Will Quantum Computers break encryption?

Поділитися
Вставка
  • Опубліковано 9 чер 2024
  • How do you secure messages over the internet? How do quantum computers break it? How do you fix it? Why don't you watch the video to find out? Why does this description have so many questions? Why are you still reading? What is the meaning of life?
    0:00 Intro - Are we DOOOOMED??
    0:52 How NOT to Send Secret Messages
    2:09 RSA - Encryption Today
    5:19 One-Way Functions and Post-Quantum Cryptography
    7:28 Qubits and Measurement
    9:03 BB84 - Quantum Cryptography
    12:43 Alternatives and Problems
    14:26 A Case for Quantum Computing
    Facebook: / frameofessence
    Twitter: / frameofessence
    UA-cam: / frameofessence
    CLARIFICATIONS:
    You don't actually need a quantum computer to do quantum-safe encryption. As briefly mentioned at 7.04 , there are encryption schemes that can be run on regular computers that can't be broken by quantum computers.
    CORRECTIONS:
    "The public key can only be used to scramble information." (2.18) Technically, you can use any key to encrypt or decrypt whatever you want. But there's a specific way to use them that's useful, which is what's shown in the video.
    "Given a private key, it's easy to create its corresponding public key." (5.36) In RSA, depending on exactly what you mean by "private key", neither key is actually derivable from the other. When they are created, they are generated together from a common base (not just the public key from the private key). But typically, the file that stores the "private key" actually contains a bit more information than just the private key. For example, in PKCS #1 RSA private key format ( tools.ietf.org/html/rfc3447#a... ), the file technically contains the entire public key too. So in short, you technically can't get the public key from the private key or vice versa, but the file that contains the private key can hold more than just the private key alone, making it possible to retrieve the public key from it.
    Video links:
    Encryption and HUGE numbers - Numberphile
    • Encryption and HUGE nu...
    The No Cloning Theorem - minutephysics
    • The No Cloning Theorem
    Quantum Entanglement & Spooky Action at a Distance - Veritasium
    • Quantum Entanglement &...
    Sources:
    Quantum Computing for Computer Scientists
    books.google.ca/books/about/Qu...
    Random person talking about Quantum MITM attacks
    crypto.stackexchange.com/quest...
    The Ekert Protocol (i.e. E91)
    www.ux1.eiu.edu/~nilic/Nina's-...
    Annealing vs. Universal Quantum Computers
    / what-s-the-difference-...
    Images, Documents, and Screenshots:
    Post-Quantum Cryptography initiatives
    csrc.nist.gov/groups/ST/post-q...
    pqcrypto.eu.org/docs/initial-r...
    Internet map (Carna Botnet)
    census2012.sourceforge.net/
    Quantum network maps
    www.slideshare.net/ADVAOptica...
    IBM Quantum
    research.ibm.com/ibm-q/
    Music:
    UA-cam audio library:
    Blue Skies
    Incompetech:
    Jay Jay
    Pamgaea
    The House of Leaves
    Premium Beat:
    Cutting Edge Technology
    Second Time Around
    Swoosh 1 sound effect came from here:
    soundbible.com/682-Swoosh-1.html
    ...and is under this license:
    creativecommons.org/licenses/...

КОМЕНТАРІ • 1,8 тис.

  • @frameofessence
    @frameofessence  6 років тому +595

    CLARIFICATIONS:
    You don't actually need a quantum computer to do quantum-safe encryption. As briefly mentioned at 7:04 , there are encryption schemes that can be run on regular computers that can't be broken by quantum computers.
    CORRECTIONS:
    [2:18] Technically, you can use any key to encrypt or decrypt whatever you want. But there's a specific way to use them that's useful, which is what's shown in the video.
    [5:36] In RSA, depending on exactly what you mean by "private key", neither key is actually derivable from the other. When they are created, they are generated together from a common base (not just the public key from the private key). But typically, the file that stores the "private key" actually contains a bit more information than just the private key. For example, in PKCS #1 RSA private key format ( tools.ietf.org/html/rfc3447#appendix-A.1.2 ), the file technically contains the entire public key too. So in short, you technically can't get the public key from the private key or vice versa, but the file that contains the private key can hold more than just the private key alone, making it possible to retrieve the public key from it.

    • @sexismagainstmen4617
      @sexismagainstmen4617 6 років тому +6

      um.... why can you only measure horizontally or vertically. you didnt explain that at all. you can measure in any plane.

    • @frameofessence
      @frameofessence  6 років тому +26

      To keep it simpler, I only showed two orientations because that's what was relevant to explaining BB84. And to be fair, more orientations are shown at 13:04

    • @stealth9799
      @stealth9799 6 років тому +11

      That is incorrect; in ECC, the private key (and one component of the public key) can be chosen at will however you want. With RSA, that would be correct; you choose information that derives both keys but with ECC, you pick a private key k (256 bits) at your own discretion. This could be from a CSPRNG, a hash of a picture of lava lamps or the user's password salted and run through a KDF. You then pick a public point G on the curve and calculate the second component of the public key, kG by "dotting" G with itself k times.
      It is easy to "dot" something with itself k times because there are shortcuts you can take but when given a starting point and an ending point, it is computationally infeasible to figure out how many times it was dotted. You have to go through and actually dot it that many times instead of using shortcuts.

    • @frameofessence
      @frameofessence  6 років тому +20

      Well, this is a lot more complicated than I thought. I'll edit the original comment to be more specific to RSA. Thank you for your input.

    • @stealth9799
      @stealth9799 6 років тому +11

      I just wanted to say that you did a fantastic job explaining btw. Also thanks for welcoming feedback and making corrections when new information becomes available! I wish more content creators were like you.

  • @MrSeppieD
    @MrSeppieD 4 роки тому +719

    My answer on a computer science exam: ��������
    Teacher: What is this supposed to mean?
    Me: It's the requested 8bit answer, but expressed in qubits. It represents the correct answer if and only if you know the correct answer as well.

  • @paiovezam8533
    @paiovezam8533 4 роки тому +562

    Eavesdropper: This is the lock picking lawyer...

    • @Chris_Hetherington
      @Chris_Hetherington 4 роки тому +11

      Plot twist, LPL is actually Bosnian Bill.

    • @bestjerk
      @bestjerk 4 роки тому +15

      and today we are going to read people's e mails

    • @sirhootsalot2343
      @sirhootsalot2343 4 роки тому +19

      so we are going to use this quantum computer Bosnian Bill and I made

    • @gamermoment3708
      @gamermoment3708 4 роки тому +11

      "Once again an inexcusable design flaw"

    • @TECHGYVERBD
      @TECHGYVERBD 4 роки тому

      150 Likes!

  • @Int8
    @Int8 6 років тому +1977

    Plot twist: the server is the eavesdropper

    • @RyanTosh
      @RyanTosh 5 років тому +79

      Plot twist: The eavesdropper is the server!

    • @thejurassicwarewolf3300
      @thejurassicwarewolf3300 5 років тому +53

      PLOT TWIST: everyone is the evesdropper

    • @matthewstone2545
      @matthewstone2545 5 років тому +37

      Plot Twist: Everyone is, YOU!!!

    • @FplusETVChannel
      @FplusETVChannel 5 років тому +26

      plot twist: YOU are the eavesdropper

    • @brownieman377
      @brownieman377 5 років тому +27

      Plottiest plotty plot plot plotty plot twisty twist: There is no servers or eavesdropper and there is no internet

  • @Mrkevi123
    @Mrkevi123 4 роки тому +273

    Me: "password123"
    Quantam CPU: "I'm about to end this man's whole career"

    • @bucket4255
      @bucket4255 3 роки тому +14

      Interesting...
      And what's your username?

    • @eness379
      @eness379 3 роки тому +20

      @@bucket4255 username123

    • @bucket4255
      @bucket4255 3 роки тому +1

      @@eness379 Interesting, interesting. Now, if you can't log in, it's because you may of deleted your account by accident.

    • @codythompson9973
      @codythompson9973 3 роки тому +4

      @@bucket4255 Interesting Interesting Interesting. Now, what is your middle user name

    • @bucket4255
      @bucket4255 3 роки тому +4

      @@codythompson9973 Middleusername123

  • @NorDank
    @NorDank 6 років тому +1320

    So the devil is reading my e-mails...

    • @joseph_pokemon
      @joseph_pokemon 6 років тому +23

      they are just programmers, network engineers and mathematicians that want to get rich no matter what xd

    • @PaperBagMan884
      @PaperBagMan884 6 років тому +51

      Well, if by devil, you mean the NSA, FBI, other three letter agencies, then yes!

    • @ripperfisher182250
      @ripperfisher182250 6 років тому +8

      Nor Dank I found this mildly humourous. 1 gold star.

    • @ReallyReal_1
      @ReallyReal_1 6 років тому +8

      Nor Dank a ton of people didn't get this joke

    • @1998wiwi
      @1998wiwi 6 років тому +7

      Yep. You should include a picture of a cross or something like that in all messages you send to keep that guy away.

  • @Thomasfrank
    @Thomasfrank 6 років тому +116

    Just watched three of your videos, and I FINALLY feel like I have an at least rudimentary understanding of quantum computers (and classical logic gates to boot). Your videos are fantastic - hope to see more in the future!

  • @matiasl.ceballos3346
    @matiasl.ceballos3346 3 роки тому +51

    Even though this video is about quantum computers, the explanation about how RSA encription works is THE best i've found so far for someone with no prior knowledge. It helped me a lot, and I often show this video to people who are taking their first steps in networking.
    Great job!

    • @elbozo5723
      @elbozo5723 2 роки тому

      well find a new video… he doesn’t even mention the 245 byte limit on it

    • @matiasl.ceballos3346
      @matiasl.ceballos3346 2 роки тому +2

      @@elbozo5723 Dude, I meant it is great for an introduction for someone with no prior knowledge. Not for all the details.

    • @maywr3893
      @maywr3893 Рік тому

      true, RSA was complicated for me before this video

  • @twilightknight123
    @twilightknight123 7 років тому +902

    As a physics grad doing research in the field of quantum computing, I approve of this video.

    • @jujuyee2534
      @jujuyee2534 5 років тому +33

      as an astronaut i agree with you

    • @Atul_Thakur97
      @Atul_Thakur97 5 років тому +32

      as an unqualified physics student...i approve both of you to teach me physics

    • @pushqrdx
      @pushqrdx 5 років тому +25

      as a human i say fuck you all 😂

    • @anandpatel1074
      @anandpatel1074 5 років тому +18

      As a quantum astronaut, I approve of this comment

    • @rubenverster250
      @rubenverster250 5 років тому +15

      As a hobbyist of this field. I can neither approve, nor disapprove my say. Until it is said

  • @Ze_eT
    @Ze_eT 6 років тому +776

    "BECAUSE QUANTUM MECHANICS!"
    I laughed so hard.

    • @silence439
      @silence439 5 років тому +23

      Ze_eTPlays It would be too hard to explain quantum mechanics in less then a hour, although he really wants to.

    • @dylanboyd8767
      @dylanboyd8767 5 років тому +1

      you should see kurtzgesagt's video on quantum computers ua-cam.com/video/JhHMJCUmq28/v-deo.html very informative

    • @ksam2000
      @ksam2000 5 років тому +1

      lmao

    • @KafinSulthan
      @KafinSulthan 5 років тому +1

      this could be the new: "except-wait for it-the mongols" *montage plays*

    • @tinycockjock1967
      @tinycockjock1967 4 роки тому +2

      Ze_eTPlays Did you laugh so hard mate? Or did you just nose-exhale?

  • @joebama7765
    @joebama7765 4 роки тому +189

    can't we use quantum encryption on the quantum E-mails using Quantum Nord-Quantum-VPN? lol

    • @RedGallardo
      @RedGallardo 4 роки тому +4

      No, it's forbidden and you'll have a camera up your butt for constant verification of you not trying to encrypt anything from people with power.

    • @joebama7765
      @joebama7765 4 роки тому +3

      @@RedGallardo ok

    • @kadincool
      @kadincool 4 роки тому

      Quantum mechanics hurt my brain

    • @joebama7765
      @joebama7765 4 роки тому

      @sp of course the best cola to drink while doing pc stuff

    • @saltysea3626
      @saltysea3626 4 роки тому

      And you are a quantum Minecraftr playing quantum Minecraft.

  • @Aveikin
    @Aveikin 5 років тому +8

    That was literally the best explanation of how encryption works I've ever seen. Finally I can fully understand it, thanks

  • @burnhamaj
    @burnhamaj 7 років тому +163

    That was a very well-made video. I really enjoyed it. You deserve way more views.

  • @DJaquithFL
    @DJaquithFL 6 років тому +159

    Eavesdropping would become the ultimate DDoS.

    • @death_parade
      @death_parade 5 років тому +1

      This comment is so underrated.

    • @kressckerl
      @kressckerl 5 років тому +24

      Irl: trying to have a secret conversation with somebody, but a third guy stands behind you and making obnoxius noises evertime you try to share your public key...

    • @misceryyt2897
      @misceryyt2897 5 років тому +1

      what are you talking about not all cyber crime is DDos

    • @madisonlink7141
      @madisonlink7141 4 роки тому +5

      @MisceryYT and Svein:
      DDoS is when you prevent a sever from communicating with its proper clients (using a distributed attack) in order to deny service.
      In the quantum security example, eavesdropping destroys the message. Therefore, distributed eavesdropping on all channels becomes a DoS attack, because servers literally cannot communicate with their clients.

    • @brazgazz
      @brazgazz 4 роки тому +1

      DO YOU EVE KNOW WHAT A DDOS IS?

  • @fye7785
    @fye7785 5 років тому +2

    It's fascinating how it actually take half of the video as an introduction, well explained. Thank you.

  • @ARoundThing
    @ARoundThing 4 роки тому +1

    I want you to know that I thank you for making such concepts so simple. Please keep doing what you do. You have a great channel and I really wish you best of luck. Thank you.

  • @renatobritto4096
    @renatobritto4096 6 років тому +409

    Shit man, this video actually made me learn something hard. I find these lacking on youtube today, thanks, love this channel.

    • @xetera
      @xetera 6 років тому +6

      You must be searching for the wrongest possible things because there haven't been as many amazing educational videos like these on youtube as there are today.

    • @chinmaygupta1530
      @chinmaygupta1530 6 років тому +1

      DOGGYDOGG do you know how it works? The video is a little difficult to understand, but if you know it better, why don't you make a video and enlighten us?

    • @circumplex9552
      @circumplex9552 2 роки тому

      @@chinmaygupta1530 deleted reply?

  • @o4ugDF54PLqU
    @o4ugDF54PLqU 7 років тому +774

    Your videos deserve more views. Maybe you should try making your videos' titles more descriptive because nobody would click on a video that is named "Encryption and Quantum Computers". Instead, name it something like "Will quantum computers break encryption?"

    • @frameofessence
      @frameofessence  7 років тому +266

      Good idea! I'll do that.

    • @frameofessence
      @frameofessence  7 років тому +258

      Thank you by the way. I was having trouble coming up with a title.

    • @boomperson818
      @boomperson818 7 років тому +475

      lol i clicked because of the "Will quantum computers break encryption?"

    • @alivrah
      @alivrah 7 років тому +59

      BoomPerson Same here!

    • @user-ht3tp3uj4v
      @user-ht3tp3uj4v 7 років тому +19

      haha , same here
      But I didn't even clicked for the title
      I just saw it was uploaded by Frame of Essence so I clicked it

  • @dirm12
    @dirm12 6 років тому

    I have watched so many video that attempted to explain encryption, you were the first to actually make it clear.

  • @CalamityInAction
    @CalamityInAction 5 років тому +17

    5:17 The eavesdropper says "F YEAH!!!"

    • @segmentsAndCurves
      @segmentsAndCurves 3 роки тому

      Lol I just see you in Chopin Fantaisie op 49.

    • @CalamityInAction
      @CalamityInAction 3 роки тому +1

      @@segmentsAndCurves Haha yeah
      It’s a great piece

  • @Quick_in_and_out
    @Quick_in_and_out 6 років тому +162

    So I was recently thinking to myself "will quantum computers break encryption?"
    Then I find this video a day later!
    Then I find out that your original title was "encryption and quantum computers" which I never would have clicked on!
    Good work all round

    • @danthegreat8411
      @danthegreat8411 5 років тому +2

      *That's Some Magical Shit Right There!*

    • @siipi6331
      @siipi6331 2 роки тому

      Quantum computers will never break RLWE-based homomorphic encryption.

  • @Afterscience742
    @Afterscience742 7 років тому +8

    First 3 CPG grey videos in a row, then Frame of Essence uploads again.
    I must be in UA-cam heaven.

  • @savingsoulsociety
    @savingsoulsociety 5 років тому

    Stumbled on this video today while randomly scrolling my recommended. I actually learned something quite interesting, thanks for this video, you explained how it works really well

  • @thetuxguy5438
    @thetuxguy5438 3 роки тому +1

    I have no idea why I like to watch these types of videos but I like them

  • @turun_ambartanen
    @turun_ambartanen 7 років тому +15

    that was the best explaination of these encryption algorithms i have ever seem!

  • @kingbobthepimp
    @kingbobthepimp 7 років тому +208

    Because Math

    • @frillneckedlizard8529
      @frillneckedlizard8529 6 років тому +2

      kingbobthepimp it is actually pretty easy

    • @yegfuf
      @yegfuf 6 років тому +4

      Because quantum mechanics

  • @OnlyMisery
    @OnlyMisery 4 роки тому +25

    "I used the quantum to destroy the quantum"

  • @ketansaxena
    @ketansaxena 6 років тому

    That is the best thing I've seen on quantum computing till now. Keep up the good work!

  • @melody_florum
    @melody_florum 5 років тому +9

    5:14 the fact that the server is surprised is so cute

    • @circumplex9552
      @circumplex9552 2 роки тому

      And the eavesdropper says "F YEAH!" for a frame

  • @arock9529
    @arock9529 3 роки тому +5

    lol just before the second “ARE WE DOOOOOMED?” ,the eavesdropper goes “YEA!”

    • @arock9529
      @arock9529 8 місяців тому

      damn this was 3 years ago

  • @kepe__
    @kepe__ 2 роки тому

    I watched this video 3 years ago. I have been looking for it ever since. Thank you.

  • @VincentDoesThings
    @VincentDoesThings 5 років тому

    I like that you simplified this in a way that 2019 nerds can enjoy. Very fascinating topic!

  • @ScienceAsylum
    @ScienceAsylum 7 років тому +194

    Great video! You going to VidCon this year?

    • @frameofessence
      @frameofessence  7 років тому +19

      Thanks! I can't go this year... maybe the next?

    • @ScienceAsylum
      @ScienceAsylum 7 років тому +14

      Bummer. I only ask because I'm going this year... FINALLY!

    • @frameofessence
      @frameofessence  7 років тому +12

      +The Science Asylum Darn, would have been nice to meet you!

    • @ScienceAsylum
      @ScienceAsylum 7 років тому +11

      Yeah, I should have gone last year. I'm hoping to "network" this time. We'll see...

    • @lua-in2sl
      @lua-in2sl 6 років тому

      The Science Asylum w

  • @yomanos
    @yomanos 6 років тому +13

    Just found your channel, it's great! Do more videos on cryptography!

  • @amartyamishra6961
    @amartyamishra6961 4 роки тому

    This was the best video about encryption in general, I've been looking everywhere and was confused after 4 videos till I arrived here.

  • @StatisticallyChallenged
    @StatisticallyChallenged 4 роки тому

    The videos visuals were so simple to understand alongside the commentary. Awesome Job!

  • @nibblrrr7124
    @nibblrrr7124 6 років тому +3

    Thanks for mentioning post-quantum cryptography (classical crypto resilient against known quantum computer attacks).
    Most tend to jump immediately to quantum cryptography, but that may only be practical in the future (if at all, for everyday use by everyone). That doesn't help against adversaries that collect your encrypted messages you're sending right now, and store them until quantum computers come around.

  • @GameCyborgCh
    @GameCyborgCh 4 роки тому +21

    0:39 someone will compile and run DOOM on it, I guarantee it

    • @eness379
      @eness379 3 роки тому

      why doom

    • @GameCyborgCh
      @GameCyborgCh 3 роки тому +2

      @@eness379 because the doom source code is available to the public and there are nutcases who port it to anything including a toaster

    • @eness379
      @eness379 3 роки тому

      @@GameCyborgCh i thought it was because it takes a long time to compile it

    • @GameCyborgCh
      @GameCyborgCh 3 роки тому

      @@eness379 a 27 year old game won't take long to compile

    • @yashagarwal8249
      @yashagarwal8249 3 роки тому +1

      Yes, i saw one recently made to run on a pregnancy test (yes the kind that is peed on)

  • @Exaspatial
    @Exaspatial 5 років тому

    14:46-end. very inspirational! you changed the way I thought about some things like trying new things

  • @gunjanshuvro3427
    @gunjanshuvro3427 4 роки тому

    Wow.... This is one of the best videos out there. Thanks Philip 😇

  • @violetlavender9504
    @violetlavender9504 6 років тому +21

    Lemme get a Supersingular Isogeny Diffie-Hellman Key Exchange with extra sauce

  • @nfistfu
    @nfistfu 5 років тому +5

    The "Are we DOOMED????" animation is my spirit animal.

  • @YalnYALNIZ
    @YalnYALNIZ 5 років тому

    English isn't my primary language but i understand it easily without any problem.
    You tell them so pure. Thanks.

  • @kiddicarus
    @kiddicarus 5 років тому

    We found this video, as well as many of the comments below, to be both educational and quite enjoyable. Thank you very much.

  • @sebastianelytron8450
    @sebastianelytron8450 6 років тому +234

    Frame of Essence would be a sick name for a progressive metal band!

    • @MetaDecker
      @MetaDecker 6 років тому +12

      Because Math would be a good 80's retro electro-synth band name

    • @TakiRyuujin
      @TakiRyuujin 6 років тому +15

      Make it Flame of Essence

    • @abyssstrider2547
      @abyssstrider2547 6 років тому +2

      zztop3000 Nah, it sounds delicate, soft, emotional, basically beautiful!

    • @RandomNullpointer
      @RandomNullpointer 6 років тому +1

      u mean sicc

    • @htf5555
      @htf5555 5 років тому

      Evanescence

  • @Alice_Fumo
    @Alice_Fumo 7 років тому +49

    I'm seeing a massive problem with preserving the superposition of a qbit in online conversation:
    online conversations are done over several servers (ones own ISP servers, the ISP servers of the person you're interacting with)
    How could those qbits even be passed down between those servers without being measured? how does one of the servers even know which info to send to the next computer without measuring it? Wouldn't it have to be measured there?
    What this problem would require to be solved is that the info of the input buffer can be moved to the output buffer without being looked at.
    I guess a functional quantum computer simply implies that this issue is already figured out.
    A current computer in order to do that would read the information at the input memory location and put those values at another location and then delete the information at the input buffer.. or just leave it there and the next batch of input will just override it - whatever! - a quantum computer can move data around between memory areas without looking at them. I think that is an interesting thing to figure out on the physical side of making a quantum computer.
    At least there's the implication that all computers inbetween have to be quantum computers, thus I expect quantum computers to use their own IP range when they're a thing.
    Edit: Damn, the video kind of covered that this is not currently a problem. (Except that superpositions can't 100% accurately be transmitted all the time)

    • @frameofessence
      @frameofessence  7 років тому +15

      I'm not really sure how this would work. Maybe the destination could be encoded in a header which is expected to be measured, leaving the rest of the message alone. It would preserve the superpositions in the message while still letting each node figure out where to send it.

    • @TheDuckofDoom.
      @TheDuckofDoom. 6 років тому +6

      I have no idea how qbits could be transferred long distances[even a few meters], most of the current Qcomputing information indicates that Qcomputers are more of an accelerator, like a GPU, always attached to a normal computer.

    • @TheAkashicTraveller
      @TheAkashicTraveller 6 років тому +1

      Frame of Essence
      Yeah but the qbits would by physical particles moving at the speed of light you're simply not going to have enough time to choose.

    • @bernhardtrian7471
      @bernhardtrian7471 6 років тому

      this conversation ...... no one knows how the communication and decryption would work in wide areas , this is yet unsolved I think , even with all the protocols and information tables ( arp )

    • @roboticunclephil
      @roboticunclephil 6 років тому +1

      headers is how current encrypted packets between servers are secured, why wouldn't it be different?

  • @mikaxms
    @mikaxms 4 роки тому +1

    This is such a great channel! Why did I get this channel recommended only now?

  • @786sado786
    @786sado786 6 років тому

    subscribed, checked your other videos and love the humor! keep up the work!

  • @benjaminbrady2385
    @benjaminbrady2385 7 років тому +5

    Nice description btw

  • @tfr
    @tfr 5 років тому +10

    4:00 When you put a key in a box and lock it with a different key. 😏

  • @DrakiniteOfficial
    @DrakiniteOfficial 5 років тому

    I actually never understood exactly how public and private keys worked until this video. I swear I've watched like 4 or 5 before this one. Great explanation.

  • @zotac1018
    @zotac1018 5 років тому

    I was studying its systems as part of my high school project.
    The way you explained encryption was better than any book I hac\ve ever read.

  • @chingmuikwok5377
    @chingmuikwok5377 5 років тому +9

    did you guys see the"F yeah"?

  • @WoFDarkNewton
    @WoFDarkNewton 4 роки тому +3

    13:36 "You need to sacrifice a *BIT* more information" XD

  •  6 років тому

    Best explanation of RSA I've ever seen.

  • @mateolaguna6542
    @mateolaguna6542 6 років тому

    Such a great video! You make easy to understand topics that are really hard. Thks!!

  • @bryanchu5379
    @bryanchu5379 7 років тому +3

    BACK AT IT AGAIN

  • @giu1644
    @giu1644 6 років тому +10

    A question I expected the answer to (and didn't get) was why quantum computers are good against traditional cryptography, so I guess a follow up on Shor's algorithm would be great!

    • @frameofessence
      @frameofessence  6 років тому +5

      That would be way too complicated for me! PBS infinite series did a good summary of it though:
      ua-cam.com/video/12Q3Mrh03Gk/v-deo.html
      ua-cam.com/video/wUwZZaI5u0c/v-deo.html

  • @MariusIsaras
    @MariusIsaras 6 років тому

    Best video about quantum computers I have ever seen.

  • @hexyellow9873
    @hexyellow9873 Рік тому

    I FINALLY found your channel after 3 years, I only found this again because I searched "encryption explained".

  • @elrymemakecontent2610
    @elrymemakecontent2610 4 роки тому +6

    me write a scramble on my test paper
    my teacher : tf is this?
    me : this answer has been encryption

  • @purewaterruler
    @purewaterruler 7 років тому +3

    you might want to link to numberphile video in the description.

  • @zhaoxunyan4016
    @zhaoxunyan4016 6 років тому

    Thank you for this video! Now I understand RSA perfectly!

  • @Reneator
    @Reneator 5 років тому

    Really good explanation. Really good video. Got a new subscriber!

  • @HarshYadav-cj3yu
    @HarshYadav-cj3yu 4 роки тому +4

    6:00 using throttling on the network to slow it down may help evesdropper to have enough time to decrypt them.

    • @cassiopeia_real
      @cassiopeia_real 2 роки тому

      i think it takes more time than the heat death of the universe, dont quote me on that though

  • @turboshamu
    @turboshamu 7 років тому +5

    OMG your video is so Goood!!! >

  • @thendog2679
    @thendog2679 6 років тому +1

    Love your hard work and information you put into your animations! I see big sub potential here! :)

  • @Thefuryspeed100
    @Thefuryspeed100 4 роки тому

    Im doing reasearch on quantum mechanics and cryptography for fun, and people like you make it possible
    Thank you for this video!

  • @madcat789
    @madcat789 5 років тому +57

    I can't wait to be shitposting on my Dell Quantum XP100K.

    • @mickeydee9069
      @mickeydee9069 4 роки тому +5

      *Q U A N T U M SHITPOSTING*

    • @circumplex9552
      @circumplex9552 2 роки тому

      There are gonna be so many memes about this exact thing when quantum computers become mainstream

  • @kadincool
    @kadincool 4 роки тому +5

    We could send back-and-forth dead memes on lots of lines lots of times per second so the evesdropper is more likely to find dead memes instead of private information 😂

  • @Hisham1097
    @Hisham1097 6 років тому

    You earned a new subscriber. Great work. Keep it up. Hoping for more videos

  • @JulianBabad
    @JulianBabad 6 років тому +2

    This video just got you a new subscriber. Excellent

  • @augustinius6586
    @augustinius6586 6 років тому +20

    How do you send qubits?

    • @frameofessence
      @frameofessence  6 років тому +24

      +August Inius Send particles of light through a fibre optic cable that preserves polarization

    • @ProFow
      @ProFow 6 років тому +5

      Frame of Essence What about WiFi, does air preserve polarization? Also will we stay in the 2.4 GHz and 5 GHz band or does it only work with visible light?

    • @Shadow77999
      @Shadow77999 6 років тому +2

      Combat Arms Fownage we are gonna need disco balls

    • @najgauner
      @najgauner 5 років тому +4

      by sending 20 BTC on this bitcoin address: 23568853119

    • @Cd5ssmffan
      @Cd5ssmffan 5 років тому +2

      najgauner send me 50 qubitcoins instead

  • @Itsmebsg
    @Itsmebsg 6 років тому +14

    How would quantum computing affect bitcoin mining???

    • @britannio
      @britannio 6 років тому +1

      Rigged Astro you just get lots of bitcoin until everyone has one

    • @manu144x
      @manu144x 6 років тому +10

      You can guess the password for any private address and start transfering them.
      The public key is the address and the private key is the password. It makes the entire bitcoin network useless within seconds.

    • @endintiers
      @endintiers 6 років тому +2

      With a quantum mining algorithm you could corner the market (except for other people doing the same). Non-quantum mining would become uneconomic.
      If someone controls more than I think 40% of the mining they can break/cheat the system.
      The big problem is that the PPK pairs used to prove identity can be broken so you can't safely send/receive coins. Without quantum encryption Bitcoin (and other value exchange) exchange dies.

    • @Shadow77999
      @Shadow77999 6 років тому

      Emanuel Gug so bitcoin will finally crash but, thx to quantum computing, not something else, interesting

    • @con_boy
      @con_boy 4 роки тому

      It immediately invalidates their value

  • @Mr_SSK
    @Mr_SSK Рік тому

    Thank you so much! :)
    Such a nice explanation!

  • @piglauhk1
    @piglauhk1 6 років тому

    Study for years , first time for me to understand what does private key and public key works. Thanks

  • @bernhardtrian7471
    @bernhardtrian7471 6 років тому +19

    15:24 hahahaha "in that moment he knew , he f@'*ed up " .... everything for nothing

  • @phizzhead53
    @phizzhead53 6 років тому +10

    actually you can send polarised light over a fiber optic conection which would work as a qbit

    • @christoffer4862
      @christoffer4862 6 років тому

      Phizzhead This is true, however the polarization of light can be measured exactly and retransmitted. The security implication is a vulnerability to eavesdropping. You can't use polarized light, some other type of qubit must be used for security applications.

    • @qwerty687687
      @qwerty687687 6 років тому

      You can use polarized light, you just need two distinct ways to measure it. You can use horizontal and diagonal, if the light comes through, it's a one, if it's blocked it's a zero. If you used diagonal and the other person measures horizontally, the photon will randomly come through or not. Send a photon, have the receiver guess in which direction to measure it and compare it to the direction you originally used, just as it's described in the video.

    • @christoffer4862
      @christoffer4862 6 років тому

      qwerty687687 But an eavesdroppper can measure the exact polarization of the light and then retransmit an identical pulse. There's no issue in using a semi-polarized detector.

    • @qwerty687687
      @qwerty687687 6 років тому +2

      No he can't. The sender either polarizes the light "upright" (horizontally or vertically) or diagonally (top left to bottom right or top right to bottom left). So you as the receiver set up your polarization filter horizontally. If the light has been polarized in the horizontal direction, you always measure a photon coming through, that's a one. If the photon was polarized vertically, you always measure no photon coming through, that's a zero. If the photon was polarized along one of the two diagonal directions, you have a 50% chance to get either a one or a zero. Or you set up your filter in one of the diagonal directions, then the same thing applies.
      You don't know in which of the two systems (straight or diagonal) the light was originally polarized, so you have to guess. After measuring, you can compare your filter settings with the sender, so the photons where both of you used the same setting can be used for encryption. The important part is, when you measure horizontally polarized light in a diagonal direction, it will change its polarity to the direction you measure it in, when it's then measured again horizontally, you get the same result as if the light has always been polarized diagonally, namely a 50% chance of zero or one.
      When an eavesdropper interferes, he also has to guess which filter setting to use. When he uses a wrong setting where you used the right one, there is a 50% chance that his measurement gives him a different result than the sender intended. Additionally, he forces the polarization that he measured onto the photon, so that you have a n additional 50% chance to measure a wrong polarization, even though your filter setting were correct, so that you cannot decrypt the message. This way, you can not only keep the eavesdropper out, you also know that there is an eavesdropper at all.

    • @christoffer4862
      @christoffer4862 6 років тому

      qwerty687687 I think it is possible to develop a polarization filter that is linearly/radially/angularly differently polarized along its plane. But as you say, that would not compromize single photons. But if a light pulse in practice would signal a Qubit, then I think it is possible to eavesdrop.

  • @mohanj9943
    @mohanj9943 5 років тому

    Excellent bro...You are awesome and your hard work makes you success.

  • @siddharthsinghchauhan8664
    @siddharthsinghchauhan8664 6 років тому

    the best video ... the explanation is apt .. precise and thorough... thank u

  • @bonelesscommunism4031
    @bonelesscommunism4031 5 років тому +3

    Okay so can it run games like hella fast or..?

    • @theramendutchman
      @theramendutchman 5 років тому

      Well games have to be specifically compiled (as always) for qubits, but they also need to be coded differently and whole different kinds of code libraries and frameworks are neccesary.
      So right now? No. In the future? We'll laugh at the consoles 'still' using 128-normal-bit architecture!

  • @romand271
    @romand271 7 років тому +5

    well the question hasn't been answered yet
    what is the meaning of life after all?

    • @DarkSideSixOfficial
      @DarkSideSixOfficial 7 років тому +3

      To live and be love. But more specifically, to do so while progressing mankind and protecting the planet and living things that's made our existence possible.

    • @computronium8
      @computronium8 6 років тому

      We're not ones and zeros as people usually said, we are qubits and everyday we're discovering and measuring ourselves. The journey itself is the meaning of life

    • @starcubey
      @starcubey 6 років тому +1

      ...or to follow God and be a disciple instead of following your sinful desires, but you don't have to agree with any of the responses to this comment because it is based on religion (except for 42 because it is the definitive answer).

    • @Inertia888
      @Inertia888 6 років тому

      x=42

    • @trispectre8366
      @trispectre8366 6 років тому

      ^^

  • @MoonLiteNite
    @MoonLiteNite 6 років тому

    great examples! Loved the video!

  • @noxultionis3851
    @noxultionis3851 5 років тому

    This was a fantastic video. Wow that explanation was clean.

  • @zictrox
    @zictrox 4 роки тому +7

    Who's here after Google attains 'quantum supremacy'?

  • @Yamyatos
    @Yamyatos 7 років тому +5

    It was nicely animated and explained. Sadly i didnt learn anything new in the first 7 or so minutes.
    Second half was totally awesome in both regards tho :)
    But, isnt this actually a huge problem? In reality, quantum computers would arrive before we have proper ways to protect ourselves against them, wouldnt they? Because they can be used to decrypt in our current system, but in order to protect us against these attacks, we need a quantum "internet", dont we? So, wouldnt it take years to build the infrastructure needed to protect us against spying quantum computers?

    • @frameofessence
      @frameofessence  7 років тому +4

      That's why we need Post-Quantum Cryptography, so we can be protected from quantum computers on existing infrastructure.

    • @Yamyatos
      @Yamyatos 7 років тому +1

      But isnt there a huge problem with post-quantum cryptography?
      If i understood this correctly, for post-quantum cryptography we need to send qubits, which is not possible on our current infrastructure (which is designed for electricity, thus bits). On the other hand, a quantum computer is all you need to break current encryptions.
      Doesnt that mean that, as soon as the first general purpose quantum computer is build, we are not able to guarantee the security of our messages anymore, while the "solution" to this problems might take years or decades to arrive? Building new infrastructure is no joke. It wont happen over the night. And we will probably only start building it as a reaction to the new threat, which would be way to late. Am i missing something?

    • @frameofessence
      @frameofessence  7 років тому +6

      You're thinking of "Quantum Cryptography", which is cryptography using qubits. "Post-Quantum Cryptography" is cryptography that works on existing infrastructure that quantum computers can't break, like the ones in 7:06 . ...which is kind of weird since it means that Post-Quantum will probably get implemented before Quantum?

    • @SeriousGamingSteam
      @SeriousGamingSteam 6 років тому

      Frame of Essence w8 w8 w8, but what about our computers themselves? They cant use quantum cryptography can they? Because if they can, then what the fuck are we so afraid for? And if they can't, don't that mean they can (obviously, but this needs to be said) also not do post-quantum cryptoghrapy?

    • @SeriousGamingSteam
      @SeriousGamingSteam 6 років тому

      Frame of Essence w8, now that I read your comment again, I guess that's kinda what you said. Right? And if not, then what do you think about it?

  • @epichaxer2265
    @epichaxer2265 5 років тому +1

    Damnnn Sonn i never imagined my brain would ever comprehend let alone understand that stuff...Thank u sooo much

  • @WannabeCanadianDev
    @WannabeCanadianDev 6 років тому

    I'm mainly here for the primer on RSA, had to watch a couple of times but it's very useful!

  • @georgeelsham
    @georgeelsham 6 років тому +6

    I expect this from 500k+ subs channel

  • @snrd
    @snrd 7 років тому +5

    Please give me a Patreon page or something where I can donate.

    • @silence439
      @silence439 5 років тому

      I agree with you. This person is awesome

  • @goldenfire6421
    @goldenfire6421 6 років тому

    Thanks! This is really simple (enough for me to understand). Great video!

  • @jasonsoto5273
    @jasonsoto5273 6 років тому

    Excellent video with great animation!

  • @nicklaich
    @nicklaich 5 років тому +11

    TLDR: unless we have quantum network, we are doomed. haha.

  • @pauloborgmann
    @pauloborgmann 6 років тому +14

    Would you become filthy rich if you mined crypto currency with a quantum computer?

    • @LegendBegins
      @LegendBegins 6 років тому +6

      Modern? Probably not. Future? Maybe! Also maybe not. "It depends" is the best answer anyone can give you.

    • @vanguardas9927
      @vanguardas9927 6 років тому +1

      will bitcoin be hacked by a quantum computer is the real question

    • @BiggySeth
      @BiggySeth 6 років тому +1

      Vanguardas Vucava exactly

  • @doctoroctopi5687
    @doctoroctopi5687 5 років тому

    why does this channel not have more subs this is some quality content

  • @arpanmajumder655
    @arpanmajumder655 6 років тому

    Enjoyed the whole video and the knowledge associated with it!

  • @alwatatani6425
    @alwatatani6425 5 років тому +10

    So how does this wor- "bEcAuSe mAtH"

  • @peterstiles1
    @peterstiles1 6 років тому +40

    12:35 "...hopefully the eavesdropper will respect your privacy..." BWAHAHAHA...the NSA and the 5 eyes...HAHA...respect your privacy...HAHAHA! : (

    • @Bulbophile
      @Bulbophile 5 років тому +1

      Benign listening in isn't the security threat; but is there such a thing as benign eavesdropping? By its nature, it's an intrusion on privacy with mal intent. From governmental sides; corporate; or personal, listening in gives the undue right to sway, steal, and hurt respectively. For eg sake only, of course. Did anyone ever hear anybody say they're going to interfere with xyz's communications to help them? Maybe only in the arena of my enemies' enemy is my friend.

  • @whoofianbrony8804
    @whoofianbrony8804 5 років тому

    This is a very good explanation of the concepts behind Transport Layer Security (TLS), the thing which kicks in when you have https configured correctly

  • @lincolnpepper816
    @lincolnpepper816 6 років тому

    This explained encryption better than a specialized educational course i watched about encryption.