Will Quantum Computers break encryption?

แชร์
ฝัง
  • เผยแพร่เมื่อ 19 พ.ค. 2024
  • How do you secure messages over the internet? How do quantum computers break it? How do you fix it? Why don't you watch the video to find out? Why does this description have so many questions? Why are you still reading? What is the meaning of life?
    0:00 Intro - Are we DOOOOMED??
    0:52 How NOT to Send Secret Messages
    2:09 RSA - Encryption Today
    5:19 One-Way Functions and Post-Quantum Cryptography
    7:28 Qubits and Measurement
    9:03 BB84 - Quantum Cryptography
    12:43 Alternatives and Problems
    14:26 A Case for Quantum Computing
    Facebook: / frameofessence
    Twitter: / frameofessence
    TH-cam: / frameofessence
    CLARIFICATIONS:
    You don't actually need a quantum computer to do quantum-safe encryption. As briefly mentioned at 7.04 , there are encryption schemes that can be run on regular computers that can't be broken by quantum computers.
    CORRECTIONS:
    "The public key can only be used to scramble information." (2.18) Technically, you can use any key to encrypt or decrypt whatever you want. But there's a specific way to use them that's useful, which is what's shown in the video.
    "Given a private key, it's easy to create its corresponding public key." (5.36) In RSA, depending on exactly what you mean by "private key", neither key is actually derivable from the other. When they are created, they are generated together from a common base (not just the public key from the private key). But typically, the file that stores the "private key" actually contains a bit more information than just the private key. For example, in PKCS #1 RSA private key format ( tools.ietf.org/html/rfc3447#a... ), the file technically contains the entire public key too. So in short, you technically can't get the public key from the private key or vice versa, but the file that contains the private key can hold more than just the private key alone, making it possible to retrieve the public key from it.
    Video links:
    Encryption and HUGE numbers - Numberphile
    • Encryption and HUGE nu...
    The No Cloning Theorem - minutephysics
    • The No Cloning Theorem
    Quantum Entanglement & Spooky Action at a Distance - Veritasium
    • Quantum Entanglement &...
    Sources:
    Quantum Computing for Computer Scientists
    books.google.ca/books/about/Qu...
    Random person talking about Quantum MITM attacks
    crypto.stackexchange.com/quest...
    The Ekert Protocol (i.e. E91)
    www.ux1.eiu.edu/~nilic/Nina's-...
    Annealing vs. Universal Quantum Computers
    / what-s-the-difference-...
    Images, Documents, and Screenshots:
    Post-Quantum Cryptography initiatives
    csrc.nist.gov/groups/ST/post-q...
    pqcrypto.eu.org/docs/initial-r...
    Internet map (Carna Botnet)
    census2012.sourceforge.net/
    Quantum network maps
    www.slideshare.net/ADVAOptica...
    IBM Quantum
    research.ibm.com/ibm-q/
    Music:
    TH-cam audio library:
    Blue Skies
    Incompetech:
    Jay Jay
    Pamgaea
    The House of Leaves
    Premium Beat:
    Cutting Edge Technology
    Second Time Around
    Swoosh 1 sound effect came from here:
    soundbible.com/682-Swoosh-1.html
    ...and is under this license:
    creativecommons.org/licenses/...

ความคิดเห็น • 1.8K

  • @frameofessence
    @frameofessence  6 ปีที่แล้ว +595

    CLARIFICATIONS:
    You don't actually need a quantum computer to do quantum-safe encryption. As briefly mentioned at 7:04 , there are encryption schemes that can be run on regular computers that can't be broken by quantum computers.
    CORRECTIONS:
    [2:18] Technically, you can use any key to encrypt or decrypt whatever you want. But there's a specific way to use them that's useful, which is what's shown in the video.
    [5:36] In RSA, depending on exactly what you mean by "private key", neither key is actually derivable from the other. When they are created, they are generated together from a common base (not just the public key from the private key). But typically, the file that stores the "private key" actually contains a bit more information than just the private key. For example, in PKCS #1 RSA private key format ( tools.ietf.org/html/rfc3447#appendix-A.1.2 ), the file technically contains the entire public key too. So in short, you technically can't get the public key from the private key or vice versa, but the file that contains the private key can hold more than just the private key alone, making it possible to retrieve the public key from it.

    • @sexismagainstmen4617
      @sexismagainstmen4617 6 ปีที่แล้ว +6

      um.... why can you only measure horizontally or vertically. you didnt explain that at all. you can measure in any plane.

    • @frameofessence
      @frameofessence  6 ปีที่แล้ว +26

      To keep it simpler, I only showed two orientations because that's what was relevant to explaining BB84. And to be fair, more orientations are shown at 13:04

    • @stealth9799
      @stealth9799 6 ปีที่แล้ว +11

      That is incorrect; in ECC, the private key (and one component of the public key) can be chosen at will however you want. With RSA, that would be correct; you choose information that derives both keys but with ECC, you pick a private key k (256 bits) at your own discretion. This could be from a CSPRNG, a hash of a picture of lava lamps or the user's password salted and run through a KDF. You then pick a public point G on the curve and calculate the second component of the public key, kG by "dotting" G with itself k times.
      It is easy to "dot" something with itself k times because there are shortcuts you can take but when given a starting point and an ending point, it is computationally infeasible to figure out how many times it was dotted. You have to go through and actually dot it that many times instead of using shortcuts.

    • @frameofessence
      @frameofessence  6 ปีที่แล้ว +20

      Well, this is a lot more complicated than I thought. I'll edit the original comment to be more specific to RSA. Thank you for your input.

    • @stealth9799
      @stealth9799 6 ปีที่แล้ว +11

      I just wanted to say that you did a fantastic job explaining btw. Also thanks for welcoming feedback and making corrections when new information becomes available! I wish more content creators were like you.

  • @paiovezam8533
    @paiovezam8533 4 ปีที่แล้ว +560

    Eavesdropper: This is the lock picking lawyer...

    • @Chris_Hetherington
      @Chris_Hetherington 4 ปีที่แล้ว +11

      Plot twist, LPL is actually Bosnian Bill.

    • @bestjerk
      @bestjerk 4 ปีที่แล้ว +15

      and today we are going to read people's e mails

    • @sirhootsalot2343
      @sirhootsalot2343 4 ปีที่แล้ว +19

      so we are going to use this quantum computer Bosnian Bill and I made

    • @gamermoment3708
      @gamermoment3708 4 ปีที่แล้ว +11

      "Once again an inexcusable design flaw"

    • @TECHGYVERBD
      @TECHGYVERBD 4 ปีที่แล้ว

      150 Likes!

  • @MrSeppieD
    @MrSeppieD 3 ปีที่แล้ว +717

    My answer on a computer science exam: ��������
    Teacher: What is this supposed to mean?
    Me: It's the requested 8bit answer, but expressed in qubits. It represents the correct answer if and only if you know the correct answer as well.

    • @magnitudefallout3944
      @magnitudefallout3944 3 ปีที่แล้ว +43

      that one is golden

    • @klkkloreklffd
      @klkkloreklffd 3 ปีที่แล้ว +6

      lmao

    • @4TechGuns
      @4TechGuns 3 ปีที่แล้ว +6

      The characters is actually just FFFD in hex. It's not actual qubits.

    • @mattontop
      @mattontop 3 ปีที่แล้ว +32

      @@4TechGuns Congratulations. You didn't get the joke (:

    • @justincase5272
      @justincase5272 3 ปีที่แล้ว +3

      Clever...

  • @Int8
    @Int8 6 ปีที่แล้ว +1977

    Plot twist: the server is the eavesdropper

    • @RyanTosh
      @RyanTosh 5 ปีที่แล้ว +79

      Plot twist: The eavesdropper is the server!

    • @thejurassicwarewolf3300
      @thejurassicwarewolf3300 5 ปีที่แล้ว +53

      PLOT TWIST: everyone is the evesdropper

    • @matthewstone2545
      @matthewstone2545 5 ปีที่แล้ว +37

      Plot Twist: Everyone is, YOU!!!

    • @FplusETVChannel
      @FplusETVChannel 5 ปีที่แล้ว +26

      plot twist: YOU are the eavesdropper

    • @brownieman377
      @brownieman377 5 ปีที่แล้ว +27

      Plottiest plotty plot plot plotty plot twisty twist: There is no servers or eavesdropper and there is no internet

  • @Mrkevi123
    @Mrkevi123 3 ปีที่แล้ว +272

    Me: "password123"
    Quantam CPU: "I'm about to end this man's whole career"

    • @bucket4255
      @bucket4255 3 ปีที่แล้ว +14

      Interesting...
      And what's your username?

    • @eness379
      @eness379 3 ปีที่แล้ว +20

      @@bucket4255 username123

    • @bucket4255
      @bucket4255 3 ปีที่แล้ว +1

      @@eness379 Interesting, interesting. Now, if you can't log in, it's because you may of deleted your account by accident.

    • @codythompson9973
      @codythompson9973 3 ปีที่แล้ว +4

      @@bucket4255 Interesting Interesting Interesting. Now, what is your middle user name

    • @bucket4255
      @bucket4255 3 ปีที่แล้ว +4

      @@codythompson9973 Middleusername123

  • @Thomasfrank
    @Thomasfrank 6 ปีที่แล้ว +116

    Just watched three of your videos, and I FINALLY feel like I have an at least rudimentary understanding of quantum computers (and classical logic gates to boot). Your videos are fantastic - hope to see more in the future!

    • @Ab-cj6gl
      @Ab-cj6gl 3 ปีที่แล้ว

      my man

  • @NorDank
    @NorDank 6 ปีที่แล้ว +1320

    So the devil is reading my e-mails...

    • @joseph_pokemon
      @joseph_pokemon 6 ปีที่แล้ว +23

      they are just programmers, network engineers and mathematicians that want to get rich no matter what xd

    • @PaperBagMan884
      @PaperBagMan884 6 ปีที่แล้ว +51

      Well, if by devil, you mean the NSA, FBI, other three letter agencies, then yes!

    • @ripperfisher182250
      @ripperfisher182250 6 ปีที่แล้ว +8

      Nor Dank I found this mildly humourous. 1 gold star.

    • @ReallyReal_1
      @ReallyReal_1 6 ปีที่แล้ว +8

      Nor Dank a ton of people didn't get this joke

    • @1998wiwi
      @1998wiwi 6 ปีที่แล้ว +7

      Yep. You should include a picture of a cross or something like that in all messages you send to keep that guy away.

  • @matiasl.ceballos3346
    @matiasl.ceballos3346 3 ปีที่แล้ว +51

    Even though this video is about quantum computers, the explanation about how RSA encription works is THE best i've found so far for someone with no prior knowledge. It helped me a lot, and I often show this video to people who are taking their first steps in networking.
    Great job!

    • @elbozo5723
      @elbozo5723 2 ปีที่แล้ว

      well find a new video… he doesn’t even mention the 245 byte limit on it

    • @matiasl.ceballos3346
      @matiasl.ceballos3346 2 ปีที่แล้ว +2

      @@elbozo5723 Dude, I meant it is great for an introduction for someone with no prior knowledge. Not for all the details.

    • @maywr3893
      @maywr3893 ปีที่แล้ว

      true, RSA was complicated for me before this video

  • @twilightknight123
    @twilightknight123 7 ปีที่แล้ว +902

    As a physics grad doing research in the field of quantum computing, I approve of this video.

    • @jujuyee2534
      @jujuyee2534 5 ปีที่แล้ว +33

      as an astronaut i agree with you

    • @Atul_Thakur97
      @Atul_Thakur97 5 ปีที่แล้ว +32

      as an unqualified physics student...i approve both of you to teach me physics

    • @pushqrdx
      @pushqrdx 5 ปีที่แล้ว +25

      as a human i say fuck you all 😂

    • @anandpatel1074
      @anandpatel1074 5 ปีที่แล้ว +18

      As a quantum astronaut, I approve of this comment

    • @rubenverster250
      @rubenverster250 5 ปีที่แล้ว +15

      As a hobbyist of this field. I can neither approve, nor disapprove my say. Until it is said

  • @Ze_eT
    @Ze_eT 6 ปีที่แล้ว +776

    "BECAUSE QUANTUM MECHANICS!"
    I laughed so hard.

    • @silence439
      @silence439 5 ปีที่แล้ว +23

      Ze_eTPlays It would be too hard to explain quantum mechanics in less then a hour, although he really wants to.

    • @dylanboyd8767
      @dylanboyd8767 5 ปีที่แล้ว +1

      you should see kurtzgesagt's video on quantum computers th-cam.com/video/JhHMJCUmq28/w-d-xo.html very informative

    • @ksam2000
      @ksam2000 5 ปีที่แล้ว +1

      lmao

    • @KafinSulthan
      @KafinSulthan 5 ปีที่แล้ว +1

      this could be the new: "except-wait for it-the mongols" *montage plays*

    • @tinycockjock1967
      @tinycockjock1967 4 ปีที่แล้ว +2

      Ze_eTPlays Did you laugh so hard mate? Or did you just nose-exhale?

  • @Aveikin
    @Aveikin 5 ปีที่แล้ว +8

    That was literally the best explanation of how encryption works I've ever seen. Finally I can fully understand it, thanks

  • @fye7785
    @fye7785 5 ปีที่แล้ว +2

    It's fascinating how it actually take half of the video as an introduction, well explained. Thank you.

  • @o4ugDF54PLqU
    @o4ugDF54PLqU 7 ปีที่แล้ว +774

    Your videos deserve more views. Maybe you should try making your videos' titles more descriptive because nobody would click on a video that is named "Encryption and Quantum Computers". Instead, name it something like "Will quantum computers break encryption?"

    • @frameofessence
      @frameofessence  7 ปีที่แล้ว +266

      Good idea! I'll do that.

    • @frameofessence
      @frameofessence  7 ปีที่แล้ว +258

      Thank you by the way. I was having trouble coming up with a title.

    • @boomperson818
      @boomperson818 7 ปีที่แล้ว +475

      lol i clicked because of the "Will quantum computers break encryption?"

    • @alivrah
      @alivrah 7 ปีที่แล้ว +59

      BoomPerson Same here!

    • @user-ht3tp3uj4v
      @user-ht3tp3uj4v 7 ปีที่แล้ว +19

      haha , same here
      But I didn't even clicked for the title
      I just saw it was uploaded by Frame of Essence so I clicked it

  • @burnhamaj
    @burnhamaj 7 ปีที่แล้ว +163

    That was a very well-made video. I really enjoyed it. You deserve way more views.

  • @savingsoulsociety
    @savingsoulsociety 5 ปีที่แล้ว

    Stumbled on this video today while randomly scrolling my recommended. I actually learned something quite interesting, thanks for this video, you explained how it works really well

  • @ARoundThing
    @ARoundThing 4 ปีที่แล้ว +1

    I want you to know that I thank you for making such concepts so simple. Please keep doing what you do. You have a great channel and I really wish you best of luck. Thank you.

  • @renatobritto4096
    @renatobritto4096 6 ปีที่แล้ว +409

    Shit man, this video actually made me learn something hard. I find these lacking on youtube today, thanks, love this channel.

    • @xetera
      @xetera 6 ปีที่แล้ว +6

      You must be searching for the wrongest possible things because there haven't been as many amazing educational videos like these on youtube as there are today.

    • @chinmaygupta1530
      @chinmaygupta1530 6 ปีที่แล้ว +1

      DOGGYDOGG do you know how it works? The video is a little difficult to understand, but if you know it better, why don't you make a video and enlighten us?

    • @circumplex9552
      @circumplex9552 2 ปีที่แล้ว

      @@chinmaygupta1530 deleted reply?

  • @DJaquithFL
    @DJaquithFL 6 ปีที่แล้ว +159

    Eavesdropping would become the ultimate DDoS.

    • @death_parade
      @death_parade 5 ปีที่แล้ว +1

      This comment is so underrated.

    • @kressckerl
      @kressckerl 5 ปีที่แล้ว +24

      Irl: trying to have a secret conversation with somebody, but a third guy stands behind you and making obnoxius noises evertime you try to share your public key...

    • @misceryyt2897
      @misceryyt2897 5 ปีที่แล้ว +1

      what are you talking about not all cyber crime is DDos

    • @madisonlink7141
      @madisonlink7141 4 ปีที่แล้ว +5

      @MisceryYT and Svein:
      DDoS is when you prevent a sever from communicating with its proper clients (using a distributed attack) in order to deny service.
      In the quantum security example, eavesdropping destroys the message. Therefore, distributed eavesdropping on all channels becomes a DoS attack, because servers literally cannot communicate with their clients.

    • @brazgazz
      @brazgazz 4 ปีที่แล้ว +1

      DO YOU EVE KNOW WHAT A DDOS IS?

  • @ketansaxena
    @ketansaxena 6 ปีที่แล้ว

    That is the best thing I've seen on quantum computing till now. Keep up the good work!

  • @dirm12
    @dirm12 6 ปีที่แล้ว

    I have watched so many video that attempted to explain encryption, you were the first to actually make it clear.

  • @Quick_in_and_out
    @Quick_in_and_out 6 ปีที่แล้ว +162

    So I was recently thinking to myself "will quantum computers break encryption?"
    Then I find this video a day later!
    Then I find out that your original title was "encryption and quantum computers" which I never would have clicked on!
    Good work all round

    • @danthegreat8411
      @danthegreat8411 5 ปีที่แล้ว +2

      *That's Some Magical Shit Right There!*

    • @siipi6331
      @siipi6331 2 ปีที่แล้ว

      Quantum computers will never break RLWE-based homomorphic encryption.

  • @turun_ambartanen
    @turun_ambartanen 7 ปีที่แล้ว +15

    that was the best explaination of these encryption algorithms i have ever seem!

  • @CalamityInAction
    @CalamityInAction 5 ปีที่แล้ว +17

    5:17 The eavesdropper says "F YEAH!!!"

    • @segmentsAndCurves
      @segmentsAndCurves 3 ปีที่แล้ว

      Lol I just see you in Chopin Fantaisie op 49.

    • @CalamityInAction
      @CalamityInAction 3 ปีที่แล้ว +1

      @@segmentsAndCurves Haha yeah
      It’s a great piece

  • @kepe__
    @kepe__ 2 ปีที่แล้ว

    I watched this video 3 years ago. I have been looking for it ever since. Thank you.

  • @yomanos
    @yomanos 6 ปีที่แล้ว +13

    Just found your channel, it's great! Do more videos on cryptography!

  • @Afterscience742
    @Afterscience742 7 ปีที่แล้ว +8

    First 3 CPG grey videos in a row, then Frame of Essence uploads again.
    I must be in TH-cam heaven.

  • @amartyamishra6961
    @amartyamishra6961 4 ปีที่แล้ว

    This was the best video about encryption in general, I've been looking everywhere and was confused after 4 videos till I arrived here.

  • @Hexation
    @Hexation 5 ปีที่แล้ว

    14:46-end. very inspirational! you changed the way I thought about some things like trying new things

  • @joebama7765
    @joebama7765 4 ปีที่แล้ว +189

    can't we use quantum encryption on the quantum E-mails using Quantum Nord-Quantum-VPN? lol

    • @RedGallardo
      @RedGallardo 4 ปีที่แล้ว +4

      No, it's forbidden and you'll have a camera up your butt for constant verification of you not trying to encrypt anything from people with power.

    • @joebama7765
      @joebama7765 4 ปีที่แล้ว +3

      @@RedGallardo ok

    • @kadincool
      @kadincool 4 ปีที่แล้ว

      Quantum mechanics hurt my brain

    • @joebama7765
      @joebama7765 4 ปีที่แล้ว

      @sp of course the best cola to drink while doing pc stuff

    • @saltysea3626
      @saltysea3626 4 ปีที่แล้ว

      And you are a quantum Minecraftr playing quantum Minecraft.

  • @nibblrrr7124
    @nibblrrr7124 6 ปีที่แล้ว +3

    Thanks for mentioning post-quantum cryptography (classical crypto resilient against known quantum computer attacks).
    Most tend to jump immediately to quantum cryptography, but that may only be practical in the future (if at all, for everyday use by everyone). That doesn't help against adversaries that collect your encrypted messages you're sending right now, and store them until quantum computers come around.

  • @mikaxms
    @mikaxms 4 ปีที่แล้ว +1

    This is such a great channel! Why did I get this channel recommended only now?

  • @thendog2679
    @thendog2679 6 ปีที่แล้ว +1

    Love your hard work and information you put into your animations! I see big sub potential here! :)

  • @kingbobthepimp
    @kingbobthepimp 7 ปีที่แล้ว +208

    Because Math

    • @frillneckedlizard8529
      @frillneckedlizard8529 6 ปีที่แล้ว +2

      kingbobthepimp it is actually pretty easy

    • @yegfuf
      @yegfuf 6 ปีที่แล้ว +4

      Because quantum mechanics

  • @arock9529
    @arock9529 3 ปีที่แล้ว +5

    lol just before the second “ARE WE DOOOOOMED?” ,the eavesdropper goes “YEA!”

    • @arock9529
      @arock9529 7 หลายเดือนก่อน

      damn this was 3 years ago

  • @StatisticallyChallenged
    @StatisticallyChallenged 4 ปีที่แล้ว

    The videos visuals were so simple to understand alongside the commentary. Awesome Job!

  • @kiddicarus
    @kiddicarus 5 ปีที่แล้ว

    We found this video, as well as many of the comments below, to be both educational and quite enjoyable. Thank you very much.

  • @ScienceAsylum
    @ScienceAsylum 7 ปีที่แล้ว +194

    Great video! You going to VidCon this year?

    • @frameofessence
      @frameofessence  7 ปีที่แล้ว +19

      Thanks! I can't go this year... maybe the next?

    • @ScienceAsylum
      @ScienceAsylum 7 ปีที่แล้ว +14

      Bummer. I only ask because I'm going this year... FINALLY!

    • @frameofessence
      @frameofessence  7 ปีที่แล้ว +12

      +The Science Asylum Darn, would have been nice to meet you!

    • @ScienceAsylum
      @ScienceAsylum 7 ปีที่แล้ว +11

      Yeah, I should have gone last year. I'm hoping to "network" this time. We'll see...

    • @lua-in2sl
      @lua-in2sl 6 ปีที่แล้ว

      The Science Asylum w

  • @melody_florum
    @melody_florum 5 ปีที่แล้ว +9

    5:14 the fact that the server is surprised is so cute

    • @circumplex9552
      @circumplex9552 2 ปีที่แล้ว

      And the eavesdropper says "F YEAH!" for a frame

  • @VincentDoesThings
    @VincentDoesThings 5 ปีที่แล้ว

    I like that you simplified this in a way that 2019 nerds can enjoy. Very fascinating topic!

  • @zotac1018
    @zotac1018 5 ปีที่แล้ว

    I was studying its systems as part of my high school project.
    The way you explained encryption was better than any book I hac\ve ever read.

  • @nfistfu
    @nfistfu 5 ปีที่แล้ว +5

    The "Are we DOOMED????" animation is my spirit animal.

  • @benjaminbrady2385
    @benjaminbrady2385 7 ปีที่แล้ว +5

    Nice description btw

  • @gunjanshuvro3427
    @gunjanshuvro3427 4 ปีที่แล้ว

    Wow.... This is one of the best videos out there. Thanks Philip 😇

  • @786sado786
    @786sado786 6 ปีที่แล้ว

    subscribed, checked your other videos and love the humor! keep up the work!

  • @OnlyMisery
    @OnlyMisery 4 ปีที่แล้ว +25

    "I used the quantum to destroy the quantum"

  • @violetlavender9504
    @violetlavender9504 6 ปีที่แล้ว +21

    Lemme get a Supersingular Isogeny Diffie-Hellman Key Exchange with extra sauce

  • @zhaoxunyan4016
    @zhaoxunyan4016 6 ปีที่แล้ว

    Thank you for this video! Now I understand RSA perfectly!

  • @Hisham1097
    @Hisham1097 6 ปีที่แล้ว

    You earned a new subscriber. Great work. Keep it up. Hoping for more videos

  • @WoFDarkNewton
    @WoFDarkNewton 4 ปีที่แล้ว +3

    13:36 "You need to sacrifice a *BIT* more information" XD

  • @sebastianelytron8450
    @sebastianelytron8450 6 ปีที่แล้ว +235

    Frame of Essence would be a sick name for a progressive metal band!

    • @MetaDecker
      @MetaDecker 6 ปีที่แล้ว +12

      Because Math would be a good 80's retro electro-synth band name

    • @TakiRyuujin
      @TakiRyuujin 6 ปีที่แล้ว +15

      Make it Flame of Essence

    • @abyssstrider2547
      @abyssstrider2547 6 ปีที่แล้ว +2

      zztop3000 Nah, it sounds delicate, soft, emotional, basically beautiful!

    • @RandomNullpointer
      @RandomNullpointer 6 ปีที่แล้ว +1

      u mean sicc

    • @htf5555
      @htf5555 5 ปีที่แล้ว

      Evanescence

  • @JulianBabad
    @JulianBabad 6 ปีที่แล้ว +2

    This video just got you a new subscriber. Excellent

  • @epichaxer2265
    @epichaxer2265 5 ปีที่แล้ว +1

    Damnnn Sonn i never imagined my brain would ever comprehend let alone understand that stuff...Thank u sooo much

  • @bryanchu5379
    @bryanchu5379 7 ปีที่แล้ว +3

    BACK AT IT AGAIN

  • @tfr
    @tfr 5 ปีที่แล้ว +10

    4:00 When you put a key in a box and lock it with a different key. 😏

  • @hashemamireh
    @hashemamireh 6 ปีที่แล้ว

    I love how you used the Richard Feynman analogy for heaven and hell at the end!

  • @whoofianbrony8804
    @whoofianbrony8804 5 ปีที่แล้ว

    This is a very good explanation of the concepts behind Transport Layer Security (TLS), the thing which kicks in when you have https configured correctly

  • @Alice_Fumo
    @Alice_Fumo 7 ปีที่แล้ว +49

    I'm seeing a massive problem with preserving the superposition of a qbit in online conversation:
    online conversations are done over several servers (ones own ISP servers, the ISP servers of the person you're interacting with)
    How could those qbits even be passed down between those servers without being measured? how does one of the servers even know which info to send to the next computer without measuring it? Wouldn't it have to be measured there?
    What this problem would require to be solved is that the info of the input buffer can be moved to the output buffer without being looked at.
    I guess a functional quantum computer simply implies that this issue is already figured out.
    A current computer in order to do that would read the information at the input memory location and put those values at another location and then delete the information at the input buffer.. or just leave it there and the next batch of input will just override it - whatever! - a quantum computer can move data around between memory areas without looking at them. I think that is an interesting thing to figure out on the physical side of making a quantum computer.
    At least there's the implication that all computers inbetween have to be quantum computers, thus I expect quantum computers to use their own IP range when they're a thing.
    Edit: Damn, the video kind of covered that this is not currently a problem. (Except that superpositions can't 100% accurately be transmitted all the time)

    • @frameofessence
      @frameofessence  7 ปีที่แล้ว +15

      I'm not really sure how this would work. Maybe the destination could be encoded in a header which is expected to be measured, leaving the rest of the message alone. It would preserve the superpositions in the message while still letting each node figure out where to send it.

    • @TheDuckofDoom.
      @TheDuckofDoom. 6 ปีที่แล้ว +6

      I have no idea how qbits could be transferred long distances[even a few meters], most of the current Qcomputing information indicates that Qcomputers are more of an accelerator, like a GPU, always attached to a normal computer.

    • @TheAkashicTraveller
      @TheAkashicTraveller 6 ปีที่แล้ว +1

      Frame of Essence
      Yeah but the qbits would by physical particles moving at the speed of light you're simply not going to have enough time to choose.

    • @bernhardtrian7471
      @bernhardtrian7471 6 ปีที่แล้ว

      this conversation ...... no one knows how the communication and decryption would work in wide areas , this is yet unsolved I think , even with all the protocols and information tables ( arp )

    • @roboticunclephil
      @roboticunclephil 6 ปีที่แล้ว +1

      headers is how current encrypted packets between servers are secured, why wouldn't it be different?

  • @HarshYadav-cj3yu
    @HarshYadav-cj3yu 4 ปีที่แล้ว +4

    6:00 using throttling on the network to slow it down may help evesdropper to have enough time to decrypt them.

    • @cassiopeia_real
      @cassiopeia_real 2 ปีที่แล้ว

      i think it takes more time than the heat death of the universe, dont quote me on that though

  • @DrakiniteOfficial
    @DrakiniteOfficial 5 ปีที่แล้ว

    I actually never understood exactly how public and private keys worked until this video. I swear I've watched like 4 or 5 before this one. Great explanation.

  • @YalnYALNIZ
    @YalnYALNIZ 5 ปีที่แล้ว

    English isn't my primary language but i understand it easily without any problem.
    You tell them so pure. Thanks.

  • @purewaterruler
    @purewaterruler 7 ปีที่แล้ว +3

    you might want to link to numberphile video in the description.

  • @giu1644
    @giu1644 6 ปีที่แล้ว +10

    A question I expected the answer to (and didn't get) was why quantum computers are good against traditional cryptography, so I guess a follow up on Shor's algorithm would be great!

    • @frameofessence
      @frameofessence  6 ปีที่แล้ว +5

      That would be way too complicated for me! PBS infinite series did a good summary of it though:
      th-cam.com/video/12Q3Mrh03Gk/w-d-xo.html
      th-cam.com/video/wUwZZaI5u0c/w-d-xo.html

  • @Mr_SSK
    @Mr_SSK ปีที่แล้ว

    Thank you so much! :)
    Such a nice explanation!

  • @mateolaguna6542
    @mateolaguna6542 6 ปีที่แล้ว

    Such a great video! You make easy to understand topics that are really hard. Thks!!

  • @GameCyborgCh
    @GameCyborgCh 4 ปีที่แล้ว +21

    0:39 someone will compile and run DOOM on it, I guarantee it

    • @eness379
      @eness379 3 ปีที่แล้ว

      why doom

    • @GameCyborgCh
      @GameCyborgCh 3 ปีที่แล้ว +2

      @@eness379 because the doom source code is available to the public and there are nutcases who port it to anything including a toaster

    • @eness379
      @eness379 3 ปีที่แล้ว

      @@GameCyborgCh i thought it was because it takes a long time to compile it

    • @GameCyborgCh
      @GameCyborgCh 3 ปีที่แล้ว

      @@eness379 a 27 year old game won't take long to compile

    • @yashagarwal8249
      @yashagarwal8249 3 ปีที่แล้ว +1

      Yes, i saw one recently made to run on a pregnancy test (yes the kind that is peed on)

  • @turboshamu
    @turboshamu 7 ปีที่แล้ว +5

    OMG your video is so Goood!!! >

  • @WannabeCanadianDev
    @WannabeCanadianDev 6 ปีที่แล้ว

    I'm mainly here for the primer on RSA, had to watch a couple of times but it's very useful!

  • @memb.
    @memb. 6 ปีที่แล้ว

    wait you only have 42k subs? woah, keep the work, you're going to get big :)

  • @kadincool
    @kadincool 4 ปีที่แล้ว +5

    We could send back-and-forth dead memes on lots of lines lots of times per second so the evesdropper is more likely to find dead memes instead of private information 😂

  • @bernhardtrian7471
    @bernhardtrian7471 6 ปีที่แล้ว +19

    15:24 hahahaha "in that moment he knew , he f@'*ed up " .... everything for nothing

  • @MrSonny6155
    @MrSonny6155 5 ปีที่แล้ว

    When a random video on TH-cam discussing a random topic explains public and private keys better than your computer science teacher or textbook. And that segment is literally the introduction.
    I could have used that explanation half a year ago, because some teachers don't really teach to well.

  • @piglauhk1
    @piglauhk1 6 ปีที่แล้ว

    Study for years , first time for me to understand what does private key and public key works. Thanks

  • @chingmuikwok5377
    @chingmuikwok5377 5 ปีที่แล้ว +9

    did you guys see the"F yeah"?

  • @elrymemakecontent2610
    @elrymemakecontent2610 4 ปีที่แล้ว +6

    me write a scramble on my test paper
    my teacher : tf is this?
    me : this answer has been encryption

  • @peschebichsu
    @peschebichsu 3 ปีที่แล้ว +1

    6:58 would be nice to have a video about these topics and also generaly an update on how thing developed in the last yesrs. Great video though!

  • @goldenfire6421
    @goldenfire6421 6 ปีที่แล้ว

    Thanks! This is really simple (enough for me to understand). Great video!

  • @Yamyatos
    @Yamyatos 7 ปีที่แล้ว +5

    It was nicely animated and explained. Sadly i didnt learn anything new in the first 7 or so minutes.
    Second half was totally awesome in both regards tho :)
    But, isnt this actually a huge problem? In reality, quantum computers would arrive before we have proper ways to protect ourselves against them, wouldnt they? Because they can be used to decrypt in our current system, but in order to protect us against these attacks, we need a quantum "internet", dont we? So, wouldnt it take years to build the infrastructure needed to protect us against spying quantum computers?

    • @frameofessence
      @frameofessence  7 ปีที่แล้ว +4

      That's why we need Post-Quantum Cryptography, so we can be protected from quantum computers on existing infrastructure.

    • @Yamyatos
      @Yamyatos 7 ปีที่แล้ว +1

      But isnt there a huge problem with post-quantum cryptography?
      If i understood this correctly, for post-quantum cryptography we need to send qubits, which is not possible on our current infrastructure (which is designed for electricity, thus bits). On the other hand, a quantum computer is all you need to break current encryptions.
      Doesnt that mean that, as soon as the first general purpose quantum computer is build, we are not able to guarantee the security of our messages anymore, while the "solution" to this problems might take years or decades to arrive? Building new infrastructure is no joke. It wont happen over the night. And we will probably only start building it as a reaction to the new threat, which would be way to late. Am i missing something?

    • @frameofessence
      @frameofessence  7 ปีที่แล้ว +6

      You're thinking of "Quantum Cryptography", which is cryptography using qubits. "Post-Quantum Cryptography" is cryptography that works on existing infrastructure that quantum computers can't break, like the ones in 7:06 . ...which is kind of weird since it means that Post-Quantum will probably get implemented before Quantum?

    • @SeriousGamingSteam
      @SeriousGamingSteam 6 ปีที่แล้ว

      Frame of Essence w8 w8 w8, but what about our computers themselves? They cant use quantum cryptography can they? Because if they can, then what the fuck are we so afraid for? And if they can't, don't that mean they can (obviously, but this needs to be said) also not do post-quantum cryptoghrapy?

    • @SeriousGamingSteam
      @SeriousGamingSteam 6 ปีที่แล้ว

      Frame of Essence w8, now that I read your comment again, I guess that's kinda what you said. Right? And if not, then what do you think about it?

  • @augustinius6586
    @augustinius6586 6 ปีที่แล้ว +20

    How do you send qubits?

    • @frameofessence
      @frameofessence  6 ปีที่แล้ว +25

      +August Inius Send particles of light through a fibre optic cable that preserves polarization

    • @ProFow
      @ProFow 6 ปีที่แล้ว +5

      Frame of Essence What about WiFi, does air preserve polarization? Also will we stay in the 2.4 GHz and 5 GHz band or does it only work with visible light?

    • @Shadow77999
      @Shadow77999 6 ปีที่แล้ว +2

      Combat Arms Fownage we are gonna need disco balls

    • @najgauner
      @najgauner 5 ปีที่แล้ว +4

      by sending 20 BTC on this bitcoin address: 23568853119

    • @Cd5ssmffan
      @Cd5ssmffan 5 ปีที่แล้ว +2

      najgauner send me 50 qubitcoins instead

  • @doctoroctopi5687
    @doctoroctopi5687 5 ปีที่แล้ว

    why does this channel not have more subs this is some quality content

  • @Reneator
    @Reneator 5 ปีที่แล้ว

    Really good explanation. Really good video. Got a new subscriber!

  • @madcat789
    @madcat789 5 ปีที่แล้ว +57

    I can't wait to be shitposting on my Dell Quantum XP100K.

    • @mickeydee9069
      @mickeydee9069 4 ปีที่แล้ว +5

      *Q U A N T U M SHITPOSTING*

    • @circumplex9552
      @circumplex9552 2 ปีที่แล้ว

      There are gonna be so many memes about this exact thing when quantum computers become mainstream

  • @phizzhead53
    @phizzhead53 6 ปีที่แล้ว +10

    actually you can send polarised light over a fiber optic conection which would work as a qbit

    • @christoffer4862
      @christoffer4862 6 ปีที่แล้ว

      Phizzhead This is true, however the polarization of light can be measured exactly and retransmitted. The security implication is a vulnerability to eavesdropping. You can't use polarized light, some other type of qubit must be used for security applications.

    • @qwerty687687
      @qwerty687687 6 ปีที่แล้ว

      You can use polarized light, you just need two distinct ways to measure it. You can use horizontal and diagonal, if the light comes through, it's a one, if it's blocked it's a zero. If you used diagonal and the other person measures horizontally, the photon will randomly come through or not. Send a photon, have the receiver guess in which direction to measure it and compare it to the direction you originally used, just as it's described in the video.

    • @christoffer4862
      @christoffer4862 6 ปีที่แล้ว

      qwerty687687 But an eavesdroppper can measure the exact polarization of the light and then retransmit an identical pulse. There's no issue in using a semi-polarized detector.

    • @qwerty687687
      @qwerty687687 6 ปีที่แล้ว +2

      No he can't. The sender either polarizes the light "upright" (horizontally or vertically) or diagonally (top left to bottom right or top right to bottom left). So you as the receiver set up your polarization filter horizontally. If the light has been polarized in the horizontal direction, you always measure a photon coming through, that's a one. If the photon was polarized vertically, you always measure no photon coming through, that's a zero. If the photon was polarized along one of the two diagonal directions, you have a 50% chance to get either a one or a zero. Or you set up your filter in one of the diagonal directions, then the same thing applies.
      You don't know in which of the two systems (straight or diagonal) the light was originally polarized, so you have to guess. After measuring, you can compare your filter settings with the sender, so the photons where both of you used the same setting can be used for encryption. The important part is, when you measure horizontally polarized light in a diagonal direction, it will change its polarity to the direction you measure it in, when it's then measured again horizontally, you get the same result as if the light has always been polarized diagonally, namely a 50% chance of zero or one.
      When an eavesdropper interferes, he also has to guess which filter setting to use. When he uses a wrong setting where you used the right one, there is a 50% chance that his measurement gives him a different result than the sender intended. Additionally, he forces the polarization that he measured onto the photon, so that you have a n additional 50% chance to measure a wrong polarization, even though your filter setting were correct, so that you cannot decrypt the message. This way, you can not only keep the eavesdropper out, you also know that there is an eavesdropper at all.

    • @christoffer4862
      @christoffer4862 6 ปีที่แล้ว

      qwerty687687 I think it is possible to develop a polarization filter that is linearly/radially/angularly differently polarized along its plane. But as you say, that would not compromize single photons. But if a light pulse in practice would signal a Qubit, then I think it is possible to eavesdrop.

  •  6 ปีที่แล้ว

    Best explanation of RSA I've ever seen.

  • @thetuxguy5438
    @thetuxguy5438 3 ปีที่แล้ว +1

    I have no idea why I like to watch these types of videos but I like them

  • @georgeelsham
    @georgeelsham 6 ปีที่แล้ว +6

    I expect this from 500k+ subs channel

  • @romand271
    @romand271 7 ปีที่แล้ว +5

    well the question hasn't been answered yet
    what is the meaning of life after all?

    • @DarkSideSixOfficial
      @DarkSideSixOfficial 6 ปีที่แล้ว +3

      To live and be love. But more specifically, to do so while progressing mankind and protecting the planet and living things that's made our existence possible.

    • @computronium8
      @computronium8 6 ปีที่แล้ว

      We're not ones and zeros as people usually said, we are qubits and everyday we're discovering and measuring ourselves. The journey itself is the meaning of life

    • @starcubey
      @starcubey 6 ปีที่แล้ว +1

      ...or to follow God and be a disciple instead of following your sinful desires, but you don't have to agree with any of the responses to this comment because it is based on religion (except for 42 because it is the definitive answer).

    • @Inertia888
      @Inertia888 6 ปีที่แล้ว

      x=42

    • @trispectre8366
      @trispectre8366 6 ปีที่แล้ว

      ^^

  • @nwoDekaTsyawlA
    @nwoDekaTsyawlA 5 ปีที่แล้ว

    Kudos for making a very informative and interesting video about this topic.

  • @RandomNullpointer
    @RandomNullpointer 6 ปีที่แล้ว

    love the graphics. many thanks to your efforts

  • @bonelesscommunism4031
    @bonelesscommunism4031 5 ปีที่แล้ว +3

    Okay so can it run games like hella fast or..?

    • @theramendutchman
      @theramendutchman 5 ปีที่แล้ว

      Well games have to be specifically compiled (as always) for qubits, but they also need to be coded differently and whole different kinds of code libraries and frameworks are neccesary.
      So right now? No. In the future? We'll laugh at the consoles 'still' using 128-normal-bit architecture!

  • @Itsmebsg
    @Itsmebsg 6 ปีที่แล้ว +14

    How would quantum computing affect bitcoin mining???

    • @britannio
      @britannio 6 ปีที่แล้ว +1

      Rigged Astro you just get lots of bitcoin until everyone has one

    • @manu144x
      @manu144x 6 ปีที่แล้ว +10

      You can guess the password for any private address and start transfering them.
      The public key is the address and the private key is the password. It makes the entire bitcoin network useless within seconds.

    • @endintiers
      @endintiers 6 ปีที่แล้ว +2

      With a quantum mining algorithm you could corner the market (except for other people doing the same). Non-quantum mining would become uneconomic.
      If someone controls more than I think 40% of the mining they can break/cheat the system.
      The big problem is that the PPK pairs used to prove identity can be broken so you can't safely send/receive coins. Without quantum encryption Bitcoin (and other value exchange) exchange dies.

    • @Shadow77999
      @Shadow77999 6 ปีที่แล้ว

      Emanuel Gug so bitcoin will finally crash but, thx to quantum computing, not something else, interesting

    • @con_boy
      @con_boy 4 ปีที่แล้ว

      It immediately invalidates their value

  • @prerakgames4668
    @prerakgames4668 4 ปีที่แล้ว

    I love the way the easedroper says come on when you said he needs to break the laws of physics to do so

  • @srimanth.y
    @srimanth.y 6 ปีที่แล้ว

    Keep Doing this kind of stuff. I really liked it. Thanks a lot.

  • @snrd
    @snrd 7 ปีที่แล้ว +5

    Please give me a Patreon page or something where I can donate.

    • @silence439
      @silence439 5 ปีที่แล้ว

      I agree with you. This person is awesome

  • @nicklaich
    @nicklaich 5 ปีที่แล้ว +11

    TLDR: unless we have quantum network, we are doomed. haha.

  • @osamazaid25
    @osamazaid25 6 ปีที่แล้ว

    Wow! one of the best video's I have ever seen about encryption.

  • @FullMetal-nu8bj
    @FullMetal-nu8bj 6 ปีที่แล้ว

    I googled Bells Theorem and Quantum Entanglement... took me on an hour derail to realize how much I don't know.
    Amazing video.

  • @zictrox
    @zictrox 4 ปีที่แล้ว +7

    Who's here after Google attains 'quantum supremacy'?

  • @peterstiles1
    @peterstiles1 6 ปีที่แล้ว +40

    12:35 "...hopefully the eavesdropper will respect your privacy..." BWAHAHAHA...the NSA and the 5 eyes...HAHA...respect your privacy...HAHAHA! : (

    • @Bulbophile
      @Bulbophile 5 ปีที่แล้ว +1

      Benign listening in isn't the security threat; but is there such a thing as benign eavesdropping? By its nature, it's an intrusion on privacy with mal intent. From governmental sides; corporate; or personal, listening in gives the undue right to sway, steal, and hurt respectively. For eg sake only, of course. Did anyone ever hear anybody say they're going to interfere with xyz's communications to help them? Maybe only in the arena of my enemies' enemy is my friend.

  • @nilsb.4199
    @nilsb.4199 2 ปีที่แล้ว

    I was happy to finally understand regular encryption... Now I have a long way to go before understanding quantum encryption

  • @NotLegato
    @NotLegato 6 ปีที่แล้ว

    oh wow, the key/padlock analogy was great.