filmov
tv
Protecting Our Data From Quantum Computers! | Post Quantum Cryptography
Показать описание
Join this channel to get access to perks like voting on my next video and behind the scenes!
Or sign up for the same perks on Patreon:
0:00 How many qubits to break RSA and Ellliptic curve
1:14 Post-Quantum Cryptography
4:23 Lattice based cryptography
6:51 Quantum Cryptography
8:33 BB84 Protocol
10:40 Why don’t we always use quantum cryptography?
11:49 Global Quantum Networks
With a lot of money going into developing universal quantum computers and a lot of progress the last few year, we’re kind of thinking - how will that change how we secure everything we do online?
Shor’s algorithm is the killer “app” algorithm for quantum computers, and cryptography. Two of the most common cryptosystems are Rivest–Shamir–Adleman (RSA) and elliptic curve cryptography (ECC). When you are online, any information that you exchange will be encrypted, usually with RSA or ECC. Both of these are REALLY vulnerable to attacks by quantum computers. A large enough quantum computer will become a security problem for anyone online.
Post-quantum cryptography is classical cryptography that stands up to the attacks of a large quantum computer. It does not use any quantum properties. It doesn’t need any specialized hardware. It’s based on hard mathematical problems, just like the cryptography we have today. However, post-quantum cryptography avoids using integer factorization and discrete log problems to encrypt data. We already know that these problems are vulnerable to algorithms run on a quantum computer - and VERY vulnerable.
An RSA key that would take milllions, billions, trillions of years to break on a classic computer could be broken in seconds depending on how large a quantum computer we can build in the future.
In late 2016, NIST ran a competition for Post-Quantum Cryptography Standardization to find new suitable quantum-resistant public-key encryption algorithms. The 26 candidatte algorithms had very different approaches, but mostly lay in 3 families: lattice based, error correcting code based, and multivariate based cryptosystems.
Quantum cryptography is based on the laws of physics, and not our knowledge and understanding of mathematics and hard problems. This means that it will remain secure no matter how much more powerful both classic computers and quantum computers become.
Long distance quantum communication uses these quantum properties. BB84 and E91 (entanglement-based) are the most famous communication protocols for quantum key exchange. These protocols generate a shared random secure key that can be used to encrypt messages.
Video credits:
#quantumcryptography #encryption #security
Комментарии