@@namesurname4666 His user profile is "Italo" implying he's actually Italian (It's a genre of Italian music, and a train). As an American I do everything I can to safe guard my privacy from our corporations, I pay a data broker alert firm who tells Meta, Alphabet, Lexus Nexus, etc to cease and desist (I'm not a Californian so it's a request not a legal order), my Android phone has been stripped free of Google's BS, I use adblockers AF, I have all my settings to "stop being creepy yo". But I do have a UA-cam account and post in the comments. Of course you did too so IDK if it's an American thing, heck Chinese, Russiam DPRK, and Iranian spanners are here in force, although I suspect many are from India, Africa, and South America. In reality it's more like "The whole world be like".
Exactly what I said when I saw the first article. "Oh they allegedly announced this? Then we're safe because they either didnt really do it or it's vastly exaggerated."
what year do you think it is, 1999? how do you stay so isolated from the government that you think they actually know more than us? The government is the last to know and the least competent in application in almost all things the one concession I'll give is quantum computing but in almost everything else a private market actor is going to know more and be more competent in any respective field than their government counterpart.
@@tictacterminator What does the year 1999 have to do with anything? The government has always had the final say on which technologies may be used in a civilian setting, depending on whether or not they pose a risk to national security. Just because your leaders pretend to be stupid doesn't mean they are nor are they the ones who are actually responsible for anything.
To put this into perspective, the phone in your pocket can factor a 22-bit number in under 1ms just through brute-force (trying every possible combination).
@@Frodo1000000 A “22-bit number” is a number that can be represented in 22 binary digits, or bits. This gives a total of 2^22 = 4,194,304 possible combinations. A brute-force approach would try all possible factors to find the prime factors of a number. It’s easy to multiply two prime numbers together but it is computationally difficult to find the prime factors of this number (the original prime numbers used for the multiplication). RSA commonly uses 2048 bits and it would take the most powerful supercomputer in the world longer than the age of the universe to find the prime factors for a key created by RSA-2048 via a brute force approach. Once you have these prime factors, you can easily obtain the private key.
Do you know Jesus Christ can set you free from sins and save you from hell today Jesus Christ is the only hope in this world no other gods will lead you to heaven There is no security or hope with out Jesus Christ in this world come and repent of all sins today Today is the day of salvation come to the loving savior Today repent and do not go to hell Come to Jesus Christ today Jesus Christ is only way to heaven Repent and follow him today seek his heart Jesus Christ can fill the emptiness he can fill the void Heaven and hell is real cone to the loving savior today Today is the day of salvation tomorrow might be to late come to the loving savior today Romans 6.23 For the wages of sin is death; but the gift of God is eternal life through Jesus Christ our Lord. John 3:16-21 16 For God so loved the world, that he gave his only begotten Son, that whosoever believeth in him should not perish, but have everlasting life. 17 For God sent not his Son into the world to condemn the world; but that the world through him might be saved. 18 He that believeth on him is not condemned: but he that believeth not is condemned already, because he hath not believed in the name of the only begotten Son of God. 19 And this is the condemnation, that light is come into the world, and men loved darkness rather than light, because their deeds were evil. 20 For every one that doeth evil hateth the light, neither cometh to the light, lest his deeds should be reproved. 21 But he that doeth truth cometh to the light, that his deeds may be made manifest, that they are wrought in God. Mark 1.15 15 And saying, The time is fulfilled, and the kingdom of God is at hand: repent ye, and believe the gospel. 2 Peter 3:9 The Lord is not slack concerning his promise, as some men count slackness; but is longsuffering to us-ward, not willing that any should perish, but that all should come to repentance. Hebrews 11:6 6 But without faith it is impossible to please him: for he that cometh to God must believe that he is, and that he is a rewarder of them that diligently seek him. Jesus
@@nightly4303 2^22 is the number of possible unique numbers (and as such, factorizations), but not the number of combinations of factors, which is what you'd be brute-forcing, right? Or is there some neat mathematics making them equal?
He said the quantum computer thingy can now solve a jigsaw puzzle. Not one of those 1000 piece landscape ones though, but more like those ones of a cute kitty with 8 too-big-to-choke-on pieces meant for children age 4 and under. For now...
Jesus Christ is the only hope in this world no other gods will lead you to heaven There is no security or hope with out Jesus Christ in this world come and repent of all sins today Today is the day of salvation come to the loving savior Today repent and do not go to hell Come to Jesus Christ today Jesus Christ is only way to heaven Repent and follow him today seek his heart Jesus Christ can fill the emptiness he can fill the void Heaven and hell is real cone to the loving savior today Today is the day of salvation tomorrow might be to late come to the loving savior today Holy Spirit Can give you peace guidance and purpose and the Lord will John 3:16-21 16 For God so loved the world, that he gave his only begotten Son, that whosoever believeth in him should not perish, but have everlasting life. 17 For God sent not his Son into the world to condemn the world; but that the world through him might be saved. 18 He that believeth on him is not condemned: but he that believeth not is condemned already, because he hath not believed in the name of the only begotten Son of God. 19 And this is the condemnation, that light is come into the world, and men loved darkness rather than light, because their deeds were evil. 20 For every one that doeth evil hateth the light, neither cometh to the light, lest his deeds should be reproved. 21 But he that doeth truth cometh to the light, that his deeds may be made manifest, that they are wrought in God. Mark 1.15 15 And saying, The time is fulfilled, and the kingdom of God is at hand: repent ye, and believe the gospel. 2 Peter 3:9 The Lord is not slack concerning his promise, as some men count slackness; but is longsuffering to us-ward, not willing that any should perish, but that all should come to repentance. Hebrews 11:6 6 But without faith it is impossible to please him: for he that cometh to God must believe that he is, and that he is a rewarder of them that diligently seek him. Jesus
@Animatally_Productions well, quantum computers can cut simetric security in half, AES128 is 64 bits secure against quantum computers, so it would be insecure. But you only need to double the key size to be safe, so AES256 is safe against quantum computers, no need for new algorithms.
Thinking we have 'many decades' left till RSA is broken is bordering on hubris. If Quantum computing advances at the speed of Moore's law, it'll take about 14 years or so to crack RSA-2048, and 16 years to break RSA-4096. Exponential progress is quite hard to wrap your head around. I know it's unlikely for QC to advance at the speed of standard computing, but it's safer to think we don't have 'many decades' and work on hardening our encryption.
Yes, especially since the average person doesn't change their password if they are not forced to. So even in 50 years we will still get hacked because of our old comms.
@@sakiodre I know they compute everything at the same time but they still brute-force it, since there's no other way without knowing the answer beforehand
There was a debate about wether QCs would be infeasible because of how much error correction you need for larger and larger systems. But increasingly it's looking like that won't be an issue. We're making larger systems with much higher accuracy (current systems are 99.9% accurate, compared to 50% a few decades ago), and error correction isn't compounding.
It's worth noting that there is evidence of the selection process for Kyber in NIST's PQC program being heavily rigged to inflate its ostensible security level, which really shouldn't be surprising considering NIST is known to be collaborating with the NSA, I recommend reading Daniel Bernstein's post about the subject from last year.
i disagree, American government is too stupid and every other government is even stupider than that so ¯\_(ツ)_/¯ Back in the 90s we thought that the government could have secret space alien technology, we all thought the US military had super secret cards up their sleeve. In 2024, its very very apparent, self-evident even, that they do not and that they're all complete morons. They are weak men who can't talk without a teleprompter. And this is America. In Europe and the third world, like China and Russia, its even worse.
Maybe I'm getting old but I don't buy as much into the "some genius will arise to solve our problems" argument as much anymore. I've been working in the cutting edge IC industry for over 10 years now and it seems like we've been turning the same crank of breaking tough problems into manageable chunks over and over. Theoretical physics is almost out of gas as far as making testable predictions, and there are so many layers of abstraction in science and engineering that the people doing it don't understand at the fundamental level what we are doing anymore.
Remember when it was "impossible" for a computer to fit in a household? Or on a desk? Or inside a briefcase? Or inside of a pocket? Now we have pregnancy tests that can run Doom. Never say never when it comes to computers.
Remember when it was "impossible" for a 10000TWh miniature artificial sun to power a car? a toaster? a but plug?? Now we have none of that things. what's the moral of this?
If I didn't start studying for Security+ 2 weeks ago, I wouldn't be able to understand anything you were saying about encryption standards in this video. :)
bro you acting like he speaking a foreign language.. This should be common knowledge for anyone with a computer... Unless your part of this new generation of kids growing up in a world where pirating is such a terrible thing to do >.>
@TaterTots-d2z Ive known what quantum computing and brute forcing is for years now. how many people use computers and actually know what RSA is? Or MD5? Or password salting. I was just talking about the last 2 minutes of thr video in general.
Actually you have to be worried, cause if someone stole your encrypted data back in 2013 or whenever old standards were used, they now have it unencrypted. Sure it might be outdated, but say its the "forgot your password" question answers or whatever. It's still information you don't want out there.
That sort of data would be encrypted using AES, not RSA. Though Grover's algorithm does cut AES' effectiveness in half. Also security questions are usually insecure anyway, because almost all of them use information that's a matter of public record if someone digs deep enough.
While I have no doubt this is true to an extent, as you work with and know people at certain organizations the more you may not be surprised if you found out significantly more advanced systems don't actually exist... yet. I think their real power is in getting people to question if they could but in today's world there's a reason they often rely on contracts with various companies to develop bleeding edge programs. In the case of China it's even more likely they'd try to oversell what they actually have IMO.
@@JJFX- I'll rather feel China would keep it under lock and key though. China has been actively stealing data from US tech companies and defense contractors regardless if it's encrypted for over a decade now. They have every reason to pursue these tools and keep them hidden as decrypting any of the stolen data will save them years and billions in R&D costs.
Also, D-Wave's quantum "annealing" operates differently from what is commonly understood to be general-purpose quantum computation. Annealing is really only useful for a very limited subset of problems for which quantum computation may be useful - optimisation problems. Notably, prime factorisation is not one of those problems that annealing is good at. tl;dr - If you read D-Wave and RSA in the same sentence, somebody's misleading you.
The q-correction problem is to stay, it's more of a physical law than technological issue. It gets exponentially worse as you scale the system. Each added q-bit adds a chance of a random particle flying by and interacting with it, wrecking your computation. You can cool it down and shield it to reduce that, but cosmic microwave background is always going to be a problem. There is a maximum limit on how big your q-system can be before it becomes completely useless. Progress can be made in how fast you reset it after a computation. Now you need to reset the system and align/entangle all the electrons by pulsing it with a strong magnetic field. It's like having a 1Hz processor, and needing to reboot PC after one clock. Eventually this will become faster, maybe we will even have algorithms that somehow flip the system back into ready state once it finishes a task. But that might be impossible. Also these computers aren't even Chinese, it's from Canada. And managing to do a computation on q-system once or a few times, doesn't mean you can do it consistently. You can think of it as gacha-pull computing, you can hit 20 in row, or none...
non of the encryption will matter after the AI chips get integrated into hardware, AI chips will be able to scan all your data after they being decrypted to "protect against cp" (as always a security concern being used to add spyware onto peoples machines) anyway...
Because the general public will always be more 'reactive' then 'proactive' despite history showing why this such a terrible methodology. They'll only start to care once a problem significantly impacts them but even then they'll grasp for an easy solution that'll likely end up worse for all of us in the end.
Get into the habit of using encrypted codebooks. If your encryption is broken, then the adversary must break your codebook. Periodically rotate your codebooks as a "moving target".
Are you talking about one-time pad? Because that's the one type of cipher that is unbreakable, as long as your key is properly random, is as long as the message, and is kept secure, and no part is ever used for more than one message. The downside is that you need a secure method to share the key, such as e.g. transporting physical media by competent, trustworthy people and in a tamper-evident container. Not very practical for most Internet communication, I'd say.
@@w花b Iirc , it's synonymous with salting in cryptology. Ik from reading cryptology and reading bitwarden backup guide. Honestly I haven't delve on the differences between salting and peppering the pass so IDK.
@@w花b Both salts and peppers are values added before hashing, to change the output. The difference is, a salt is stored in the clear alongside the hash value, while a pepper is kept secret.
Note that the D-wave is also an annealing quantum computer and not using a gate-based architecture. This means the algorithms are also slower or take more steps.
So I have a fully custom home file server with a web UI and one day decided to check what exactly happens at larger RSA key sizes... My Ryzen 7 3700X took like 5 minutes to process the initial server request while at 32k key size...
@@andrekotz7803 Generate yourself an SSL cert, load it into a server, and watch it do nothing for 5 minutes... Jeez, people, I thought everybody knows how to write a file server at home...
I mean....if that's what people told you, you're listening to the wrong people. We've become blinded to what genuinely new development looks like, a slower pace seems strange. I blame the presence of mba's in the industry chasing trends. The technology clearly works, *you just saw it managed something significantly faster, while using less power, then a horde of machines from a much more developed technology* I'd suggest you remember these machines are the equivalent of the early ENIAC's or even the Later IBM 7090's - compared to what we have nowadays the technology is *more than a 4 trillion times faster in IBM's case and roughly 200 trillion times in ENIAC's case* Let it cook, the next 10 years will see a series of medium term required experiments finish, which will be folded into new ways of thinking. It is decades away but not so far we should be complacent
@@lepidoptera9337 That's fair enough, let's briefly review what we was and wasn't achieved by a first generation device. - It didn't 'break encryption' - It factored a 22 bit number associated with RSA encryption - This action was later compared to a cluster of machines belonging to a technology with 70 years of development - The work that the cluster factored was a 250 bit number associated with RSA encryption - The cluster took approximately centuries of time to factor this number (Not included in the video just compute history) 1960's were the rough time for a single machine to factor a 22bit number, about 15-20 years of compute development My question for you is: Considering that the classical compute cluster was made up of many more machines and required network technologies once believed impossible to divide up the problem to achieve success factoring a 250 bit number, how can you see what amounts to the equivalent of whatever came before the model T ford of quantum computing, doing the same with far less development, as anything but amazing? I agree the tech is over hyped but a bit of history might be valuable to remember, no?
Blindly ignoring information from mainstream media is also ignorant, just like making ridiculous predictions that do not consider breakthrough advancements.
It's not there yet but we are one or two technical advancements away from it being a problem. If we get both qbits stable at higher temps so the whole computer isn't such a hellish contraption and they can paralellize more qbits without them causing interference as much to each others, things will escalate quickly. Never forget at first we were soldering individual transistors together and they also had problem commuting properly at room temperature and now we have several billions per CPU. They don't need any of this to know where missile silos are however, everybody already do. And nuke launch codes are on old floppies on ancient computers that don't even know what a network is so 😅
I find 22-bit factorization pretty scary. Qubits needed scales linearly with bits to be factored, and I expect innovations in technology to multiply the number of logical qubits each time (whereas design improvements are much slower), so it may only take a few new techniques to get to a number of bits people realistically use. If there is such a jump up, I also expect the final one to be hidden by the government, company, or individual responsible- maybe to keep it from causing harm, or maybe to abuse it while everyone thinks he's safe. What do you do with a 0-day that affects everything? In combination with store now decrypt later, this could make lots of important data vulnerable soon without anyone realizing it.
The problem with quantum computing error correction is that you are using the same type of hardware that made the errors to correct the errors. That can easily lead to more errors.
True state 'hacking' comes from backdooring: - chipsets - only the NSA controls this - operating systems - only the NSA controls this - GnuPG or the program that implements gpg - Any State can influence this. - the GCC or compiler to weaken certain algorithms.
Visual Studio casually adding 2 lines of code to your compiled program: `using system.ms.feedback.helper;` - `helper.say(object a, object b, object local1, object local2);`
Thank you for mentioning but The list is rather extensive and the NSA is NOT the only one that controls chipsets and OSes including firmware and gateware😅
Not the only, but primary source: - from chipset design - to customs/freight tampering during hi-priority or large-volume consignmemts/purchases along the supply chain.
Been dealing with cryptographic since 2008 when finishing computer networking and ended up later going to a rabbit hole of crypto viruses and up to this day I haven’t seen been talked about it as well. I’m curious on what’s coming next to quantum resistant cryptography, been using RSA 4k and Vera crypt for some time so I wonder if it’s gonna be useless in the future. Maybe AI can help us give this leap forward on producing better encryption algorithm.
Really enjoyed this video! You’ve provided a great perspective on how the market might respond. There's more info in my bio for those interested in this topic. Thanks for the video, I'll be watching for more updates!
reckon you could distribute the problem with cheap quantum computers! quantum computers are amazing at answering certain questions, and breaking up the question into discrete ranges doesn't violate quantum physics. also, recall that adding more qubits to support breaking larger and larger keys, is still a fairly linear process. expect to see a Moore's law of qubit coherence.
I use a 4096 bit key, and have since I learned what RSA is. Computers were still mostly following Moore's law then, it seemed prudent. Now that they aren't, it seems it might still be usable for an indefinite time. Once we start building computing satellites, THEN I need to upgrade.
Why spending so much money and effort on breaking encryption? It is way easier and cheaper to infiltrate or tap into a handful of proprietary OS vendors. When you control the syscalls, you do not need to decrypt anything, just get your AI to selectively filter anything on the consumer device and you are done. No need to fiddle with any complex math! In such scenario, the way out is clear: Open Source OS, or preferably devices, and making sure your private data does not leave your devices. BTW, other clever tricks include not disclosing the public key until it is too late to attack it. Bitcoin does this, addresses are hashes of public keys, not the keys themselves. The public key is only disclosed at payment time, but them the funds are gone. That is one reason not to re-use addresses, the other is avoiding tracking.
when national security needs some info, they will get the info, no matter if it requires torture, middle man attack, offline cracking or plain logging info before encryption. You can literally buy suitcases that can break / temper 256 bit encryption real time used for phone interception.
In an introduction to quantum computing class we learned that you need 4000 fault tolerant qbits In the real world you would need 4000 qbits + another 2000 for error correction , if I remember correctly
The thing you need to understand is that D Wave's quantum computers use quantum annealing. Their machines have a larger number of qubits but they're much noisier. The newer superconducting quantum computers don't need nearly as many error correction qubits.
Also those refrigerators have cooling power like 100 micro watt (1 million times less than desktop cup). You shine your phone flash light on it, and it will break.
one note about deprecated key sizes, one can keep a record of old packets and decrypt them when when decryption is available in 10, 20, 100 years. would it be relevant then? we'll set what govs think
so just linking up the quantum computers to try to do Quantum Parallel Computing, the real problem is you would need a Quantum Computer wire that would be able to keep the qbit in a super position as it goes to the next quantum computer in the cluster. you can't just do it in software as when it gets converted the qbits super positions are lost, like a float becoming a int. the wire would be kept as cold as the whole system, so it's a engineering issue too.
Why use a bigger key size? Because it grows the problem space exponentially. Processing power is not growing exponentially but key lengths can. TL;DR: mathematically encryption will remain safe from brute forcing for the foreseeable future. Weakness in implementation is the only real concern.
Thanks for the forecast! Just a quick off-topic question: My OKX wallet holds some USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). Could you explain how to move them to Binance?
The important question here is when will quantum computers will be able to process remote GPU workload at a crazy fast speed so I can finally play Crysis
The problem is not that the encryption algorithms are evolving. The problem is past recordings. Let's say you catch a government secret transmission. You just record/save it and you try to crack it 10 years later when you have the technology to do it. Some secrets will still be relevant. Imagine if you had today some 3DES or MD5 transmissions. You could crack them in minutes.
So, in short, the wright brothers are not at all comparable. Everyone knew it was possible, it had been done hundrets of times before, it was just journalists being journalists.
Funnily enough, even the writght brothers were aware of some of the previous ones. Such as Otto Lilienthal who made over 2000 flights in the 1890s. Nevermind George Caley and the people he funded in the late 1700s and early 1800s.
Only Amazon and Google has the right to know everything about me 😡😡😡
Americans be like:
@@namesurname4666 More like: "Retards be like:"
@@namesurname4666 His user profile is "Italo" implying he's actually Italian (It's a genre of Italian music, and a train). As an American I do everything I can to safe guard my privacy from our corporations, I pay a data broker alert firm who tells Meta, Alphabet, Lexus Nexus, etc to cease and desist (I'm not a Californian so it's a request not a legal order), my Android phone has been stripped free of Google's BS, I use adblockers AF, I have all my settings to "stop being creepy yo". But I do have a UA-cam account and post in the comments. Of course you did too so IDK if it's an American thing, heck Chinese, Russiam DPRK, and Iranian spanners are here in force, although I suspect many are from India, Africa, and South America.
In reality it's more like "The whole world be like".
Encryption and telemetry are quite different
Fuck China @@namesurname4666
Winnie The Pooh Decryptor Keygen 2038 Cracked
Link?
This is a joke for anyone that can't tell
Ciga thinks he is Stalin 2.0
got the .nfo?
@@kneel1 "yummy yummy yummy I got honey in my tummy and I feel like a-hacking you"
@@BIPHOBIC7 that's not funny and you should not joke like that because people actually can be harmed from your joke
Cutting edge technology is not made public. We'll be the last to know when they can break RSA keys or produce hash collisions on demand.
Exactly what I said when I saw the first article. "Oh they allegedly announced this? Then we're safe because they either didnt really do it or it's vastly exaggerated."
what year do you think it is, 1999?
how do you stay so isolated from the government that you think they actually know more than us?
The government is the last to know and the least competent in application in almost all things
the one concession I'll give is quantum computing
but in almost everything else a private market actor is going to know more and be more competent in any respective field than their government counterpart.
@@tictacterminator What does the year 1999 have to do with anything? The government has always had the final say on which technologies may be used in a civilian setting, depending on whether or not they pose a risk to national security. Just because your leaders pretend to be stupid doesn't mean they are nor are they the ones who are actually responsible for anything.
China and Russia are ‘behind’ and value face and want to disrupt societies; they are not as quiet about their discoveries as darpa is.
@@tictacterminatorthis is your brain on Ayn Rand.
Stop spreadig misinformation
-100,000,000 social credit
@@Haydos but only when they do it tho
More like -10000 joo bank credit score
@@xvfdu4 you mean kosher credit?
@@HustleGrind-ff1xv
Yes i had 6 gorallian credits now there is only 271k weird
@@HustleGrind-ff1xv
Hey hey people, oy vey, seal team 6 new York spider man sewer tunnel bad boys Armageddon oil driller digger*
To put this into perspective, the phone in your pocket can factor a 22-bit number in under 1ms just through brute-force (trying every possible combination).
can you explain this in layterms? I understand "phone in my pocket" and "brute force", but what is "to factor" and "22-bit number" in this context?
@@Frodo1000000 A “22-bit number” is a number that can be represented in 22 binary digits, or bits. This gives a total of 2^22 = 4,194,304 possible combinations. A brute-force approach would try all possible factors to find the prime factors of a number.
It’s easy to multiply two prime numbers together but it is computationally difficult to find the prime factors of this number (the original prime numbers used for the multiplication).
RSA commonly uses 2048 bits and it would take the most powerful supercomputer in the world longer than the age of the universe to find the prime factors for a key created by RSA-2048 via a brute force approach. Once you have these prime factors, you can easily obtain the private key.
Do you know Jesus Christ can set you free from sins and save you from hell today
Jesus Christ is the only hope in this world no other gods will lead you to heaven
There is no security or hope with out Jesus Christ in this world come and repent of all sins today
Today is the day of salvation come to the loving savior Today repent and do not go to hell
Come to Jesus Christ today
Jesus Christ is only way to heaven
Repent and follow him today seek his heart Jesus Christ can fill the emptiness he can fill the void
Heaven and hell is real cone to the loving savior today
Today is the day of salvation tomorrow might be to late come to the loving savior today
Romans 6.23
For the wages of sin is death; but the gift of God is eternal life through Jesus Christ our Lord.
John 3:16-21
16 For God so loved the world, that he gave his only begotten Son, that whosoever believeth in him should not perish, but have everlasting life. 17 For God sent not his Son into the world to condemn the world; but that the world through him might be saved. 18 He that believeth on him is not condemned: but he that believeth not is condemned already, because he hath not believed in the name of the only begotten Son of God. 19 And this is the condemnation, that light is come into the world, and men loved darkness rather than light, because their deeds were evil. 20 For every one that doeth evil hateth the light, neither cometh to the light, lest his deeds should be reproved. 21 But he that doeth truth cometh to the light, that his deeds may be made manifest, that they are wrought in God.
Mark 1.15
15 And saying, The time is fulfilled, and the kingdom of God is at hand: repent ye, and believe the gospel.
2 Peter 3:9
The Lord is not slack concerning his promise, as some men count slackness; but is longsuffering to us-ward, not willing that any should perish, but that all should come to repentance.
Hebrews 11:6
6 But without faith it is impossible to please him: for he that cometh to God must believe that he is, and that he is a rewarder of them that diligently seek him.
Jesus
@@nightly4303 2^22 is the number of possible unique numbers (and as such, factorizations), but not the number of combinations of factors, which is what you'd be brute-forcing, right? Or is there some neat mathematics making them equal?
So it's just a clickbait article?
Always has been
yes
Probably fearbait for their citizens like most things they signal.
thanks for the heads up !
Not just a clickbait article, but a clickbait research paper.
I hath no clue what Mental Outlaw doth speak, but I find ever pleasing his voice to listen upon that it matters not.
He said the quantum computer thingy can now solve a jigsaw puzzle. Not one of those 1000 piece landscape ones though, but more like those ones of a cute kitty with 8 too-big-to-choke-on pieces meant for children age 4 and under. For now...
@@rustymustard7798 you should make a NEWS PAPER dedicated to explaining world events with your amazing clarity and professionalism!
He says random words in Xosa language, but he makes it sound like coherent Spanish
@@NJ-wb1cz 🤣🤣🤣
2:33: "you can't just throw a swarm of cheap quantum computers at this problem", is something I never thought I'd hear someone say.
Jesus Christ is the only hope in this world no other gods will lead you to heaven
There is no security or hope with out Jesus Christ in this world come and repent of all sins today
Today is the day of salvation come to the loving savior Today repent and do not go to hell
Come to Jesus Christ today
Jesus Christ is only way to heaven
Repent and follow him today seek his heart Jesus Christ can fill the emptiness he can fill the void
Heaven and hell is real cone to the loving savior today
Today is the day of salvation tomorrow might be to late come to the loving savior today
Holy Spirit Can give you peace guidance and purpose and the Lord will
John 3:16-21
16 For God so loved the world, that he gave his only begotten Son, that whosoever believeth in him should not perish, but have everlasting life. 17 For God sent not his Son into the world to condemn the world; but that the world through him might be saved. 18 He that believeth on him is not condemned: but he that believeth not is condemned already, because he hath not believed in the name of the only begotten Son of God. 19 And this is the condemnation, that light is come into the world, and men loved darkness rather than light, because their deeds were evil. 20 For every one that doeth evil hateth the light, neither cometh to the light, lest his deeds should be reproved. 21 But he that doeth truth cometh to the light, that his deeds may be made manifest, that they are wrought in God.
Mark 1.15
15 And saying, The time is fulfilled, and the kingdom of God is at hand: repent ye, and believe the gospel.
2 Peter 3:9
The Lord is not slack concerning his promise, as some men count slackness; but is longsuffering to us-ward, not willing that any should perish, but that all should come to repentance.
Hebrews 11:6
6 But without faith it is impossible to please him: for he that cometh to God must believe that he is, and that he is a rewarder of them that diligently seek him.
Jesus
If they manage to crack AES256, I'd have to re-encrypt my homework
This is impossible, Simetric encryption is quantum-secure
@Animatally_Productions well, quantum computers can cut simetric security in half, AES128 is 64 bits secure against quantum computers, so it would be insecure.
But you only need to double the key size to be safe, so AES256 is safe against quantum computers, no need for new algorithms.
cp?
i mean competitve programming
Thinking we have 'many decades' left till RSA is broken is bordering on hubris. If Quantum computing advances at the speed of Moore's law, it'll take about 14 years or so to crack RSA-2048, and 16 years to break RSA-4096. Exponential progress is quite hard to wrap your head around.
I know it's unlikely for QC to advance at the speed of standard computing, but it's safer to think we don't have 'many decades' and work on hardening our encryption.
I'll bet you 10,000 USD that RSA-4096 will not be broken by brute-force attacks even in 100 years
@@owlmostdead9492 Quantum computers do not break RSA by brute force
Ali Hasan bilen birisine benziyor ben ikna oldum. Şifreleme işinden hiç anlamıyorum ama tüm anlatılanlara bakınca kırılması zor gibi geliyor.
Yes, especially since the average person doesn't change their password if they are not forced to. So even in 50 years we will still get hacked because of our old comms.
@@sakiodre I know they compute everything at the same time but they still brute-force it, since there's no other way without knowing the answer beforehand
There was a debate about wether QCs would be infeasible because of how much error correction you need for larger and larger systems. But increasingly it's looking like that won't be an issue. We're making larger systems with much higher accuracy (current systems are 99.9% accurate, compared to 50% a few decades ago), and error correction isn't compounding.
Yes, likely there will be many big inovations, so that the power of quantum computers double every 18 months every year like Moore's law.
It's worth noting that there is evidence of the selection process for Kyber in NIST's PQC program being heavily rigged to inflate its ostensible security level, which really shouldn't be surprising considering NIST is known to be collaborating with the NSA, I recommend reading Daniel Bernstein's post about the subject from last year.
Do you have a link? I can’t seem to find anything
Hadn’t heard of DJB until you mentioned him, so thanks for the knowledge! Very interesting cryptographer!
Damn, underrated comment
People really can't know about current state of technology, especially today.
"harvest now, decrypt later"
but maybe that "later" was actually yesterday
Okay skizo
i disagree, American government is too stupid and every other government is even stupider than that so ¯\_(ツ)_/¯
Back in the 90s we thought that the government could have secret space alien technology, we all thought the US military had super secret cards up their sleeve.
In 2024, its very very apparent, self-evident even, that they do not and that they're all complete morons. They are weak men who can't talk without a teleprompter.
And this is America. In Europe and the third world, like China and Russia, its even worse.
@@penguinvicker6476cannot spell?
+ rep for no country for old man pfp
Maybe I'm getting old but I don't buy as much into the "some genius will arise to solve our problems" argument as much anymore. I've been working in the cutting edge IC industry for over 10 years now and it seems like we've been turning the same crank of breaking tough problems into manageable chunks over and over. Theoretical physics is almost out of gas as far as making testable predictions, and there are so many layers of abstraction in science and engineering that the people doing it don't understand at the fundamental level what we are doing anymore.
Remember when it was "impossible" for a computer to fit in a household? Or on a desk? Or inside a briefcase? Or inside of a pocket? Now we have pregnancy tests that can run Doom. Never say never when it comes to computers.
Accelerationist type comment
Remember when it was "impossible" for a 10000TWh miniature artificial sun to power a car? a toaster? a but plug?? Now we have none of that things.
what's the moral of this?
Nobody said that quantum computers will never break RSA, go back to primary school.
The question is how much time it is going to take.
Not never, but not very soon when ot come to quantum computers.
besides the point, but pregnancy tests can't actually run doom
If I didn't start studying for Security+ 2 weeks ago, I wouldn't be able to understand anything you were saying about encryption standards in this video. :)
Nice for you!
I haven't studied that and I still understand it bro
@@ilikewaffles3689 you are far more PC literate than me then.
bro you acting like he speaking a foreign language.. This should be common knowledge for anyone with a computer... Unless your part of this new generation of kids growing up in a world where pirating is such a terrible thing to do >.>
@TaterTots-d2z Ive known what quantum computing and brute forcing is for years now. how many people use computers and actually know what RSA is? Or MD5? Or password salting. I was just talking about the last 2 minutes of thr video in general.
Actually you have to be worried, cause if someone stole your encrypted data back in 2013 or whenever old standards were used, they now have it unencrypted. Sure it might be outdated, but say its the "forgot your password" question answers or whatever. It's still information you don't want out there.
Yes and I think we all know there's databases in various countries that have been storing such data for years on this assumption.
That sort of data would be encrypted using AES, not RSA. Though Grover's algorithm does cut AES' effectiveness in half.
Also security questions are usually insecure anyway, because almost all of them use information that's a matter of public record if someone digs deep enough.
Just don't reuse passwords/answers problem solved
6:30 google apparently did just that. They used more cubits to achieve better error correction
Noah's ark pilled
Is that a Xhad Xinnie the Pooh? Pretty good thumb.
Giga Xi
They still use DPI that requires an OBFS4 proxy to circunvent TLS certificate detection
L(Mao Zedong)
can they run crysis?
lmao
It sure as hell can run Doom
im a gamer, i get that
Rest assured that if this is being published, much more powerful tools exist behind the scenes.
While I have no doubt this is true to an extent, as you work with and know people at certain organizations the more you may not be surprised if you found out significantly more advanced systems don't actually exist... yet. I think their real power is in getting people to question if they could but in today's world there's a reason they often rely on contracts with various companies to develop bleeding edge programs.
In the case of China it's even more likely they'd try to oversell what they actually have IMO.
@@JJFX- I'll rather feel China would keep it under lock and key though. China has been actively stealing data from US tech companies and defense contractors regardless if it's encrypted for over a decade now. They have every reason to pursue these tools and keep them hidden as decrypting any of the stolen data will save them years and billions in R&D costs.
Also, D-Wave's quantum "annealing" operates differently from what is commonly understood to be general-purpose quantum computation. Annealing is really only useful for a very limited subset of problems for which quantum computation may be useful - optimisation problems. Notably, prime factorisation is not one of those problems that annealing is good at. tl;dr - If you read D-Wave and RSA in the same sentence, somebody's misleading you.
I appreciate your explanation.
The q-correction problem is to stay, it's more of a physical law than technological issue. It gets exponentially worse as you scale the system. Each added q-bit adds a chance of a random particle flying by and interacting with it, wrecking your computation. You can cool it down and shield it to reduce that, but cosmic microwave background is always going to be a problem. There is a maximum limit on how big your q-system can be before it becomes completely useless. Progress can be made in how fast you reset it after a computation. Now you need to reset the system and align/entangle all the electrons by pulsing it with a strong magnetic field. It's like having a 1Hz processor, and needing to reboot PC after one clock. Eventually this will become faster, maybe we will even have algorithms that somehow flip the system back into ready state once it finishes a task. But that might be impossible. Also these computers aren't even Chinese, it's from Canada. And managing to do a computation on q-system once or a few times, doesn't mean you can do it consistently. You can think of it as gacha-pull computing, you can hit 20 in row, or none...
non of the encryption will matter after the AI chips get integrated into hardware, AI chips will be able to scan all your data after they being decrypted to "protect against cp" (as always a security concern being used to add spyware onto peoples machines)
anyway...
That's why people need to push for privacy rights and stop trading privacy for convenience
@@rodiculous9464 I think this is a lost battle convenience is too "convenient"
Because the general public will always be more 'reactive' then 'proactive' despite history showing why this such a terrible methodology. They'll only start to care once a problem significantly impacts them but even then they'll grasp for an easy solution that'll likely end up worse for all of us in the end.
Get into the habit of using encrypted codebooks. If your encryption is broken, then the adversary must break your codebook. Periodically rotate your codebooks as a "moving target".
Are you talking about one-time pad? Because that's the one type of cipher that is unbreakable, as long as your key is properly random, is as long as the message, and is kept secure, and no part is ever used for more than one message. The downside is that you need a secure method to share the key, such as e.g. transporting physical media by competent, trustworthy people and in a tamper-evident container. Not very practical for most Internet communication, I'd say.
Dont pepper it the wrong way
@@prezentoappr1171 What's that? Is it like a book cipher?
@@w花b
Iirc , it's synonymous with salting in cryptology. Ik from reading cryptology and reading bitwarden backup guide.
Honestly I haven't delve on the differences between salting and peppering the pass so IDK.
@@w花b Both salts and peppers are values added before hashing, to change the output. The difference is, a salt is stored in the clear alongside the hash value, while a pepper is kept secret.
remember that military grade typically means "less reliable than civilian goods."
Not really. Military kit is used for a long time so people think it sucks, but that's a maintenance issue not a quality issue.
Thank you for these insightful videos
your videos are really well researched thanks
only another month or so of mining before i can get some merch from Kenny's shop
Thanks for clarifying that. I was a little bit worried.
'Yet' in the title is the realst thing ever
Really liking your videos recently 👍👍
Its kind of funny when the avatar looks like bogdanov with a quantum computer
Note that the D-wave is also an annealing quantum computer and not using a gate-based architecture. This means the algorithms are also slower or take more steps.
at 4 minutes through the video i thought it was nearly done...... very densely packed video!
So I have a fully custom home file server with a web UI and one day decided to check what exactly happens at larger RSA key sizes...
My Ryzen 7 3700X took like 5 minutes to process the initial server request while at 32k key size...
????
@@andrekotz7803 Generate yourself an SSL cert, load it into a server, and watch it do nothing for 5 minutes...
Jeez, people, I thought everybody knows how to write a file server at home...
oh no! he got CIA'd!
Does fully custom mean you turned an older PC into a server?
@@JJFX- No, used an SBC and wrote custom software for it.
Look at the city slicker with his fancy chinese computer
Yeah, I was always skeptical about cracking with a quantum computer. People make it seem like will magically get the right answer or something.
Hype sells. Quantum hype doubly so.
I mean....if that's what people told you, you're listening to the wrong people.
We've become blinded to what genuinely new development looks like, a slower pace seems strange. I blame the presence of mba's in the industry chasing trends.
The technology clearly works, *you just saw it managed something significantly faster, while using less power, then a horde of machines from a much more developed technology*
I'd suggest you remember these machines are the equivalent of the early ENIAC's or even the Later IBM 7090's - compared to what we have nowadays the technology is *more than a 4 trillion times faster in IBM's case and roughly 200 trillion times in ENIAC's case*
Let it cook, the next 10 years will see a series of medium term required experiments finish, which will be folded into new ways of thinking. It is decades away but not so far we should be complacent
@@jehorigby8778 I didn't see that. Maybe you had too much to drink? That would explain these hallucinations.
@@lepidoptera9337 That's fair enough, let's briefly review what we was and wasn't achieved by a first generation device.
- It didn't 'break encryption'
- It factored a 22 bit number associated with RSA encryption
- This action was later compared to a cluster of machines belonging to a technology with 70 years of development
- The work that the cluster factored was a 250 bit number associated with RSA encryption
- The cluster took approximately centuries of time to factor this number
(Not included in the video just compute history)
1960's were the rough time for a single machine to factor a 22bit number, about 15-20 years of compute development
My question for you is: Considering that the classical compute cluster was made up of many more machines and required network technologies once believed impossible to divide up the problem to achieve success factoring a 250 bit number, how can you see what amounts to the equivalent of whatever came before the model T ford of quantum computing, doing the same with far less development, as anything but amazing?
I agree the tech is over hyped but a bit of history might be valuable to remember, no?
Real interesting looking pdf you got there
I ignore anything that the mainstream media focus on. And I recommend the same for everyone.
Blindly ignoring information from mainstream media is also ignorant, just like making ridiculous predictions that do not consider breakthrough advancements.
@@shivanandvp MSM is sensationalist, and very biased towards whatever agenda they wish to push. For your mental health too, ignore msm.
'Hey man, a tsunamis is coming you better leave!'
'Who said? The mainstream media? Be gone sheep.'
It's not there yet but we are one or two technical advancements away from it being a problem. If we get both qbits stable at higher temps so the whole computer isn't such a hellish contraption and they can paralellize more qbits without them causing interference as much to each others, things will escalate quickly.
Never forget at first we were soldering individual transistors together and they also had problem commuting properly at room temperature and now we have several billions per CPU.
They don't need any of this to know where missile silos are however, everybody already do. And nuke launch codes are on old floppies on ancient computers that don't even know what a network is so 😅
I find 22-bit factorization pretty scary. Qubits needed scales linearly with bits to be factored, and I expect innovations in technology to multiply the number of logical qubits each time (whereas design improvements are much slower), so it may only take a few new techniques to get to a number of bits people realistically use. If there is such a jump up, I also expect the final one to be hidden by the government, company, or individual responsible- maybe to keep it from causing harm, or maybe to abuse it while everyone thinks he's safe. What do you do with a 0-day that affects everything?
In combination with store now decrypt later, this could make lots of important data vulnerable soon without anyone realizing it.
Everybody please donate and buy this man’s merch, he’s a national treasure and we need him
The problem with quantum computing error correction is that you are using the same type of hardware that made the errors to correct the errors. That can easily lead to more errors.
Is there a solution
quanten computing is so overhyped. its gonna be decades before we know if it works at all
fr
What did you say about Quentin Tarantino????
@@JorgetePanete 😂
Its probably not going to working at all
"bordering on hubris" as another comment said, its only a matter of time before someone makes the next discovery that leaps it forward
True state 'hacking' comes from backdooring:
- chipsets - only the NSA controls this
- operating systems - only the NSA controls this
- GnuPG or the program that implements gpg - Any State can influence this.
- the GCC or compiler to weaken certain algorithms.
Visual Studio casually adding 2 lines of code to your compiled program: `using system.ms.feedback.helper;` - `helper.say(object a, object b, object local1, object local2);`
Thank you for mentioning but The list is rather extensive and the NSA is NOT the only one that controls chipsets and OSes including firmware and gateware😅
Not the only, but primary source:
- from chipset design
- to customs/freight tampering during hi-priority or large-volume consignmemts/purchases along the supply chain.
Of course the estimates now will be wrong. It's a well established trend.
Even Export RSA has larger key sizes than 25
Been dealing with cryptographic since 2008 when finishing computer networking and ended up later going to a rabbit hole of crypto viruses and up to this day I haven’t seen been talked about it as well.
I’m curious on what’s coming next to quantum resistant cryptography, been using RSA 4k and Vera crypt for some time so I wonder if it’s gonna be useless in the future.
Maybe AI can help us give this leap forward on producing better encryption algorithm.
Really enjoyed this video! You’ve provided a great perspective on how the market might respond. There's more info in my bio for those interested in this topic. Thanks for the video, I'll be watching for more updates!
Locations of missile silos is a pretty bad example, we already know where they are.
reckon you could distribute the problem with cheap quantum computers! quantum computers are amazing at answering certain questions, and breaking up the question into discrete ranges doesn't violate quantum physics. also, recall that adding more qubits to support breaking larger and larger keys, is still a fairly linear process. expect to see a Moore's law of qubit coherence.
Post quantum algorithm can be vulnerable to other flaws
I use a 4096 bit key, and have since I learned what RSA is.
Computers were still mostly following Moore's law then, it seemed prudent.
Now that they aren't, it seems it might still be usable for an indefinite time. Once we start building computing satellites, THEN I need to upgrade.
Why spending so much money and effort on breaking encryption? It is way easier and cheaper to infiltrate or tap into a handful of proprietary OS vendors. When you control the syscalls, you do not need to decrypt anything, just get your AI to selectively filter anything on the consumer device and you are done. No need to fiddle with any complex math!
In such scenario, the way out is clear: Open Source OS, or preferably devices, and making sure your private data does not leave your devices.
BTW, other clever tricks include not disclosing the public key until it is too late to attack it. Bitcoin does this, addresses are hashes of public keys, not the keys themselves. The public key is only disclosed at payment time, but them the funds are gone. That is one reason not to re-use addresses, the other is avoiding tracking.
anyone remember the supercomputer from code lyoko? god damn it looks just like the real thing
My favorite cartoon. I hope the Chinese won't build Xana on that shit.
Imagine spending all this money when all you need to break encryption is a $5 wrench
more worried about the US breaking my encryption since they're the ones who'd act on it
love your voice man
when national security needs some info, they will get the info, no matter if it requires torture, middle man attack, offline cracking or plain logging info before encryption.
You can literally buy suitcases that can break / temper 256 bit encryption real time used for phone interception.
If only Winnie was that handsome.
In an introduction to quantum computing class we learned that you need 4000 fault tolerant qbits
In the real world you would need 4000 qbits + another 2000 for error correction , if I remember correctly
The thing you need to understand is that D Wave's quantum computers use quantum annealing. Their machines have a larger number of qubits but they're much noisier. The newer superconducting quantum computers don't need nearly as many error correction qubits.
Also those refrigerators have cooling power like 100 micro watt (1 million times less than desktop cup). You shine your phone flash light on it, and it will break.
If they succeed we're screwed
one note about deprecated key sizes, one can keep a record of old packets and decrypt them when when decryption is available in 10, 20, 100 years. would it be relevant then? we'll set what govs think
One thing I hope this enables is cracking of DRM keys.
I cant believe actually learned in depth about the factoring and encryption rates due to the manga byrndr of the darkness 😂😂😂
a NYT editorial was wrong? Shocking.
the thing with rsa is that the factors are each prime. hence you can't use simple divisibility rules in quite the same way
so just linking up the quantum computers to try to do Quantum Parallel Computing, the real problem is you would need a Quantum Computer wire that would be able to keep the qbit in a super position as it goes to the next quantum computer in the cluster. you can't just do it in software as when it gets converted the qbits super positions are lost, like a float becoming a int. the wire would be kept as cold as the whole system, so it's a engineering issue too.
Why use a bigger key size? Because it grows the problem space exponentially. Processing power is not growing exponentially but key lengths can.
TL;DR: mathematically encryption will remain safe from brute forcing for the foreseeable future. Weakness in implementation is the only real concern.
4k is so old school, i've been on 8k keys for years
Why decrypt traffic in transit when you control source and destination?
Exactly
I am pretty sure if something like this really happens it would be a long time before you see it on the news.
I don’t know much about this quantum stuff but I do know that fries go well with burgers so I’ll leave you with that brain teaser :D
That's more of a Yuuri response.
Thanks for the forecast! Just a quick off-topic question: My OKX wallet holds some USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). Could you explain how to move them to Binance?
The important question here is when will quantum computers will be able to process remote GPU workload at a crazy fast speed so I can finally play Crysis
Lol
It's fine when they still want to publish it and let the world know how far they go.
TFW GigaWinnie finds your location and takes your soycial points
This is why NIST is already issuing standards for post-quantum encryption.
Hope your farm is doing well.
I PAY FOR WINRAR 🍏
They just refactored a 32 bit number , BRO THAT'S DOESN'T MAKE SENSE , 32 BIT IT's ALREADY A LOOOOOT OMG !
Doesn't need to.... already has a certificate to do that automaticly
Yeah Crypto...just give it ten years.
I'm pretty sure that 2000Q was running from regular data centre water cooling.
How long did it take to crack this?
The problem is not that the encryption algorithms are evolving. The problem is past recordings. Let's say you catch a government secret transmission. You just record/save it and you try to crack it 10 years later when you have the technology to do it. Some secrets will still be relevant. Imagine if you had today some 3DES or MD5 transmissions. You could crack them in minutes.
I am still not convinced quantum computers are anything more than a scientific curiosity.
In cryptography by factoring number means factoring the product of two coprime numbers.
2:48 that's because quantum computing is just marketing hype
But each additional qubit doubles the computing power, doesn't it?
4:04 that's why they use multiples of two large primes
So, in short, the wright brothers are not at all comparable. Everyone knew it was possible, it had been done hundrets of times before, it was just journalists being journalists.
Funnily enough, even the writght brothers were aware of some of the previous ones. Such as Otto Lilienthal who made over 2000 flights in the 1890s. Nevermind George Caley and the people he funded in the late 1700s and early 1800s.
how can someone provide a quantum resistant anything if the quantum is not even out yet
Whaat.. What is that at 3:15...
Is it.. Is.. Grid5k.
Oh men I am working on that HPC 😂