China Has Not Broken Your Encryption (Yet)

preview_player
Показать описание
In this video I discuss the claim that Chinese Scientest have broken RSA with quantum computers, and the actual state of asymmetric encryption security against classical and current generation quantum computers.

My merch is available at

₿💰💵💲Help Support the Channel by Donating Crypto💲💵💰₿

Monero
45F2bNHVcRzXVBsvZ5giyvKGAgm6LFhMsjUUVPTEtdgJJ5SNyxzSNUmFSBR5qCCWLpjiUjYMkmZoX9b3cChNjvxR7kvh436

Bitcoin
3MMKHXPQrGHEsmdHaAGD59FWhKFGeUsAxV

Ethereum
0xeA4DA3F9BAb091Eb86921CA6E41712438f4E5079

Litecoin
MBfrxLJMuw26hbVi2MjCVDFkkExz8rYvUF
Рекомендации по теме
Комментарии
Автор

Stop spreadig misinformation
-100, 000, 000 social credit

superioropinion
Автор

Winnie The Pooh Decryptor Keygen 2038 Cracked

pompomaddons
Автор

Cutting edge technology is not made public. We'll be the last to know when they can break RSA keys or produce hash collisions on demand.

danjoseph
Автор

2:33: "you can't just throw a swarm of cheap quantum computers at this problem", is something I never thought I'd hear someone say.

FuturisticFolk
Автор

So it's just a clickbait article?

QwertyAD
Автор

To put this into perspective, the phone in your pocket can factor a 22-bit number in under 1ms just through brute-force (trying every possible combination).

jasontang
Автор

I hath no clue what Mental Outlaw doth speak, but I find ever pleasing his voice to listen upon that it matters not.

Evangelionism
Автор

If they manage to crack AES256, I'd have to re-encrypt my homework

IsaacFoster..
Автор

Maybe I'm getting old but I don't buy as much into the "some genius will arise to solve our problems" argument as much anymore. I've been working in the cutting edge IC industry for over 10 years now and it seems like we've been turning the same crank of breaking tough problems into manageable chunks over and over. Theoretical physics is almost out of gas as far as making testable predictions, and there are so many layers of abstraction in science and engineering that the people doing it don't understand at the fundamental level what we are doing anymore.

flinxsl
Автор

There was a debate about wether QCs would be infeasible because of how much error correction you need for larger and larger systems. But increasingly it's looking like that won't be an issue. We're making larger systems with much higher accuracy (current systems are 99.9% accurate, compared to 50% a few decades ago), and error correction isn't compounding.

FunkyJeff
Автор

6:30 google apparently did just that. They used more cubits to achieve better error correction

dkx
Автор

If I didn't start studying for Security+ 2 weeks ago, I wouldn't be able to understand anything you were saying about encryption standards in this video. :)

BingeHD
Автор

Thinking we have 'many decades' left till RSA is broken is bordering on hubris. If Quantum computing advances at the speed of Moore's law, it'll take about 14 years or so to crack RSA-2048, and 16 years to break RSA-4096. Exponential progress is quite hard to wrap your head around.

I know it's unlikely for QC to advance at the speed of standard computing, but it's safer to think we don't have 'many decades' and work on hardening our encryption.

alihasanabdullah
Автор

It's worth noting that there is evidence of the selection process for Kyber in NIST's PQC program being heavily rigged to inflate its ostensible security level, which really shouldn't be surprising considering NIST is known to be collaborating with the NSA, I recommend reading Daniel Bernstein's post about the subject from last year.

nepnep
Автор

Actually you have to be worried, cause if someone stole your encrypted data back in 2013 or whenever old standards were used, they now have it unencrypted. Sure it might be outdated, but say its the "forgot your password" question answers or whatever. It's still information you don't want out there.

mapu
Автор

People really can't know about current state of technology, especially today.

pajeetsingh
Автор

They still use DPI that requires an OBFS4 proxy to circunvent TLS certificate detection

potatocrispychip
Автор

Remember when it was "impossible" for a computer to fit in a household? Or on a desk? Or inside a briefcase? Or inside of a pocket? Now we have pregnancy tests that can run Doom. Never say never when it comes to computers.

UltraAlex
Автор

Even 256 bit is already impossible enough to decrypt as explained by 3Blue1Brown long time ago.

HikaruAkitsuki
Автор

Is that a Xhad Xinnie the Pooh? Pretty good thumb.

NeverMetTheGuy