Can Quantum Computers Break Your Internet Security? Find Out How to Protect Your Data π
Discover how quantum computers threaten current encryption methods, how they could break your online security, and what steps are being taken to safeguard your messages. Watch the full video to learn more!
About this video
0:00 Intro - Are we DOOOOMED??
0:52 How NOT to Send Secret Messages
2:09 RSA - Encryption Today
5:19 One-Way Functions and Post-Quantum Cryptography
7:28 Qubits and Measurement
9:03 BB84 - Quantum Cryptography
12:43 Alternatives and Problems
14:26 A Case for Quantum Computing
Facebook: https://www.facebook.com/frameofessence
Twitter: https://twitter.com/frameofessence
YouTube: https://www.youtube.com/user/frameofessence
CLARIFICATIONS:
You don't actually need a quantum computer to do quantum-safe encryption. As briefly mentioned at 7.04 , there are encryption schemes that can be run on regular computers that can't be broken by quantum computers.
CORRECTIONS:
"The public key can only be used to scramble information." (2.18) Technically, you can use any key to encrypt or decrypt whatever you want. But there's a specific way to use them that's useful, which is what's shown in the video.
"Given a private key, it's easy to create its corresponding public key." (5.36) In RSA, depending on exactly what you mean by "private key", neither key is actually derivable from the other. When they are created, they are generated together from a common base (not just the public key from the private key). But typically, the file that stores the "private key" actually contains a bit more information than just the private key. For example, in PKCS #1 RSA private key format ( https://tools.ietf.org/html/rfc3447#appendix-A.1.2 ), the file technically contains the entire public key too. So in short, you technically can't get the public key from the private key or vice versa, but the file that contains the private key can hold more than just the private key alone, making it possible to retrieve the public key from it.
Video links:
Encryption and HUGE numbers - Numberphile
https://youtu.be/M7kEpw1tn50
The No Cloning Theorem - minutephysics
https://youtu.be/owPC60Ue0BE
Quantum Entanglement & Spooky Action at a Distance - Veritasium
https://youtu.be/ZuvK-od647c
Sources:
Quantum Computing for Computer Scientists
http://books.google.ca/books/about/Quantum_Computing_for_Computer_Scientist.html?id=eTT0FsHA5DAC
Random person talking about Quantum MITM attacks
http://crypto.stackexchange.com/questions/2719/is-quantum-key-distribution-safe-against-mitm-attacks-too
The Ekert Protocol (i.e. E91)
http://www.ux1.eiu.edu/~nilic/Nina's-article.pdf
Annealing vs. Universal Quantum Computers
https://medium.com/quantum-bits/what-s-the-difference-between-quantum-annealing-and-universal-gate-quantum-computers-c5e5099175a1
Images, Documents, and Screenshots:
Post-Quantum Cryptography initiatives
http://csrc.nist.gov/groups/ST/post-quantum-crypto/cfp-announce-dec2016.html
http://pqcrypto.eu.org/docs/initial-recommendations.pdf
Internet map (Carna Botnet)
http://census2012.sourceforge.net/
Quantum network maps
https://www.slideshare.net/ADVAOpticalNetworking/how-to-quantumsecure-optical-networks
http://www.secoqc.net/html/press/pressmedia.html
IBM Quantum
http://research.ibm.com/ibm-q/
Music:
YouTube audio library:
Blue Skies
Incompetech:
Jay Jay
Pamgaea
The House of Leaves
Premium Beat:
Cutting Edge Technology
Second Time Around
Swoosh 1 sound effect came from here:
http://soundbible.com/682-Swoosh-1.html
...and is under this license:
https://creativecommons.org/licenses/sampling+/1.0/
289 user reviews
Write a Review
User Reviews
0 reviewsBe the first to comment...
Video Information
Total views since publication
User likes and reactions
Video length
Release date
Video definition
Subtitles enabled
About the Channel
Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
This video is currently trending in South Korea under the topic 'a'.
Share This Video
SOCIAL SHAREShare this video with your friends and followers across all major social platforms including X (Twitter), Facebook, Youtube, Pinterest, VKontakte, and Odnoklassniki. Help spread the word about great content!