Premium Only Content
 
			How Quantum Computers Break The Internet... Data is Being Collected Now to Decrypt in the Future
How Quantum Computers Break The Internet... Data is Being Collected Now to Decrypt in the Future
---
4,617,470 views • Mar 20, 2023
---
QUANTUM COMPUTERS ARE NOT YET POWERFUL ENOUGH TO CRACK ENCRYPTION
---
A Current Security Risk is that Data is Being CAPTURED and Stored for WHEN Quantum Computer Technology is Capable of Decrypting it.
---
A quantum computer in the next decade could crack the encryption our society relies on using Shor's Algorithm. Head to https://brilliant.org/veritasium to start your free 30-day trial, and the first 200 people get 20% off an annual premium subscription. ▀▀▀ A huge thank you to those who helped us understand this complex field and ensure we told this story accurately - Dr. Lorenz Panny, Prof. Serge Fehr, Dr. Dustin Moody, Prof. Benne de Weger, Prof. Tanja Lange, PhD candidate Jelle Vos, Gorjan Alagic, and Jack Hidary. A huge thanks to those who helped us with the math behind Shor’s algorithm - Prof. David Elkouss, Javier Pagan Lacambra, Marc Serra Peralta, and Daniel Bedialauneta Rodriguez. ▀▀▀ References: Joseph, D., et al. (2022). Transitioning organizations to post-quantum cryptography. Nature, 605(7909), 237-243. - https://ve42.co/Joseph2022 Bernstein, D. J., & Lange, T. (2017). Post-quantum cryptography. Nature, 549(7671), 188-194. - https://ve42.co/Bernstein2017 An Insight, An Idea with Sundar Pichai - Quantum Computing, Wold Economic Forum via YouTube - https://ve42.co/QCWEFyt Migrating to Post-Quantum Cryptography, The White House - https://ve42.co/PQCWhiteHouse Kotas, W. A. (2000). A brief history of cryptography. University of Tennessee - https://ve42.co/Kotas2000 Hellman, M. (1976). New directions in cryptography. IEEE transactions on Information Theory, 22(6), 644-654. - https://ve42.co/Hellman1976 Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126. - https://ve42.co/Rivest1978 Kak, A. (2023). Lecture 12: Public-Key Cryptography and the RSA Algorithm - https://ve42.co/Kak2023 Calderbank, M. (2007). The RSA Cryptosystem: History, Algorithm, Primes. University of Chicago. - https://ve42.co/Calderbank2007 Cryptographic Key Length Recommendation, Keylength - https://ve42.co/KeyLength Coppersmith, D. (2002). An approximate Fourier transform useful in quantum factoring. arXiv preprint quant-ph/0201067. - https://ve42.co/Coppersmith2002 Quantum Fourier Transform, Qiskit - https://ve42.co/Qiskit Shor, P. W. (1994, November). Algorithms for quantum computation: discrete logarithms and factoring. In Proceedings 35th annual symposium on foundations of computer science (pp. 124-134). IEEE. - https://ve42.co/Shor1994 Shor’s algorithm, Wikipedia - https://ve42.co/ShorWiki Euler’s totient function, Wikipedia - https://ve42.co/EulerWiki Asfaw, A. (2020). Shor’s Algorithm Lecture Series, Qiskit Summer School - https://ve42.co/ShorYT How Quantum Computers Break Encryption, minutephysics via YouTube - https://ve42.co/PQCmpyt Breaking RSA Encryption - an Update on the State-of-the-Art, QuintessenceLabs - https://ve42.co/QuintessenceLabs O'Gorman, J., & Campbell, E. T. (2017). Quantum computation with realistic magic-state factories. Physical Review A, 95(3), 032338. - https://ve42.co/OGorman2017 Gidney, C., & Ekerå, M. (2021). How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits. Quantum, 5, 433. - https://ve42.co/Gidney2021 2021 Quantum Threat Timeline Report, Global Risk Institute - https://ve42.co/QuantumRisk The IBM Quantum Development Roadmap, IBM - https://ve42.co/IBMQC Post-Quantum Cryptography, Computer Security Resource Center (NIST) - https://ve42.co/CSRCPQC Alagic, G., et al. (2022). Status report on the third round of the NIST post-quantum cryptography standardization process. US Department of Commerce, NIST. - https://ve42.co/Alagic2022 Thijs, L. (2015). Lattice cryptography and lattice cryptanalysis - https://ve42.co/Thijs2015 ▀▀▀
---
FAIR USE FOR EDUCATIONAL PURPOSES
---
Mirrored From:
https://www.youtube.com/@veritasium
- 	
				 35:45 35:45Stephen Gardner9 hours ago🔴BREAKING: Election Auditor EXPOSES Democrat Election Fraud Evidence!7.61K33
- 	
				 15:48 15:48Sponsored By Jesus Podcast13 hours agoHow to Stop Being JEALOUS | When Comparison Steals Your Joy243
- 	
				 LIVE LIVEDLDAfterDark3 hours agoDon't Worry - Things Will Get SO Much Worse! Sometimes It Be Like That212 watching
- 	
				 25:41 25:41Robbi On The Record9 hours agoThe Billion-Dollar Lie Behind OnlyFans “Empowerment” (Her Testimony Will Shock You) | part II1455
- 	
				 12:22 12:22Cash Jordan1 hour ago"CHICAGO MOB" Fights Back... "ZERO MERCY" Marines DEFY Judge, SMASH ILLEGALS239
- 	
				 46:58 46:58Brad Owen Poker13 hours agoI Make QUAD ACES!!! BIGGEST Bounty Of My Life! Turning $0 Into $10,000+! Must See! Poker Vlog Ep 323321
- 	
				 2:52:28 2:52:28TimcastIRL4 hours agoSTATE OF EMERGENCY Declared Over Food Stamp CRISIS, Judge Says Trump MUST FUND SNAP | Timcast IRL190K113
- 	
				 3:22:45 3:22:45Tundra Tactical11 hours ago $14.20 earned🚨Gun News and Game Night🚨 ATF Form 1 Changes, BRN-180 Gen 3 Issues??, and Battlefield 6 Tonight!21.4K1
- 	
				 1:45:13 1:45:13Glenn Greenwald7 hours agoJD Vance Confronted at Turning Point about Israel and Massie; Stephen Miller’s Wife Screams “Racist” and Threatens Cenk Uygur with Deportation; Rio's Police Massacre: 120 Dead | SYSTEM UPDATE #54098.3K105
- 	
				 LIVE LIVESpartakusLIVE4 hours agoSpart Flintstone brings PREHISTORIC DOMINION to REDSEC287 watching