filmov
tv
Will Quantum Computers break encryption?
Показать описание
How do you secure messages over the internet? How do quantum computers break it? How do you fix it? Why don't you watch the video to find out? Why does this description have so many questions? Why are you still reading? What is the meaning of life?
0:00 Intro - Are we DOOOOMED??
0:52 How NOT to Send Secret Messages
2:09 RSA - Encryption Today
5:19 One-Way Functions and Post-Quantum Cryptography
7:28 Qubits and Measurement
9:03 BB84 - Quantum Cryptography
12:43 Alternatives and Problems
14:26 A Case for Quantum Computing
CLARIFICATIONS:
You don't actually need a quantum computer to do quantum-safe encryption. As briefly mentioned at 7.04 , there are encryption schemes that can be run on regular computers that can't be broken by quantum computers.
CORRECTIONS:
"The public key can only be used to scramble information." (2.18) Technically, you can use any key to encrypt or decrypt whatever you want. But there's a specific way to use them that's useful, which is what's shown in the video.
Video links:
Encryption and HUGE numbers - Numberphile
The No Cloning Theorem - minutephysics
Quantum Entanglement & Spooky Action at a Distance - Veritasium
Sources:
Quantum Computing for Computer Scientists
Random person talking about Quantum MITM attacks
The Ekert Protocol (i.e. E91)
Annealing vs. Universal Quantum Computers
Images, Documents, and Screenshots:
Post-Quantum Cryptography initiatives
Internet map (Carna Botnet)
Quantum network maps
IBM Quantum
Music:
YouTube audio library:
Blue Skies
Incompetech:
Jay Jay
Pamgaea
The House of Leaves
Premium Beat:
Cutting Edge Technology
Second Time Around
Swoosh 1 sound effect came from here:
...and is under this license:
0:00 Intro - Are we DOOOOMED??
0:52 How NOT to Send Secret Messages
2:09 RSA - Encryption Today
5:19 One-Way Functions and Post-Quantum Cryptography
7:28 Qubits and Measurement
9:03 BB84 - Quantum Cryptography
12:43 Alternatives and Problems
14:26 A Case for Quantum Computing
CLARIFICATIONS:
You don't actually need a quantum computer to do quantum-safe encryption. As briefly mentioned at 7.04 , there are encryption schemes that can be run on regular computers that can't be broken by quantum computers.
CORRECTIONS:
"The public key can only be used to scramble information." (2.18) Technically, you can use any key to encrypt or decrypt whatever you want. But there's a specific way to use them that's useful, which is what's shown in the video.
Video links:
Encryption and HUGE numbers - Numberphile
The No Cloning Theorem - minutephysics
Quantum Entanglement & Spooky Action at a Distance - Veritasium
Sources:
Quantum Computing for Computer Scientists
Random person talking about Quantum MITM attacks
The Ekert Protocol (i.e. E91)
Annealing vs. Universal Quantum Computers
Images, Documents, and Screenshots:
Post-Quantum Cryptography initiatives
Internet map (Carna Botnet)
Quantum network maps
IBM Quantum
Music:
YouTube audio library:
Blue Skies
Incompetech:
Jay Jay
Pamgaea
The House of Leaves
Premium Beat:
Cutting Edge Technology
Second Time Around
Swoosh 1 sound effect came from here:
...and is under this license:
Комментарии