Will Quantum Computers break encryption?
Will Quantum Computers break encryption?
How do you secure messages over the internet? How do quantum computers break it? How do you fix it? Why don’t you watch the video to find out? Why does this description have so many questions? Why are you still reading? What is the meaning of life?
Facebook: https://www.facebook.com/frameofessence
Twitter: https://twitter.com/frameofessence
YouTube: https://www.youtube.com/user/frameofessence
CLARIFICATIONS:
You don’t actually need a quantum computer to do quantum-safe encryption. As briefly mentioned at 7:04 , there are encryption schemes that can be run on regular computers that can’t be broken by quantum computers.
CORRECTIONS:
[2:18] Technically, you can use any key to encrypt or decrypt whatever you want. But there’s a specific way to use them that’s useful, which is what’s shown in the video.
[5:36] In RSA, depending on exactly what you mean by “private key”, neither key is actually derivable from the other. When they are created, they are generated together from a common base (not just the public key from the private key). But typically, the file that stores the “private key” actually contains a bit more information than just the private key. For example, in PKCS #1 RSA private key format ( https://tools.ietf.org/html/rfc3447#appendix-A.1.2 ), the file technically contains the entire public key too. So in short, you technically can’t get the public key from the private key or vice versa, but the file that contains the private key can hold more than just the private key alone, making it possible to retrieve the public key from it.
Video links:
Encryption and HUGE numbers – Numberphile
The No Cloning Theorem – minutephysics
Quantum Entanglement & Spooky Action at a Distance – Veritasium
Sources:
Quantum Computing for Computer Scientists
http://books.google.ca/books/about/Quantum_Computing_for_Computer_Scientist.html?id=eTT0FsHA5DAC
Random person talking about Quantum MITM attacks
http://crypto.stackexchange.com/questions/2719/is-quantum-key-distribution-safe-against-mitm-attacks-too
The Ekert Protocol (i.e. E91)
http://www.ux1.eiu.edu/~nilic/Nina’s-article.pdf
Annealing vs. Universal Quantum Computers
https://medium.com/quantum-bits/what-s-the-difference-between-quantum-annealing-and-universal-gate-quantum-computers-c5e5099175a1
Images, Documents, and Screenshots:
Post-Quantum Cryptography initiatives
http://csrc.nist.gov/groups/ST/post-quantum-crypto/cfp-announce-dec2016.html
http://pqcrypto.eu.org/docs/initial-recommendations.pdf
Internet map (Carna Botnet)
http://census2012.sourceforge.net/
Quantum network maps
http://www.secoqc.net/html/press/pressmedia.html
IBM Quantum
http://research.ibm.com/ibm-q/
Music:
YouTube audio library:
Blue Skies
Incompetech:
Jay Jay
Pamgaea
The House of Leaves
Premium Beat:
Cutting Edge Technology
Second Time Around
Swoosh 1 sound effect came from here:
http://soundbible.com/682-Swoosh-1.html
…and is under this license:
https://creativecommons.org/licenses/sampling+/1.0/
No, they won’t. There will be better encryption
3:59 i use the keys to scramble the keys
and if all else fails we could individually generate one time hashes for everything :p
I heard that while you can use the public key to encrypt then use the private key to decrypt but also if encrypt with the private key and then you can decrypt with the public key
📡 decript this mr.server sir..Qunatum coding
https://en.wikipedia.org/wiki/Digital_Fortress
It’s mean.. there no future for crypto currency.. isn’t it?
15:01 "STFU THIS ISN’T ECON!!!" made my day… lmao….
Bro u just explained how quantum computers work in a perfect way in a couple of minutes WOW.
*i havent seen this much fucking bullshit in this video since the russian collusion delusion scam*
How does qbit transmission work?
*Pictures of cats.* if you know what this means then you are going straight to hell.
The public key CAN work unscrabling, but it’ll take many tries to do so.
It works because there are only finite arrangements that can be there.
yea quantum computers are really powerful, but can it run crysis?
Yet you have the "eavesdropper" as a "devil" fucqueen abrahamic religitard… NEVER "TRUST" a 3rd party
‘And there’s something about "elliptic curve" cryptography but I’m already too deep into this rabbit hole’
Fucking great!
I understand about 0,of this, I’m doomed, gb
How does the public key only scramble but can’t be used to unscramble?
Quantum inside pretty creepy
Why is this video making me smile
5:05 "astronomically unlucky".
I like that idea.
Google achieved quantum supremacy.
Which means that google could/will control the internet.
I’m scared
Pied piper broke this
yes they will
The data will be encrypted and plain text simultaneously as soon as the data entangles with the observer, and another reality is spun out.
Just send letters lol
No, quantum computers will not break encryption. It will make it easier to break some forms of encryption. If the cryptography relies on block encryption math of a given length such as 32,64 or 128 or whatever size bits then yes it can help break it. What it will not break is procedural based systems especially those that involve entire file lengths. quantum only allows you to see all the potential values of a single math result at once. In short if you had a 32 bit quantum processor you could do a 32 bit math computation and it would be like substituting in all 32 bit possible keys at one time. That would allow you to find out what keys potentially work. however if your encryption doesn’t use such methods then no it won’t break it.
lol… ‘the near future’. General purpose QC’s are decades away.
Next video, will Quantum computers solve Cicade 3301?
Google and Nasa Do that NOW
Unless the encryption was such astronomically a large number that quantum would take 20,000+ years but then again the processing power for both server and pc that are both classical might need to be super computational each I dunno lols haha 🙂
Who’s here after Google attains ‘quantum supremacy’?
Given the private key (meaning the modulus and the decryption exponent) you cannot reconstruct the public key. You need to know the prime factors of the modulus to generate a corresponding private key from the public key (encryption), or a corresponding public key from the private key (signing).
5:14 stare at the eavesdropper until the screen is black. Notice it? slow the vid down if u need to
opportunity cost!
3:08 sexual content)
Very good, educational video. Hopefully quantum encryption will keep up with quantum decryption so that we remain secure!
fuck china
Encrypt them with quantum computers
This is such a great channel! Why did I get this channel recommended only now?
easy install physically into server encryption like how to… +1 pls..
-Einstein’s Son.
Waiting for 100K.
Well @4:50, integer factorisation and discrete log are used as the basis of generating RSA keys and to ensure complexity respectively. decrypting the prime factorisation is most likely done with general number field sieve
Fuck. If I have to learn to configure another goddamn encryption protocol I swear to god
If only the Schrödinger Equation were that easy (or hard)
Very neat and interesting, but a bit too fast narration for me.
I have an electric car
I used the quantum computer to destroy the quantum computer.
(^_^)
Plot Twist.I am the Living One; I was dead, and now look, I am alive for ever and ever! And I hold the keys of death and Hades. This happened over 2000 years ago. Revelation 1:18