What is Quantum Cryptography?

แชร์
ฝัง
  • เผยแพร่เมื่อ 16 ก.ค. 2024
  • GET NORDVPN: nordvpn.org/sabine
    USE COUPON CODE: sabine
    USE THE CODE SO YOU CAN GET 68% off 2-year plan + 1 additional month FREE.
    You can learn more about NordVPN on their TH-cam channel: / @nordvpn
    Note: At 7 min 52 secs "vertical direction" should have been "horizontal direction", sorry about that :/
    In this video I explain how public key cryptography works on the internet today, using RSA as example, what the risk is that quantum computers pose for internet security, what post-quantum cryptography is, how quantum key distribution works, and what quantum cryptography is.
    0:00 Intro
    0:31 Public Key Cryptography
    2:43 Risk posed by Quantum Computers
    4:03 Post Quantum Cryptography
    5:31 Quantum Key Distribution
    10:25 Quantum Cryptography and Summary
    11:16 NordVPN Sponsor Message
    12:28 Thanks
    Sound from zapsplat.com
    #physics #science #quantum
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 455

  • @SabineHossenfelder
    @SabineHossenfelder  3 ปีที่แล้ว +32

    GET NORDVPN: nordvpn.org/sabine
    USE COUPON CODE: sabine
    USE THE CODE SO YOU CAN GET 68% off 2-year plan + 1 additional month FREE

    • @malekmannai9445
      @malekmannai9445 3 ปีที่แล้ว +1

      Import remark: we still are not sure about P being different from NP, not to mention if breaking specific cryptosystems is in fact hard problem or not.

    • @NeinStein
      @NeinStein 3 ปีที่แล้ว

      @@malekmannai9445 Certainly some people know how some "hard problems" can be solved easily. Like the NSA messing with the crypto standards around ellipctic curves, making it easier to decrypt cipher texts encrypted by them. At least to those who know the weaknesses. Which would be the NSA and certainly a bunch of others.

    • @Z-Diode
      @Z-Diode 3 ปีที่แล้ว +1

      Mullvad and OVPN for real privacy.

    • @malekmannai9445
      @malekmannai9445 3 ปีที่แล้ว

      @@NeinStein "Certainly some people know how some "hard problems" can be solved easily". By "hard problems" I mean NP-hard problem which are at least NP-complete. If any hard problem is easily solved, that means P=NP and no crypto-system will ever be efficient.

    • @csehszlovakze
      @csehszlovakze 3 ปีที่แล้ว +4

      you just discredited your entire video with the ScamVPN shilling. They definitely keep logs and are not transparent about security issues, and when they get called out 2 years later they shift the blame to someone else.
      watch The Hated One's recent video on why VPN's are worthless for privacy.

  • @samykamkar
    @samykamkar 3 ปีที่แล้ว +38

    Great video, thank you for the explanation! One thing to note is that quantum key distribution (QKD) is not safe and does not offer any security from Eve in its current form. The problem with QKD by itself is that Eve (misleading as she is not a passive eavesdropper but rather an active participant; Mallory would be the more appropriate name for an active, malicious attacker) can perform an active man (person!) in the middle attack (MITMA). If she pretends to be Bob and measures every bit, and also receives the information on the directions, she recovers Alice's entire key. It's true it would be difficult for Eve to cause Bob to receive the same key, but that's not necessary. Eve can generate an entirely new key and send it to Bob, pretending to be Alice, and then send her own directions for the new key to Bob. Now Alice-Eve have a key and Eve-Bob have a different key. When Alice encrypts a message, Eve can intercept it and decrypt it with Alice's key, then re-encrypt with Bob's key and send to Bob, and vice-versa. Both sides will have entirely different keys yet believe they are talking to the other party because there is no way to authenticate the other party. It was noted that Alice and Bob can communicate across a separate channel for some information, however if the dependence of the security is through a separate channel that is guaranteed to be authenticated (you know for a fact you're communicating with the other party), you would already have needed to establish a key with the person to ensure that guarantee! If you simply sent it over yet another unencrypted channel, there is no reason it could not be intercepted and thus continue to perform the MITMA. The video was a great explanation however, thank you!

    • @slicedtoad
      @slicedtoad ปีที่แล้ว +1

      Thanks for this comment. I had an inkling that something like this could be done, but your comment explained it very well.
      In practice though, the fact that the second channel can be unencrypted (public) makes it much harder to run a MITMA, no? The attacker would have to show both parties different results to a publically queryable server. And you can add a couple of redundant channels for verification. That would require the attacker have complete control of one party's computer or internet connection and the ability to intercept and change packets on the fly from any number of sources in any number of formats.
      An approach not unlike multi-factor authentication should make this kind of attack impractical in the extreme. Especially since it has to be done in real-time.

    • @yolanankaine6063
      @yolanankaine6063 ปีที่แล้ว

      Excellent analysis. Thank you

    • @JohnSmith-ys4nl
      @JohnSmith-ys4nl ปีที่แล้ว

      You're right it's not secure. Besides the authentication problem you mentioned, another issue is it's very difficult to engineer it so that the whole system has a (provable) "security reduction" to its quantum properties. The NSA wrote an essay a number of years ago warning people in industry not to trust it and outlined 5 major problems with it. Regarding engineering, they said the following:
      "The actual security provided by a QKD system is not the theoretical unconditional security from the laws of physics (as modeled and often suggested), but rather the more limited security that can be achieved by hardware and engineering designs. The tolerance for error in cryptographic security, however, is many orders of magnitude smaller than in most physical engineering scenarios making it very difficult to validate. The specific hardware used to perform QKD can introduce vulnerabilities, resulting in several well-publicized attacks on commercial QKD systems."
      In other words, it is very difficult to design a QKD system that its designers can prove is doing only what it is supposed to be doing.

  • @notlessgrossman163
    @notlessgrossman163 3 ปีที่แล้ว +53

    Seeing a new video from Sabine made my morning so much more interesting. Please keep making these videos ..

    • @nziom
      @nziom 3 ปีที่แล้ว +1

      Same I like her videos

    • @monicamir
      @monicamir 3 ปีที่แล้ว +1

      She is into charlatanism as heck.
      There's no such thing as quantum cryptography. They will use your brain and cyber attack people as much as they please.
      Those people are a deep well of intellectual dishonesty.
      Don't let them fool you. They don't have any fine mathematician in their projects.
      This woman is deep into falsehood like other workers at big tech giants.
      This woman is just one more lost soul worried about her silhouette, that is the digital model of her mind.
      This would make a mathematician laugh , if he/she did not know those people are committing crimes against humanity.
      There must be a military court to judge their crimes and this is urgent.
      They are killing and torturing lots of people worldwide including children.
      Julian Assange did not have the opportunity to see this and now he is in Belmarsh being tortured by Flat Earth people like this woman here.
      Had he the opportunity to see what those people are doing he would not have the chance to blow his whistle on those crimes. They are worse than those videos of war crimes in Iraq he exposed on his site.

    • @frankdimeglio8216
      @frankdimeglio8216 2 ปีที่แล้ว

      @@monicamir She is lying about physics. WHY E=MC2 IS NECESSARILY AND CLEARLY F=MA ON BALANCE:
      Energy has/involves GRAVITY, AND ENERGY has/involves inertia/INERTIAL RESISTANCE. C4 is the proof of the fact that E=mc2 IS F=ma ON BALANCE. This explains the fourth dimension. TIME is NECESSARILY possible/potential AND actual IN BALANCE, AS E=MC2 IS F=MA ON BALANCE; AS ELECTROMAGNETISM/energy is gravity !!! The stars AND PLANETS are POINTS in the night sky. E=MC2 IS F=ma. ("Mass"/ENERGY IS GRAVITY. ELECTROMAGNETISM/energy is gravity.) The EARTH/ground AND what is THE SUN are CLEARLY (on balance) E=MC2 AS F=ma. TIME dilation ULTIMATELY proves ON BALANCE that E=MC2 IS F=ma IN BALANCE, AS ELECTROMAGNETISM/energy is gravity !!! (Gravity IS ELECTROMAGNETISM/energy.) The sky is blue, AND THE EARTH is ALSO BLUE. The stars AND PLANETS are POINTS in the night sky. E=MC2 IS F=ma ON BALANCE. Great !!! This NECESSARILY represents, INVOLVES, AND DESCRIBES what is possible/potential AND actual IN BALANCE, AS ELECTROMAGNETISM/energy is gravity. GRAVITATIONAL force/ENERGY IS proportional to (or BALANCED with/as) inertia/INERTIAL RESISTANCE, AS E=MC2 IS F=ma; AS ELECTROMAGNETISM/ENERGY IS GRAVITY. Gravity/acceleration involves BALANCED inertia/INERTIAL RESISTANCE, AS E=MC2 IS F=ma ON BALANCE; AS ELECTROMAGNETISM/energy is gravity !!! It all CLEARLY makes perfect sense. BALANCE AND completeness go hand in hand.
      By Frank DiMeglio

  • @KeithCooper-Albuquerque
    @KeithCooper-Albuquerque 3 ปีที่แล้ว +64

    As a retired programmer who dealt with encryption techniques, I'm relieved to hear of this new encryption method! Your english is fine, Sabine!

    • @tetraedri_1834
      @tetraedri_1834 3 ปีที่แล้ว +6

      @Jeffrey Christopher Not any encryption scheme, Sabine even says in the video that there are schemes which currently are believed to be secure against quantum computers. Quantum computers aren't supercomputers on steroids, they just happen to get significant computational advantage on tasks they can use entangled bits to their advantage.

    • @tetraedri_1834
      @tetraedri_1834 3 ปีที่แล้ว +3

      @Jeffrey Christopher I must admit that I'm just a former physics student, but in one course we were introduced to quantum computing. You can't just take classical algorithm (even fully parallelizable one), give it to quantum computer and expect it to run faster. That's not how qubits work, although it's a common misconception. You need to work within limitations of quantum physics, i.e. what entanglement allows you to achieve. In addition, you need to take stability of your algorithm into account for practical implementations -- for example, Shor's algorithm for factorising numbers is unstable, thus unreliable for large numbers unless quantum computer can be made robust against noise and decoherence.
      To be clear, I'm not saying that quantum computing isn't a threat to security. It is, but cryptography is not doomed because of that.

    • @tetraedri_1834
      @tetraedri_1834 3 ปีที่แล้ว

      @Jeffrey Christopher I haven't heard of such encryption before, interesting! I this can't say anything about such encryption, unfortunately.
      Nevertheless, quantum computers will most likely be used together with classical computers in most commercial applications. Before we get any quantum computing units into our computer chips, all the quantum computing will take place remotely, as keeping quantum computers stable with current technology need near absolute zero temperatures. However, in mateial research quantum computers will be very valuable. It has been estimated that 100 qubits is enough to surpass current supercomputers in stimulating fermionic and bosonic interactions.

    • @BOMEISTER2000
      @BOMEISTER2000 3 ปีที่แล้ว +1

      @@tetraedri_1834 Yep good point on Shor's, it's eye-opening to say there might be more algorithms out there, but they prove elusive to find. Shor's is like 20+ years old now and we still have not made much headway in that domain. It will be interesting to see if we can find some better tricks utilising quantum logic but it's proving hard. It might not even happen at all. The whole argument rests on Shor's and a small scale factorisation test that proved it can work on a real quantum computer. Regardless, it's a risk that is real and measurable. In the end of the day, the affected technologies are key distribution (discrete log stuff) but OTP such as AES @ 192 bits is pretty much bulletproof even with a reliable QC and Grovers Alg.

    • @teaser6089
      @teaser6089 3 ปีที่แล้ว

      @astroj Not any encryption, Quantum Computers are really good at very specific calculations, but they'll never replace the normal computer.

  • @msw0011
    @msw0011 3 ปีที่แล้ว +16

    Hello there Sabine. Excellent presentation. Thank you for explaining this complicated topic in easy to understand language.

  • @dennisdonovan4837
    @dennisdonovan4837 3 ปีที่แล้ว +7

    This will definitely be part of my “TH-cam Reference Library” … Thanks for the brevity and clarity of a very “entangled” topic … ❤️👏🏽❤️

  • @sunuv2guns
    @sunuv2guns 2 ปีที่แล้ว +2

    I appreciate all the hard work that must go into making something as complicated as this look easy. Great content!

  • @leybourne
    @leybourne 3 ปีที่แล้ว +4

    My favourite science communicator! Sabine, you are just amazing, and subscribing for your videos was one of the best things I have ever done on TH-cam!

  • @foxabilo
    @foxabilo 3 ปีที่แล้ว +176

    "HAHAHA, PHYSICS HUMOR 😐"

    • @mdmohiuddin7089
      @mdmohiuddin7089 3 ปีที่แล้ว

      :3

    • @ernobuzas9381
      @ernobuzas9381 3 ปีที่แล้ว +3

      That was perfect!

    • @drdca8263
      @drdca8263 3 ปีที่แล้ว +8

      I thought that comment a little surprising because I don’t think the naming convention was created by physicists? I thought it was, well, cryptographers.
      But maybe early crypto papers were written by people who were also physicists?

    • @DianelosGeorgoudis
      @DianelosGeorgoudis 3 ปีที่แล้ว +2

      I've always thought they picked "Eve" because it sounds like "evil".

    • @rherbert57
      @rherbert57 3 ปีที่แล้ว

      Deadpanned it like a pro!

  • @hojoj.1974
    @hojoj.1974 3 ปีที่แล้ว +2

    I look forward to Saturdays as they mean one of your presentations will soon arriving. I enjoy your topics, singing and accent... thank you.

  • @robertpietschmann8287
    @robertpietschmann8287 3 ปีที่แล้ว +6

    Dear Sabine, since I am a fan of your channel, I get really interested in physics (which was really not my subject at school, decades ago). Your way to explain is outstanding and keeps the interest of the viewer to the last minute either. This new video is although very informative and shows clear, that progress in science is still an interesting part, even in daily life.

  • @carloc352
    @carloc352 3 ปีที่แล้ว +4

    Amazing! Finally a clear explanation of the quantum key distribution. Thank you Sabine!

  • @glennbritten3044
    @glennbritten3044 3 ปีที่แล้ว +3

    I've been catching up on all your videos Sabine. I just love them, no-nonsense and easy to understand (Well almost) but my math is definitely getting better. You have truly a great mind so please keep them coming. Do you do Lectures or have a website, I'd love to see you lecture down here in Australia. I see by all the comments that everyone is enamored by your skill just like me.

  • @ZLLi661
    @ZLLi661 3 ปีที่แล้ว +1

    Thank you kindly Sabine. First time I have seen your video. I am learning about QKDs at the moment. A very good presenter, you are.

  • @davidwright8432
    @davidwright8432 3 ปีที่แล้ว +2

    Sabine - thanks as usual for a clear presentation. Maybe you do this already somewhere - but it would be really useful to have the transcripts of your talks available with each video. So we could read, pause, think, read some more, scribble on paper, and come to a deeper understanding. And maybe note a question or two! Thanks.

  • @davidlawrence8085
    @davidlawrence8085 3 ปีที่แล้ว +1

    Thanks so much, Sabine, wonderfully simple explanations of some crypto areas I was struggling with.

  • @frankchilds9848
    @frankchilds9848 3 ปีที่แล้ว +1

    Thank you Sabine, your English is fine...not futile. You are humorous and humble. I enjoy your work always.

  • @helge666
    @helge666 3 ปีที่แล้ว +27

    I predict that the public internet will switch to quantum cryptography as swiftly as it switched from ipv4 to ipv6. And by "swiftly" I mean "glacially". Like a glacier on Pluto.

    • @nibblrrr7124
      @nibblrrr7124 3 ปีที่แล้ว +8

      It's kinda worse than that, IPv4 to IPv6 "just" requires a change in software, while QKD requires entirely new hardware infrastructure. Also, as long as large quantum computers aren't around the corner, AND classical post-quantum algorithms don't fail utterly, I don't see the real incentive for adopting QKD.

    • @shadowmax889
      @shadowmax889 3 ปีที่แล้ว +3

      The hardware will be expensive at first so the first adopters most likely would be intelligence agencies and the military for security reasons, and later on other government agencies or departments would follow for the same reasons, big corporations, industries, Banks and Wall Street, would be next adopters. Security is a big issue and motivator, just like Y2K nobody will like to be at the end of an unsecure network

    • @dejabu24
      @dejabu24 3 ปีที่แล้ว +1

      @@nibblrrr7124 in many cases you have also to upgrade the hardware if you want support for ipv6 , because their version of OS is not maintained any more

    • @nibblrrr7124
      @nibblrrr7124 3 ปีที่แล้ว +1

      ​@@dejabu24 Okay, but buying a new router & plugging that into the wall is still easier & fixable for an individual, compared to laying new cables for a second internet.
      (Not sure how useful existing fibre-optic lines are, esp. if you don't want to blindly trust every routing station on the way.)

    • @dejabu24
      @dejabu24 3 ปีที่แล้ว

      nibblrrr do you think that you will have to add a new connection line , I thought that it will support fiber optic and other broadband connection

  • @MCsCreations
    @MCsCreations 3 ปีที่แล้ว +5

    Really, really interesting! 😃
    Thank you, Sabine!!!
    Stay safe there! 🖖😊

  • @brookstorm9789
    @brookstorm9789 2 ปีที่แล้ว

    I'm so grateful for the relevant but normally obscure info outside of specialists. That's for 'cluing u's in. You are a wonderful teacher.

  • @Vegan_suraj
    @Vegan_suraj 3 ปีที่แล้ว

    You are very wise...You are one of the best teachers..Explain everything so nicely

  • @ixglocTV
    @ixglocTV 2 ปีที่แล้ว

    Up to now I never found the -- pun alert -- key to understanding quantum cryptography. After a decade or so this video finally helped me understand all the -- pun alert -- key points!

  • @scudder991
    @scudder991 3 ปีที่แล้ว

    Unique and expertly communicated topic, which i never before realized that I needed to understand. Thank you!

  • @ddmannion
    @ddmannion 3 ปีที่แล้ว +1

    Sabine, your brain is so very amazing. Every video you make just blows me away. I would love to be able to think so well. Please keep doing your amazing work. 👍🙂

  • @ParthGChannel
    @ParthGChannel 3 ปีที่แล้ว

    Top notch video as always Sabine!

  • @EyobFitwi
    @EyobFitwi 3 ปีที่แล้ว

    You delivered the physics humor quite excellently. Have me a chuckle. Great video.

  • @anythingbutcash
    @anythingbutcash 2 ปีที่แล้ว

    I am so glad that you have this channel

  • @edysinsimon8646
    @edysinsimon8646 3 ปีที่แล้ว +1

    Thank you Sabine for an somewhat reasonble explanation of quantum crypto.

  • @ariennelandry9207
    @ariennelandry9207 3 ปีที่แล้ว +2

    Your English is very good. It’s the pronunciation that is not perfect, but very understandable and adorable. Don’t change a thing.

  • @GlennHamblin
    @GlennHamblin 3 ปีที่แล้ว +2

    Your English is fine. Thanks for the video!

  • @stukafluka9940
    @stukafluka9940 3 ปีที่แล้ว

    Sabine.....your English is perfectly understandable.....and that is all what matters....so keep up your good work. Excellent presentation!!!

  • @uldissprogis5138
    @uldissprogis5138 3 ปีที่แล้ว

    Sabine, love your videos. Keep up the good work. Best wishes. Uldis

  • @albertwilmarth6460
    @albertwilmarth6460 3 ปีที่แล้ว

    Excellent, aber echt, learned a lot, always a pleasure to watch your vids. Thanks

  • @caseykoons9454
    @caseykoons9454 3 ปีที่แล้ว

    Very concise and excellent description of quantum principles applied to cryptography. Years ago, I wrote and sold VPNs and offered multiple encryption protocols that could be selected and combined on each connection. The products were rock solid and clients could add their own protocols. All open source. The only problem was a three letter government agency audited the work and insisted that it be modified. The required modifications were not intended to make the product more secure. Given the choice, I stopped selling the products. Likewise, other products and systems I have built for major telecom companies have been required to comply with the ‘lawful intercept’ program. Sincerely, I hope that one day we can sell actual secure encryption services. That said, it is unlikely that quantum computers will be effective for breaking cyphers given superencypherment and utilization of multiple large keys that change during communication means it’s much simpler to hack the endpoint and collect the cleartext.

  • @GeorgeOu
    @GeorgeOu 3 ปีที่แล้ว +4

    AES is never a substitute for RSA as mentioned in the NordVPN spot, and it sounds like marketing nonsense from NordVPN. AES is a fast symmetric encryption algorithm used by nearly all encrypted communications. RSA is one of the asymmetric encryption algorithms that can only be used for secure key exchange. You cannot use it for bulk encryption because it's about a million times slower than AES.

    • @danstar455
      @danstar455 3 ปีที่แล้ว

      So share the key via RSA then encrypt with AES. Make sure your Key Store is secure.

    • @GeorgeOu
      @GeorgeOu 3 ปีที่แล้ว +3

      @@danstar455 That is basically how all SSL and TLS communications work. But when security companies like NordVPN advertise they substitute AES for RSA, it tells me they haven't a clue about security.

  • @BillyMcBride
    @BillyMcBride 3 ปีที่แล้ว +1

    I love this video. And, as a pragmatist of the Richard Rortyian flavor, I look at cryptography not as a problem, by saying there are no problems, but rather only more and more interesting ways to describe and redescribe our events. I love this video because my pragmatism I follow and trust keeps me seeking hope in place of knowledge. Sending and receiving messages is not in my case about searching for knowledge of this or that, but a searching for hope, a hope which I have learned should be open to all. Therefore, communication and conversations for me represent a seeking not of information of knowledge to pass on and collect, but one instead of hope to gain, since hope is better even than knowledge to possess, and send.

  • @sarahhibrahim
    @sarahhibrahim 3 ปีที่แล้ว

    Your English is much clearer than most natives. I'm a bilingual with English not being my "native tongue", and yours is just fine, Dr Sabine. Also, great work, thanks a lot!

  • @hmichaelpower
    @hmichaelpower 3 ปีที่แล้ว

    At the end I was listening to hear if you still called yourself Zabina and not Sabine, and wasn’t disappointed!

  • @Artaxo
    @Artaxo 3 ปีที่แล้ว +16

    As someone who still needs subtitles in most movies I watch, I fell I should say I understand your English better than most natives'.

    • @Valicore
      @Valicore 3 ปีที่แล้ว

      What is your native language?

    • @Artaxo
      @Artaxo 3 ปีที่แล้ว

      @@Valicore Portuguese, why?

  • @toneyeye
    @toneyeye 3 ปีที่แล้ว +2

    TH-cam was made for people like you. Keep it coming, Sabine.

  • @dbuck5350
    @dbuck5350 3 ปีที่แล้ว +52

    Never fix your English. It is a lovely melody to hear.

    • @biblebot3947
      @biblebot3947 3 ปีที่แล้ว +9

      cq33xx imagine being so insecure that you need to shove your politics into unrelated places

    • @dbuck5350
      @dbuck5350 3 ปีที่แล้ว +3

      @@cq33xx58 Then perhaps you should work on your English writing grammar to bring it to a level of competence that can be read with understanding, rather than have to work around your many errors.
      Or I can also tell you not to worry about it. The flaws are intriguing to decipher.

    • @dbuck5350
      @dbuck5350 3 ปีที่แล้ว +1

      @@cq33xx58 Okay, I accept you use a translator to conduct your conversations and we are left with errors in translation that make your meaning somewhat unclear. Yet you criticize any acceptance of Dr. Hossenfelder's imprecisely English pronunciation of some words as being a "crap" attitude, although she can hold concise conversations with some of the best minds alive in a non-native language. I don't normally argue with off-the-cuff hatefulness, but your comment was a response to mine, so I felt compelled to engage in this instance. Nevertheless, I accept your explanation and accept that your responses are altered by a translation program, and I will no longer respond. Please be well.

    • @ophello
      @ophello 3 ปีที่แล้ว +2

      She has beady emotionless eyes. It’s like getting a physics lesson from an autistic shark.

  • @pjmoran42
    @pjmoran42 3 ปีที่แล้ว

    Once again a beautiful and simple explaination.

  • @angrydoggy9170
    @angrydoggy9170 3 ปีที่แล้ว +8

    I have to say I’m seriously in love with your brain and your videos, in a purely platonic way. Thanks.

  • @Lorkin32
    @Lorkin32 3 ปีที่แล้ว

    This is a great channel. Thank you!

  • @happyhome41
    @happyhome41 3 ปีที่แล้ว

    Your English is better than that of many Americans. Clear, and heavy on content = gold

  • @ilovebayern134
    @ilovebayern134 3 ปีที่แล้ว

    Very great content, packed with content researches.

  • @DRockOvich
    @DRockOvich 3 ปีที่แล้ว +1

    That was single handedly the best transition to a sponsorship ever. Also the way you explain the benefits and features of nord VPN actually made me think about buying it. Sabina not only are you an amazing scientist and educator, your sales skills are a solid 10 as well. Please do not be hard on your english either. You have an accent yes. Your english is not broken by any means and you are very easy to understand. Plus I have always a german accent to be rather intimidating so I shut up and listen more. Thank you for the laugh first thing in the morning. My perception about how today is going to go has spin in the optimistic direction. Stay safe and healthy!

    • @nibblrrr7124
      @nibblrrr7124 3 ปีที่แล้ว

      Before you buy, note that *while the video suggests otherwise, NordVPN doesn't protect you from attacks by quantum computers* (and those are at least decades away from cracking practical encryption, anway). Sabine even makes a factual error at 11:30 - NordVPN does in fact rely on asymmetric/public-key cryptography just as much as anything on the internet, and would be just as vulnerable as just using websites with HTTPS (the lock icon thingy). And again, quantum computers are not a threat to your security anytime soon.
      *VPNs are useful only for very particular cases* - mostly, circumventing copyright restrictions (watching Netflix from another country, or not getting caught torrenting). Your online banking, browsing, or messages are already perfectly secured with HTTPS - VPNs just reroute your traffic (and this gain access to your entire browsing history), and add another unnecessary layer of encryption, which doesn't give you any more security against hackers or government agencies.
      If you worry about your ISP/company/government tracking which websites you visit, using Tor Browser (which is free) is likely the better solution than a VPN.
      Tom Scott has a great introductory video on the issues with VPN marketing; for more in-depth information see Wolfgang's Channel, or The Hated One.

  • @anderstopansson
    @anderstopansson 3 ปีที่แล้ว +31

    How many years was Bob together with Eve, to look like that?

    • @jamieg2427
      @jamieg2427 3 ปีที่แล้ว +1

      too long

    • @metagen77
      @metagen77 3 ปีที่แล้ว +1

      Bob looks like the coomer meme lol

  • @johnwilson4909
    @johnwilson4909 3 ปีที่แล้ว

    Sabine, Enjoyed your lecture on quantum cryptography. Appreciated the conservation of information technique by only encrypting the keys. Yes, I understand that everything was encrypted, but with only one key pair. Back in the 90's Scientific American published an article on quantum cryptography as an information utility. An encrypted data stream was available , like water or electricity. You could add your information to the stream and it would become an encrypted layer in the stream. When it reach the recipient, that layer would be peeled off and decrypted from the stream. This was before block chain cryptography was developed, but it had some similarities to the technique. P.S. Du hast schöne Augen.

  • @Omnifarious0
    @Omnifarious0 3 ปีที่แล้ว +7

    Alice, Bob, Carol, Eve, Trent, and Mallory are all inventions of cryptographers and computer scientists, not physicists.
    Eve is an eavesdropper, Trent is a trusted third party, and Mallory is someone who's trying to maliciously interfere, often by changing the message in some way.

    • @johnsmith1474
      @johnsmith1474 3 ปีที่แล้ว +1

      Hossenfelder never says physicists invented the use of those names, if making that correction was your point.
      At 6:00 she says, "When physicists talk about information transfer, they like to give names to senders & receivers ..." and proceeds to explain the ideas for a quantum key. They give the names that are commonly given, obviously. I call a watt a watt, not a vamp or ampolt.
      For the record according to my limited lookup, there are upwards of 30 placeholders names in common use in cryptography with more than one for some roles. This makes sense because the names are not significant, except that they sound appropriate.

    • @Omnifarious0
      @Omnifarious0 3 ปีที่แล้ว

      @@johnsmith1474 - She also calls Eve "physicist humor". The strong implication is that physicists invented these names.
      And it doesn't surprise me that there are more placeholder names. I gave that list from memory. I should've added a disclaimer that my list is likely not comprehensive.
      It rankled me that cryptographers and computer scientists weren't even mentioned. Neither Whitfield Diffie nor Martin Hellman are physicists. I don't think any of the inventors of RSA are either.
      Quantum cryptography is one of those interesting areas where physics and cryptography overlap. And it's a subset of the overlap between information theory (another computer science discipline) and physics that's produced a number of interesting ideas and hypothesis.
      It brings me back to the time I did some work in a research lab and was surrounded by physicists who thought computer science was largely pointless while they made extensive use of its fruits.

    • @joshuacoppersmith
      @joshuacoppersmith 3 ปีที่แล้ว

      @@Omnifarious0 I'd see it the other way: the logic and importance of these people make them not only cryptographers or mathematicians, but also honorary physicists. When you are clearly an auto mechanic and someone calls you a pianist after hearing you play, it is a huge compliment, not a detraction from pianists or auto mechanics.

    • @Omnifarious0
      @Omnifarious0 3 ปีที่แล้ว

      @@joshuacoppersmith - I disagree vehemently with your notion of hierarchy among the sciences. They are all very valuable in their separate ways.
      I would be offended to be considered an 'honorary physicist' because of some accomplishment I made in my field of choice. I'm not a physicist, and I have no desire to become one even though I have a lot of respect for the accomplishments of physicists.

    • @joshuacoppersmith
      @joshuacoppersmith 3 ปีที่แล้ว +1

      @@Omnifarious0 I would disagree with a hierarchy, too. If a computer scientist called Sabine a computer scientist, that would likewise be a great compliment to her. In my mind the auto mechanic and the pianist were equals. But I guess we are just different personalities about feeling honored to be called part of another field. I for one would be overjoyed to be called a mathematician because of work I did in cyberlinguistics. If nothing else, consider people like Claude Shannon. Would he mind being called a computer scientist? He wasn't one by training...

  • @charlietwigg5139
    @charlietwigg5139 5 หลายเดือนก่อน

    Wonderful, concise video. Thank you.

  • @wacksparrow88
    @wacksparrow88 3 ปีที่แล้ว

    Was talking about outcomes. If you give the person 1 and then you know person 1 has 1 then person 2 needs to make the choice to play knowing they will win if person is uses the information or outcome. Then person 2 playing can either take outcome if info is used or not. Information can be integer to >=1(info). This can then be interesting for outcomes and probability. Primes to gcd. Information. This case spins.

  • @comatronic
    @comatronic 3 ปีที่แล้ว +26

    You are a delight, every time.

  • @onehitpick9758
    @onehitpick9758 3 ปีที่แล้ว

    Excellent presentation. I think you mixed up vertical and horizontal at one point (7:49), but other than that you communicated this topic effectively.

  • @cristianm7097
    @cristianm7097 3 ปีที่แล้ว +1

    One-time pad based encryption is unbreakable by definition (safe against quantum too) , but it is impractical because the encryption key (the one-time pad) has to be as long as the message to encrypt. It is feasible for short messages.

  • @jamieg2427
    @jamieg2427 3 ปีที่แล้ว

    alice, bob, and even are awesome. props to the artist (:

  • @benheideveld4617
    @benheideveld4617 3 ปีที่แล้ว +53

    Sabine, I am so old that to me English spoken with a German accent by a scientist is considered more reliable than pure American or British English. Given the current standing of rationality in the US and the UK, I am modern again.

  • @suulix4065
    @suulix4065 ปีที่แล้ว

    Physics humor joke, I love it 😄
    Thank you for the concise and thorough explanation!!

  • @eli0damon
    @eli0damon 3 ปีที่แล้ว

    I've been watching a lot of your videos over the past few days. I am a native US English speaker, and your English sounds fine to me.

  • @lowelllarsen5947
    @lowelllarsen5947 3 ปีที่แล้ว

    Can’t find this unique info on any other TH-cam channel!

  • @LakanBanwa
    @LakanBanwa 3 ปีที่แล้ว +5

    I'm quite upset at myself right now for all those wasted opportunities I could have used to communicate how RSA encryption works when tutoring students about why one-to-one invertible functions in mathematics are very nice to have.

    • @Sickboyfriend
      @Sickboyfriend 3 ปีที่แล้ว

      You can still go back to teaching!

  • @jamesruscheinski8602
    @jamesruscheinski8602 3 ปีที่แล้ว +1

    Is there a way to use send quantum information that cannot be intercepted, such as random qbits?

  • @joshuacoppersmith
    @joshuacoppersmith 3 ปีที่แล้ว +1

    We native English speakers know we are done for since German speakers are good enough at English to make light of German speakers speaking English. I remember a skit on ARD or somewhere in which native German speakers were doing an English broadcast that had a crazy amount of th's in it. As the reports they read kept getting more th's, the announcers started sweating and pulling at their collars. I suppose for English speakers it would be like trying to say, "Die bösen Brüder sind dort drüben."

  • @harthur2010
    @harthur2010 3 ปีที่แล้ว

    The public key is usually only used initially to exchange a randomly generated symmetric key. From that point on a symmetric algorithm is used as they are much faster.

  • @losfachmenn6365
    @losfachmenn6365 3 ปีที่แล้ว

    thank you for sharing this knowledge with us

  • @stevierv22
    @stevierv22 3 ปีที่แล้ว +1

    Interesting video, thanks

  • @saaxili5794
    @saaxili5794 3 ปีที่แล้ว

    Very smooth

  • @derelbenkoenig
    @derelbenkoenig ปีที่แล้ว

    I love the "Ewen so its fjuteil" at the end lol😄

  • @leonardodavinci303
    @leonardodavinci303 3 ปีที่แล้ว +1

    Love your physics humor........

  • @MatthewSuffidy
    @MatthewSuffidy 3 ปีที่แล้ว +1

    I don't do any online banking because I think at some level your activities on a computer can be monitored. I try to mostly use cash and only use my card at the bank so there is no digital traces of the card numbers. Also I like to move my money out of the card accounts to other locations or certificates. But I think you are good making your own encryption system, and even encapsulating a known one. I always thought it would be funny to interject like 200% white noise into a file in an expected manner (increasing the size of the file) and watch someone try to make sense of it.

  • @musicalfringe
    @musicalfringe 2 ปีที่แล้ว

    It takes a while to notice, but I love Sabine's sense of humour.

  • @deth3021
    @deth3021 3 ปีที่แล้ว

    The public key can be used to decrypt or encrypt, depending on the usage model.
    Pgp for example uses he public key to encrypt, so that only the private key holder can decrypt it.
    Other uses are the opposite. I.e. use the private key to encrypt and then anyone with the public key can decrypt it.

  • @miklov
    @miklov 3 ปีที่แล้ว

    So when practically using quantum key exchange, do you send one particle at a time or could you have a filter that bypass 50% of the optical signal, takes 25% of it to a sensor with one spin and the last quarter to a detector with the opposite spin?

  • @infinto1
    @infinto1 3 ปีที่แล้ว

    Just 138k subscribers for such an informative and priceless channel .

  • @red-baitingswine8816
    @red-baitingswine8816 2 ปีที่แล้ว

    I find Sabine's accent pleasant to listen to.

  • @arctic_haze
    @arctic_haze 3 ปีที่แล้ว

    Very clear and very informative. Thanks again. I still hope you will allow for channel membership.

  • @ankitranjan4129
    @ankitranjan4129 3 ปีที่แล้ว

    favorite mathematician and theoretical physicist❤

  • @NikitaNicholas
    @NikitaNicholas 3 ปีที่แล้ว +11

    Love the accent!

  • @nohaylamujer
    @nohaylamujer 3 ปีที่แล้ว

    "Even zou iss fyootile" We love you Sabine!

  • @DorinCiobanu007
    @DorinCiobanu007 3 ปีที่แล้ว

    Sabine, how does this prevent MIM attacks if the attacker controls both channels? Can't an intermediate node substitute the key so both Alice and Bob talk to Eve while thinking they talk to each-other?

  • @GeorgWilde
    @GeorgWilde 2 ปีที่แล้ว

    Public Key Crypto depends on the assumption that P =/= NP (meaning that there are mathematical problems with sollutions algorithmically easy to check but hard to find).

  • @DaBlondDude
    @DaBlondDude 3 ปีที่แล้ว

    Would this key have to be generated before sending a message? If it was while sending a message it seems chunks of the conversation would be randomly missing with wrong guess

  • @rmi227
    @rmi227 3 ปีที่แล้ว

    Love your Videos

  • @gottenm9106
    @gottenm9106 2 ปีที่แล้ว +1

    so if we have post quantum cryptography why do we need quantum cryptograpthy?

  • @28DAYS77
    @28DAYS77 3 ปีที่แล้ว

    Wish I would have had a physics teacher like you I would have been a lot more interested in physics!

  • @dottedrhino
    @dottedrhino 3 ปีที่แล้ว

    So the comparison of correlation between a part of the keys makes it very probable that evesdropping is detected, so we know we have to generate a new key if so?

  • @deth3021
    @deth3021 3 ปีที่แล้ว +1

    Up until now afaik quantum encryption has limited application, at least for normal people.
    The reason is that it has a pretty niche application.
    So it is mostly used with fiber optics. However every repeater is effectively Alice and Bob.
    So for a potential attacker it means that instead of splicing into a fiberoptic at any arbitrary point you would need to get the signal at the repeater.
    So yes this is useful for undersea lines, haven't heard much use for it otherwise though.
    Haven't looked into it much recently though so maybe that has changed.

  • @robertneil715
    @robertneil715 3 ปีที่แล้ว +1

    Out of all her videos so far, I've only heard Sabine say one stupid thing: "fix my broken English." What??? Her English is better than most native speakers!

  • @theultimatereductionist7592
    @theultimatereductionist7592 3 ปีที่แล้ว +1

    If anyone can explain why "quantum" was chosen for the James Bond movie "Quantum of Solace",
    then you'll earn my admiration.

  • @bramkivenko9912
    @bramkivenko9912 3 ปีที่แล้ว

    (1) public keys can decrypt messages encrypted with private keys. This serves to verify digitally signed messages.
    (2) It would have been immensely helpful to include the reason these algorithms are irreversible is that they use modulus arithmetic allowing the discarding of useful information to reverse the process.

  • @Inpreesme
    @Inpreesme 2 ปีที่แล้ว

    Thank you

  • @ronmccord8866
    @ronmccord8866 3 ปีที่แล้ว

    Could eve measure the spin with 2 or even 4 separate detectors? And then use each separate key to decrypt the message? Would one work to reencode the message while the others give back gibberish?

  • @mikelakner5622
    @mikelakner5622 3 ปีที่แล้ว

    Another excellent video.

  • @FrancoisBothaZA
    @FrancoisBothaZA 3 ปีที่แล้ว +1

    Hahaha. The last sentence in the closed captions!

  • @jcinaz
    @jcinaz 2 ปีที่แล้ว

    Excellent!

  • @Theineluctable_SOME_CANT
    @Theineluctable_SOME_CANT 2 ปีที่แล้ว

    Ha ha ha ha ha... physics humour....
    Your husband is a lucky man, Sabine.
    Great video.

  • @compellingpoint7802
    @compellingpoint7802 3 ปีที่แล้ว

    Quantum cryptography is the use of quantum mechanical properties to enable secure communication. The principles involved are similar to those used by quantum key distribution, which can be used both for encryption and decryption purposes.
    Quantum key distribution (QKD) is a technique for secure communication using quantum mechanics. The method ensures the authenticity of a message and the privacy of information, preventing eavesdropping.
    A quantum channel cannot be copied without being destroyed, and the act of observation will change the observed system. The sender and receiver can communicate using a shared random sequence (such as an encryption key) that is used to encode messages.
    A sender uses a one-time pad with the receiver, which is secure in that any eavesdropper (including you and me) will find it impossible to recover the message being sent.
    A cryptographic method invented by Claude Shannon in the 1940s, based on information theory. It is used for secure communication in cryptography.
    Shannon entropy is a measure of the uncertainty associated with a random variable. In quantum mechanics, it quantifies the amount of information that an observer has about one possible outcome from an ensemble.

  • @harryragland7840
    @harryragland7840 3 ปีที่แล้ว

    Of course there are several issues with Quantum Key Distribution. While it does a good job protecting the key, the actual symmetric encryption used after the key exchange could still be vulnerable. Another problem is that the quantum key exchange can't pass over the standard network. Lastly, while it is true that the key cannot be intercepted, it is possible for Alice to send a key to Eve when she believes she is sending to Bob. There is nothing in the system that guarantees who is at the far end.

  • @notlessgrossman163
    @notlessgrossman163 3 ปีที่แล้ว +1

    But how do you exchange quantum key over the air? Or fiber optics? Single photons? Actually yes, and no: right now pulsed laser beam with zero to a few photons can be sent on a fiber optic cable... However this could allow Eve to split the beam and collect and measure a spare photon in the beam. A more advanced protocol includes an empty spot in the photon stream whereby Eve cannot determine if the empty spot part of the transmission or a random feature... Single photon transmission is more difficult to achieve outside labs but progress is being made.

  • @84Actionjack
    @84Actionjack 3 ปีที่แล้ว

    How about a video on renormalization or Quantum Field Theory. Where is this heading?