Protecting Our Data From Quantum Computers! | Post Quantum Cryptography

preview_player
Показать описание

Join this channel to get access to perks like voting on my next video and behind the scenes!
Or sign up for the same perks on Patreon:

0:00 How many qubits to break RSA and Ellliptic curve
1:14 Post-Quantum Cryptography
4:23 Lattice based cryptography
6:51 Quantum Cryptography
8:33 BB84 Protocol
10:40 Why don’t we always use quantum cryptography?
11:49 Global Quantum Networks

With a lot of money going into developing universal quantum computers and a lot of progress the last few year, we’re kind of thinking - how will that change how we secure everything we do online?

Shor’s algorithm is the killer “app” algorithm for quantum computers, and cryptography. Two of the most common cryptosystems are Rivest–Shamir–Adleman (RSA) and elliptic curve cryptography (ECC). When you are online, any information that you exchange will be encrypted, usually with RSA or ECC. Both of these are REALLY vulnerable to attacks by quantum computers. A large enough quantum computer will become a security problem for anyone online.

Post-quantum cryptography is classical cryptography that stands up to the attacks of a large quantum computer. It does not use any quantum properties. It doesn’t need any specialized hardware. It’s based on hard mathematical problems, just like the cryptography we have today. However, post-quantum cryptography avoids using integer factorization and discrete log problems to encrypt data. We already know that these problems are vulnerable to algorithms run on a quantum computer - and VERY vulnerable.

An RSA key that would take milllions, billions, trillions of years to break on a classic computer could be broken in seconds depending on how large a quantum computer we can build in the future.

In late 2016, NIST ran a competition for Post-Quantum Cryptography Standardization to find new suitable quantum-resistant public-key encryption algorithms. The 26 candidatte algorithms had very different approaches, but mostly lay in 3 families: lattice based, error correcting code based, and multivariate based cryptosystems.

Quantum cryptography is based on the laws of physics, and not our knowledge and understanding of mathematics and hard problems. This means that it will remain secure no matter how much more powerful both classic computers and quantum computers become.

Long distance quantum communication uses these quantum properties. BB84 and E91 (entanglement-based) are the most famous communication protocols for quantum key exchange. These protocols generate a shared random secure key that can be used to encrypt messages.

Video credits:

#quantumcryptography #encryption #security
Рекомендации по теме
Комментарии
Автор

This channel will be very popular in the coming years! Very informative.

therockriders
Автор

This channel is seriously underrated, it's going to explode with viewers when people take quantum computing seriously

AnotherPrashanth
Автор

2:14 I'm loving it! I think we need to create a conference where the only activity is repeating "Quantum computers do not work by trying every possibility at once!" for two days. It took me several years to understand how quantum computers do *not* work because of all the hyperbole and misinformation.

ToniRuottu
Автор

I have been through so many videos to try and understand post-quantum cryptography for my class assignment and this one actually made sense. Thank you

twentytwelve
Автор

I am cybersecuirty student and I just love watching your videos. I think quantum computing and cybersecurity are not that far from each other so it's amazing to learn something new. Thank you for your amazing videos <3, greetings from czech republic.

quick.
Автор

After finishing couple of deep learning projects from YouTube, YouTube suggested me one of your video, I explored more about quantum computing now I'm interested in it, thanks girl your new subscriber from India

varun
Автор

One of the best channel regarding Quantum computing stuff

dayaljaiswal
Автор

You made quantum cryptography make sense. Didn’t expect that to happen!

matoflynn
Автор

This has become one of my favourite channels....

abemi
Автор

Hey Anastasia,
Would you say a traditional cs background is at all useful in Qiskit or Cirq coding (besides just basic python)? Is it at all aided by an understanding of the more complex coding structures found say, in a cs minor? Or does that stuff need to be unlearned?
Thanks for your previous answer,
Jojo

JM-cvnv
Автор

Thank you for all of the info you're providing. Keep up with your amazing work!

barzipori
Автор

I like the part when your data is protected by entanglement. Is like Mission impossible auto destroy message

matobago
Автор

Personally, you are one of the coolest and educated girl with all the competitions and videos that you are in. :P

rnbhal
Автор

Excellent video! Kudos! Anastasia, remember to *breathe* from time to time... :-)

AlessandroBottoni
Автор

The way she moves her head while talking is just amazing to see I don't know why 😂

ipsb
Автор

I studied MIS in my undergrad and currently a Product Manager in the Data space. You have me rethinking my entirely career! Especially with the roadmap development from IBM for QC. Should I start learning Qiskit and investing in QRL? Is there anyone hiring a Product Manager for QC?!

oscardabeast
Автор

I just need a simple program to encrypt my data that will not be able to be decoded by a quantum computer. Where do I find this application?

joeglennaz
Автор

I think the biggest flaw of any quantum communication will be side attacks

xs
Автор

10:56 yet* That's a kind of sentence which would make Ray Kurzweil silently cringe 😅

Anyway, great video )

umurkaragoz
Автор

thanks :) very cool. I have two questions, maybe someone can help me. 
1) quantum simulators for example from Qiskit, which hardware are they using to simulate that ... classical computer ? but what's the advantage to an classical computer if that quantum simulator is simulating by a classical computer.
2) Is that true that we using the Ising Model only if we have the Adiabatic Quantum Annealer from D-Wave-Systems?

wasgeht