Protecting Our Data From Quantum Computers! | Post Quantum Cryptography
NIST Report on Post Quantum Cryptography: https://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8105.pdf Quantum Hacker Lab Article: https://www.amarchenkova.com...
đĽ Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Pakistan under the topic 'f'.
About this video
NIST Report on Post Quantum Cryptography: https://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8105.pdf
Quantum Hacker Lab Article: https://www.amarchenkova.com/2015/06/05/quantum-network-hacker-lab/
Paper on how many qubits needed to break encryption: https://arxiv.org/abs/1706.06752
Join this channel to get access to perks like voting on my next video and behind the scenes!
https://www.youtube.com/channel/UCzaYH6WeohiHKj3Ih_GdZdQ/join
Or sign up for the same perks on Patreon:
https://www.patreon.com/amarchenkova
0:00 How many qubits to break RSA and Ellliptic curve
1:14 Post-Quantum Cryptography
4:23 Lattice based cryptography
6:51 Quantum Cryptography
8:33 BB84 Protocol
10:40 Why donât we always use quantum cryptography?
11:49 Global Quantum Networks
With a lot of money going into developing universal quantum computers and a lot of progress the last few year, weâre kind of thinking - how will that change how we secure everything we do online?
Shorâs algorithm is the killer âappâ algorithm for quantum computers, and cryptography. Two of the most common cryptosystems are RivestâShamirâAdleman (RSA) and elliptic curve cryptography (ECC). When you are online, any information that you exchange will be encrypted, usually with RSA or ECC. Both of these are REALLY vulnerable to attacks by quantum computers. A large enough quantum computer will become a security problem for anyone online.
Post-quantum cryptography is classical cryptography that stands up to the attacks of a large quantum computer. It does not use any quantum properties. It doesnât need any specialized hardware. Itâs based on hard mathematical problems, just like the cryptography we have today. However, post-quantum cryptography avoids using integer factorization and discrete log problems to encrypt data. We already know that these problems are vulnerable to algorithms run on a quantum computer - and VERY vulnerable.
An RSA key that would take milllions, billions, trillions of years to break on a classic computer could be broken in seconds depending on how large a quantum computer we can build in the future.
In late 2016, NIST ran a competition for Post-Quantum Cryptography Standardization to find new suitable quantum-resistant public-key encryption algorithms. The 26 candidatte algorithms had very different approaches, but mostly lay in 3 families: lattice based, error correcting code based, and multivariate based cryptosystems.
Quantum cryptography is based on the laws of physics, and not our knowledge and understanding of mathematics and hard problems. This means that it will remain secure no matter how much more powerful both classic computers and quantum computers become.
Long distance quantum communication uses these quantum properties. BB84 and E91 (entanglement-based) are the most famous communication protocols for quantum key exchange. These protocols generate a shared random secure key that can be used to encrypt messages.
Video credits:
https://www.pexels.com/@tima-miroshnichenko
https://www.pexels.com/@stefan-coders-1019774
https://www.pexels.com/@ketut-subiyanto
https://www.pexels.com/@taryn-elliott
#quantumcryptography #encryption #security
Video Information
Views
7.4K
Total views since publication
Likes
467
User likes and reactions
Duration
12:54
Video length
Published
Feb 9, 2021
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#Security #encryption #data security #cryptography #post quantum cryptography #quantum cryptography #bb84 #quantum key distribution #quantum networks #quantum computer breaks encryption #quantum computing #quantum computer #quantum network #encryption algorithms #security #crypto #break rsa encryption #break ecc encryption #aes #ecc #rsa #quantum computers destroy internet security #symmetric cryptography #asymmetric cryptography #public key cryptography #quantum cryptography explained
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.