Beat:
Cutting Edge Technology
Second Time Around

Swoosh 1 sound effect came from here:
http://soundbible.com/682-Swoosh-1.html
…and is under this license:
https://creativecommons.org/licenses/sampling+/1.0/

50 Comments

  1. Zurvan96 on December 27, 2019 at 7:47 pm

    No, they won’t. There will be better encryption



  2. Mirza5 on December 27, 2019 at 7:50 pm

    3:59 i use the keys to scramble the keys



  3. Victor Perez (Student) on December 27, 2019 at 7:51 pm

    and if all else fails we could individually generate one time hashes for everything :p



  4. Shovel on December 27, 2019 at 7:51 pm

    I heard that while you can use the public key to encrypt then use the private key to decrypt but also if encrypt with the private key and then you can decrypt with the public key



  5. CRYPTO owens on December 27, 2019 at 7:52 pm

    📡 decript this mr.server sir..Qunatum coding



  6. CogumeloGames Gameplays-Bugs-Tutoriais on December 27, 2019 at 7:52 pm


  7. Boss Sayur on December 27, 2019 at 7:53 pm

    It’s mean.. there no future for crypto currency.. isn’t it?



  8. Sacaar Jain on December 27, 2019 at 7:56 pm

    15:01 "STFU THIS ISN’T ECON!!!" made my day… lmao….



  9. Oksha on December 27, 2019 at 7:57 pm

    Bro u just explained how quantum computers work in a perfect way in a couple of minutes WOW.



  10. James dudebud on December 27, 2019 at 8:00 pm

    *i havent seen this much fucking bullshit in this video since the russian collusion delusion scam*



  11. James Hoffman on December 27, 2019 at 8:03 pm

    How does qbit transmission work?



  12. Hammad Majid on December 27, 2019 at 8:04 pm

    *Pictures of cats.* if you know what this means then you are going straight to hell.



  13. Michael Darrow on December 27, 2019 at 8:07 pm

    The public key CAN work unscrabling, but it’ll take many tries to do so.
    It works because there are only finite arrangements that can be there.



  14. rustyy on December 27, 2019 at 8:08 pm

    yea quantum computers are really powerful, but can it run crysis?



  15. Pepperoni Nipples on December 27, 2019 at 8:09 pm

    Yet you have the "eavesdropper" as a "devil" fucqueen abrahamic religitard… NEVER "TRUST" a 3rd party



  16. Nicholas Willhite on December 27, 2019 at 8:12 pm

    ‘And there’s something about "elliptic curve" cryptography but I’m already too deep into this rabbit hole’

    Fucking great!



  17. Glen Baker on December 27, 2019 at 8:12 pm

    I understand about 0,of this, I’m doomed, gb



  18. 〈Clex〉 on December 27, 2019 at 8:12 pm

    How does the public key only scramble but can’t be used to unscramble?



  19. Nichsa 444 on December 27, 2019 at 8:13 pm

    Quantum inside pretty creepy



  20. Morally Conflicted Tortoise on December 27, 2019 at 8:13 pm

    Why is this video making me smile



  21. Daniel Chin on December 27, 2019 at 8:13 pm

    5:05 "astronomically unlucky".

    I like that idea.



  22. DOC WIZARD on December 27, 2019 at 8:15 pm

    Google achieved quantum supremacy.
    Which means that google could/will control the internet.
    I’m scared



  23. Somto Ogu on December 27, 2019 at 8:15 pm

    Pied piper broke this



  24. Victor Perez (Student) on December 27, 2019 at 8:17 pm

    yes they will



  25. Mark Turney on December 27, 2019 at 8:17 pm

    The data will be encrypted and plain text simultaneously as soon as the data entangles with the observer, and another reality is spun out.



  26. BEES KNEES on December 27, 2019 at 8:21 pm

    Just send letters lol



  27. GRHmedia on December 27, 2019 at 8:22 pm

    No, quantum computers will not break encryption. It will make it easier to break some forms of encryption. If the cryptography relies on block encryption math of a given length such as 32,64 or 128 or whatever size bits then yes it can help break it. What it will not break is procedural based systems especially those that involve entire file lengths. quantum only allows you to see all the potential values of a single math result at once. In short if you had a 32 bit quantum processor you could do a 32 bit math computation and it would be like substituting in all 32 bit possible keys at one time. That would allow you to find out what keys potentially work. however if your encryption doesn’t use such methods then no it won’t break it.



  28. Matt Cooper on December 27, 2019 at 8:25 pm

    lol… ‘the near future’. General purpose QC’s are decades away.



  29. nzoomed on December 27, 2019 at 8:25 pm

    Next video, will Quantum computers solve Cicade 3301?



  30. ilhamrisky 21 on December 27, 2019 at 8:25 pm

    Google and Nasa Do that NOW



  31. Sarainia Angelsong on December 27, 2019 at 8:25 pm

    Unless the encryption was such astronomically a large number that quantum would take 20,000+ years but then again the processing power for both server and pc that are both classical might need to be super computational each I dunno lols haha 🙂



  32. Zictrox on December 27, 2019 at 8:30 pm

    Who’s here after Google attains ‘quantum supremacy’?



  33. Eric Jin on December 27, 2019 at 8:30 pm

    Given the private key (meaning the modulus and the decryption exponent) you cannot reconstruct the public key. You need to know the prime factors of the modulus to generate a corresponding private key from the public key (encryption), or a corresponding public key from the private key (signing).



  34. Yzel Angeles on December 27, 2019 at 8:31 pm

    5:14 stare at the eavesdropper until the screen is black. Notice it? slow the vid down if u need to



  35. Name Needed on December 27, 2019 at 8:32 pm

    opportunity cost!



  36. ARTER Pendragon on December 27, 2019 at 8:32 pm

    3:08 sexual content)



  37. David Terr on December 27, 2019 at 8:33 pm

    Very good, educational video. Hopefully quantum encryption will keep up with quantum decryption so that we remain secure!



  38. 96donov on December 27, 2019 at 8:33 pm

    fuck china



  39. Hez on December 27, 2019 at 8:34 pm

    Encrypt them with quantum computers



  40. Mika de Grote on December 27, 2019 at 8:36 pm

    This is such a great channel! Why did I get this channel recommended only now?



  41. Notorious B.I.G. on December 27, 2019 at 8:36 pm

    easy install physically into server encryption like how to… +1 pls..
    -Einstein’s Son.



  42. The Helping Mind on December 27, 2019 at 8:38 pm

    Waiting for 100K.



  43. isalla_boutme on December 27, 2019 at 8:39 pm

    Well @4:50, integer factorisation and discrete log are used as the basis of generating RSA keys and to ensure complexity respectively. decrypting the prime factorisation is most likely done with general number field sieve



  44. Jackj106 [Karakara] on December 27, 2019 at 8:41 pm

    Fuck. If I have to learn to configure another goddamn encryption protocol I swear to god



  45. Arunanshu Biswas on December 27, 2019 at 8:41 pm

    If only the Schrödinger Equation were that easy (or hard)



  46. Johnny Guitar on December 27, 2019 at 8:42 pm

    Very neat and interesting, but a bit too fast narration for me.



  47. David Alexander Stefan on December 27, 2019 at 8:43 pm

    I have an electric car



  48. Preston Pond on December 27, 2019 at 8:43 pm

    I used the quantum computer to destroy the quantum computer.



  49. Mr.Kuckles on December 27, 2019 at 8:43 pm

    (^_^)



  50. Prone primary on December 27, 2019 at 8:44 pm

    Plot Twist.I am the Living One; I was dead, and now look, I am alive for ever and ever! And I hold the keys of death and Hades. This happened over 2000 years ago. Revelation 1:18