Unveiling Quantum Computers: The Untold Secrets

आने वाले दशक में Quantum Computers हमारे अभी मौजूदा encryption method को आराम से तोड़ने के सक्षम हो जायेंगे । जिस काम को करने में अभी के Computers को करोड़...

Veritasium in हिन्दी104.6K views23:03

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Saudi Arabia under the topic 'new zealand national cricket team vs west indies cricket team match scorecard'.

About this video

आने वाले दशक में Quantum Computers हमारे अभी मौजूदा encryption method को आराम से तोड़ने के सक्षम हो जायेंगे । जिस काम को करने में अभी के Computers को करोड़ों साल लगते है वह काम ये Quantum Computers कुछ चंद मिनटों में निपटा देंगे । तो क्या अब Internet पर डली हमारी सारी जानकारी खतरे में है? इन लोगो का तहे दिल से शुक्रिया जिन्होने हमें इस कठिन विषय को समझने में मदद की और हम इसे एक आसन कहानी के रूप में आपको प्रस्तुत कर सके - Dr. Lorenz Panny, Prof. Serge Fehr, Dr. Dustin Moody, Prof. Benne de Weger, Prof. Tanja Lange, PhD candidate Jelle Vos, Gorjan Alagic, and Jack Hidary । इन लोगो का भी तहे दिल से शुक्रिया जिन्होने हमें shor’s Algorithm की गड़ित को समझने में मदद की– Prof. David Elkouss, JavierPagan Lacambra, Marc Serra Peralta, and Daniel Bedialauneta Rodriguez. References: Joseph, D., et al. (2022). Transitioning organizations to Post-quantum cryptography. Nature, 605(7909). 237-243.- https://ve42.co/Joseph2022 Bernstein, D. J., & Lange, T. (2017). Post-quantum Cryptography. Nature, 549(7671), 188-194.- https://ve42.co/Bernstein2017 An Insight, An Idea with Sundar Pichai – Quantum Computing, Wold Economic Forum via YouTube- https://ve42.co/QCWEFyt Migrating to Post-Quantum Cryptography, The White House-https://ve42.co/PQCWhiteHouse Kotas, W. A. (2000). A brief history of cryptography.University of Tennessee-https://ve42.co/Kotas2000 Hellman, M. (1976). New directions in cryptography. IEEE transactions on Information Theory, 22(6),644-654. – https://ve42.co/Hellman1976 Rivest, R. L., Shamir, A., & Adleman, L. (1978). A Method for obtaining digital signatures and public-key Cryptosystems. Communications of the ACM, 21(2), 120-126. – https://ve42.co/Rivest1978 Kak, A. (2023). Lecture 12: Public-Key Cryptography And the RSA Algorithm- https://ve42.co/Kak2023 Calderbank, M. (2007). The RSA Cryptosystem: History, Algorithm, Primes. University of Chicago. – https://ve42.co/Calderbank2007 Cryptographic Key Length Recommendation, Keylength – https://ve42.co/KeyLength Coppersmith, D. (2002). An approximate Fourier Transform useful in quantum factoring, arXiv preprint quant-ph/0201067.- https://ve42.co/Coppersmith2002 Quantum Fourier Transform, Qiskit –https://ve42.co/Qiskit Shor, P. W. (1994, November). Algorithms for quantum computation: discrete logarithms and factoring. InProceedings 35th annual symposium on foundations Of computer science (pp. 124-134). IEEE. –https://ve42.co/Shor1994 Shor’s algorithm, Wikipedia – https://ve42.co/ShorWiki Euler’s totient function, Wikipedia- https://ve42.co/EulerWiki Asfaw, A. (2020). Shor’s Algorithm Lecture Series, Qiskit Summer School – https://ve42.co/ShorYT How Quantum Computers Break Encryption,Minutephysics via YouTube.https://ve42.co/PQCmpyt Breaking RSA Encryption – an Update on theState-of-the-Art, QuintessenceLabs-https://ve42.co/QuintessenceLabs O’Gorman, J., & Campbell, E. T. (2017). Quantum Computation with realistic magic-state factories.Physical Review A, 95(3), 032338.-https://ve42.co/OGorman2017 Gidney, C., & Ekerȧ, M. (2021). How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits.Quantum, 5, 433. – https://ve42.co/Gidney2021 2021 Quantum Threat Timeline Report, Global Risk The IBM Quantum Development Roadmap, IBM- https://ve42.co/IBMQC Post-Quantum Cryptography, Computer SecurityResource Center (NIST) – https://ve42.co/CSRCPQC Alagic, G., et al. (2022). Status report on the third round of the NIST post-quantum cryptography standardization process. US Department of Commerce, NIST.- https://ve42.co/Alagic2022 Thijs, L. (2015). Lattice cryptography and lattice cryptanalysis- https://ve42.co/Thijs2015 Patreon supporters अलग से धन्यवाद: Tj Steyn, Meg Noah, Bernard McGee, KeyWestr, Elliot Miller, Jerome Barakos, M.D., Amadeo Bee, TTST, Balkrishna Heroor, Chris LaClair, John H. Austin, Jr., Eric Sexton, john kiehl, Anton Ragin, Diffbot, Gnare, Dave Kircher, Burt Humburg, Blake Byers, Evgeny Skvortsov, Meekay, Bill Linder, Paul Peijzel, Josh Hibschman, Mac Malkawi, Juan Benet, Ubiquity Ventures, Richard Sundvall, Lee Redden, Stephen Wilcox, Marinus Kuivenhoven, Michael Krugman, Cy ‘kkm’ K’Nelson, Sam Lutfi. Casper Mebius और Derek Muller द्वारा लिखित Trenton Oliver द्वारा संपादित Raquel Nuno द्वारा फिल्माई Ivy Tello और Mike Radjabov द्वारा Animated चित्र एवम चलचित्र Getty Images और Pond5 से एकत्रित किए हुए संगीत Epidemic Sound और Jonny Hyman से लिया गया Derek Muller, Petr Lebedev, एवं Emily Zhang द्वारा उत्पादित

Video Information

Views
104.6K

Total views since publication

Likes
2.1K

User likes and reactions

Duration
23:03

Video length

Published
Apr 26, 2023

Release date

Quality
hd

Video definition