Will Quantum Computers break encryption?


  1. David Porowski

    David Porowski3 ชั่วโมงที่ผ่านมา

    Man in the Middle // Quantum Entanglement RSA can/has been Broken One Way Hash // Collisions DNS Spoofing BlockChain Vulnerabilities? crickets Gold Bullion // Tungsten ingots

  2. mickaleb campbell

    mickaleb campbellวันที่ผ่านมา

    Why cant you just reverse the incyption? Like if you were sent one that was to make everything backwards? For example if I had ABCDEFG then use it cant people have my reverse key then reverse the reverse to make it normal? Like how you solve a math problem that is missing values.

  3. Sinan Akkoyun

    Sinan Akkoyun4 วันที่ผ่านมา

    Easy DOS incoming

  4. Sinan Akkoyun

    Sinan Akkoyun4 วันที่ผ่านมา

    And if you can't clone them how the heck are you supposed to send them along??

  5. Frame of Essence

    Frame of Essence2 วันที่ผ่านมา

    You can make multiple copies of a known qubit state without cloning.

  6. Blue Winter

    Blue Winter4 วันที่ผ่านมา

    Will quantum computers make my THreporter video load faster?

  7. Mlgproface

    Mlgproface4 วันที่ผ่านมา

    Okay so can it run games like hella fast or..?

  8. Guardianofsunshine

    Guardianofsunshine7 วันที่ผ่านมา

    Wouldn't quantum computing allow for even safer encryption? Based upon how quantum particles behave

  9. Cska Hooligan

    Cska Hooligan7 วันที่ผ่านมา

    We also could just have a new encryption system for quantum computing, just like people made different encryption methods for different things or like a function that does the same thing but in 2 different coding languages

  10. Toshihiro Kun

    Toshihiro Kun11 วันที่ผ่านมา


  11. Wheels Lifts

    Wheels Lifts14 วันที่ผ่านมา

    This is just like a physical lock dilemma. The best lock for your door is to turn your door into a solid steel wall that doesnt open, but that is too secure because even the owner cant get in. The easiest door for the owner to get in is none at all. The goal is to have the most secure door with the easiest way in. Somewhere in the middle.

  12. Viktirnoob

    Viktirnoob16 วันที่ผ่านมา

    What if the server is quantum and the computer is the today's standards?

  13. Rehan Karimi

    Rehan Karimi16 วันที่ผ่านมา

    What if the Eve's dropper acts as the receiver by blocking the receiver message to pass to client?

  14. Arjun Nurdin

    Arjun Nurdin17 วันที่ผ่านมา


  15. Mantas Jedinkus

    Mantas Jedinkus17 วันที่ผ่านมา

    Very well explained, subscribed.

  16. ExploitCode

    ExploitCode18 วันที่ผ่านมา

    Brain.exe has stopped working

  17. Rohit Benake

    Rohit Benake19 วันที่ผ่านมา

    Please do more videos ...

  18. vonforum

    vonforum20 วันที่ผ่านมา

    I feel like they don't fix the problem they solve, specifically because of the new transport system required. If the computers themselves can break the encryption, then any eavesdropper has now a way to decrypt messages. However, the new system requires a way to transport qubits. So, in order to safely encrypt, we have to have an infrastructure overhaul. So, what happens is, some parties will have a way of decrypting our messages, but until the infrastructure gets rebuilt, we have no way to counter it.

  19. Manuelle MDiaz

    Manuelle MDiaz22 วันที่ผ่านมา

    2:32, idk but this killed me lol.

  20. iCEplays /// Isaac Gibson Plays

    iCEplays /// Isaac Gibson Plays22 วันที่ผ่านมา

    lol the "ARE WE DÖO͍M͡ED̪???"

  21. Luis Alberto Fierro Salinas

    Luis Alberto Fierro Salinas24 วันที่ผ่านมา


  22. HWM Torque Jr

    HWM Torque Jr25 วันที่ผ่านมา

    Quantum? as In the gray, oblong pill Quantum nano-technology CPU A SQUIP?

  23. Hex

    Hex25 วันที่ผ่านมา

    5:14 the fact that the server is surprised is so cute

  24. AlphaCorinthian

    AlphaCorinthian25 วันที่ผ่านมา

    Quantum meKEYnics.

  25. a guy

    a guy26 วันที่ผ่านมา


  26. Dennis

    Dennis27 วันที่ผ่านมา

    5:17 F YEAH!

  27. Phoenix1969

    Phoenix196928 วันที่ผ่านมา

    With Quantum computers comes quantum encryption, making this point null.

  28. Apex-Inxane

    Apex-Inxane28 วันที่ผ่านมา

    the eavesdropper takes the public key, encrypts a message like "pls send me the private key" and sends it to the server lmao

  29. shingshongshamalama

    shingshongshamalama29 วันที่ผ่านมา

    Unless we invent qbits that work at room temperature or somehow micronize the cryogenic cooling systems for them, there will always be at least some significant obstacle to overcome in regards to using quantum computing for hacking. You can't exactly build your own supercomputer in your basement for pennies.

  30. IKTeam


    Thanks for so detailed video, only after you I got how RSA keys work! :D

  31. Hunter Bar

    Hunter Barหลายเดือนก่อน

    stupid shor


    CAMPER PROหลายเดือนก่อน

    This is like finding a solution before the problem gets big. Damn son! 😘😅

  33. Nate


    You gotta get a new mic, narrator or something because those mouth sounds are horrendous. Those smacking, wet sounds after every syllable is so distracting. I wanna listen to what you have to say, not what sounds like you talking while eating scrambled eggs.

  34. Diet John Jhon Jon Johnson

    Diet John Jhon Jon Johnsonหลายเดือนก่อน


  35. Imperialist


    Sure, but can my MacBook Pro simulate quantum mecha- *Explosion*

  36. Alexander Petrovic

    Alexander Petrovicหลายเดือนก่อน

    Answer: No, quantum-level encryption will be invented.

  37. Monko Games

    Monko Gamesหลายเดือนก่อน

    oh noooo, someone is gonna see my cat video collection DX

  38. batuhan şekeroğlu

    batuhan şekeroğluหลายเดือนก่อน

    NASA: Lets send message to usa and the reports of succesfully going to mars Network: Whats that thing(qubits) umm lets say it 011001010 USA: NASA why you send me random things?

  39. batuhan şekeroğlu

    batuhan şekeroğlu19 วันที่ผ่านมา


  40. MrSonny6155


    When a random video on THreporter discussing a random topic explains public and private keys better than your computer science teacher or textbook. And that segment is literally the introduction. I could have used that explanation half a year ago, because some teachers don't really teach to well.

  41. Dylan Boyd

    Dylan Boydหลายเดือนก่อน

    great illustrations, really helped me understand what the hecc u was talking about.

  42. Sneakerhead Farb

    Sneakerhead Farbหลายเดือนก่อน

    This would require both the client and the server to have quantum computing and unfortunately many hackers will potentially be able to use this technology before all possible clients; meaning we would not be able to use quantum encryption before we would already be overwhelmed by quantum decryption

  43. Boom Miner

    Boom Minerหลายเดือนก่อน


  44. HalfExotic


    But what if you where a spoopy boi and got sum lockpicks and picked the padlock. I'm intelligent.

  45. Danny SJ

    Danny SJหลายเดือนก่อน

    Is "Pictures of cats" code for "Hentai" cuz by now I think cats are irrelevant

  46. Gnar


    now question... what programs do you use to encrypt data via privet/public key

  47. Frame of Essence

    Frame of Essence28 วันที่ผ่านมา

    It's done automatically by your web browser when you visit a site using https. Though technically, any program could do it in principle, as long as it performs the TLS protocol.

  48. Silver GoldTwine

    Silver GoldTwineหลายเดือนก่อน

    why not just add 4 different locks next to each other like having to open 4 doors with 4 different padlocks and 2 of the padlocks are easy to unlock by quantum computers causing the old hackers not to be able to hack it and 2 of them are diffecult to solve by quantum computers. ofc they wouldnt have the same lock in a row they would go from quantum lock to normal lock and repeat this once or the other way aroundyou even only need 2

  49. Frame of Essence

    Frame of Essence28 วันที่ผ่านมา

    The systems that are difficult to break with quantum computers are also difficult to break with classical computers. Also, the eavesdropper might have both quantum and classical computers. Also, doubling the number of keys just doubles the amount of time it takes to break. We want our systems to take an astronomically long time to break. In order to do that, we need a system where the time taken to break it increases exponentially.

  50. Jake Bramhall

    Jake Bramhallหลายเดือนก่อน

    I just want a quantum computer so I can finally run crisis and play minecraft

  51. DasMaffin


    what i learned: because quantum mechanics im so glad i know how these work xD

  52. Whoofian Brony

    Whoofian Bronyหลายเดือนก่อน

    This is a very good explanation of the concepts behind Transport Layer Security (TLS), the thing which kicks in when you have https configured correctly

  53. ZerqTM


    and while all this cryptography the pigfuckers in "intelligence" agencies all around the world try to elbow themselves into the process and create back doors that eventually fall into the wrong had because they are nosy assholes who don't think anyone is entitled to any privacy what so ever... You better believe the NSA and CIA will try to fuck about with quantum encryption... they also likely will try to get their hands on quantum computers before everyone else and then abuse it to no end. And really its stupid because actual spies can just use one time pads for really secret info and that is absolutely uncrackable period... (unless you re--use the one time pads which is very crackable)

  54. nespc


    so does this mean the same could theoretically happen with the cryptocurrencys too?

  55. Raymond Gilbert

    Raymond Gilbertหลายเดือนก่อน

    Is this the backyard scientist

  56. Mohan J

    Mohan Jหลายเดือนก่อน

    Excellent bro...You are awesome and your hard work makes you success.

  57. Neeraj Kumar

    Neeraj Kumarหลายเดือนก่อน

    too tough to understand good video btw

  58. REDxStep


    Do you really don't have any friends so you PRIVATLY speaking to litterally computer?

  59. Reneator


    Really good explanation. Really good video. Got a new subscriber!

  60. advsoft


    Great video man, thanks.! And.. because you didn't pray for liking and subscribing -> i wil . Let Net Bless you

  61. FrogiMen13


    if what you say is correct, than it means that NSA won't be able to to read my mail in the age of quantum computers!

  62. Domi Rusz

    Domi Ruszหลายเดือนก่อน


  63. The Adventures Of Guest And Noob

    The Adventures Of Guest And Noobหลายเดือนก่อน

    so if quantum computers are our doom why invent it (aka why invent our own doom)

  64. John Quill Taylor

    John Quill Taylorหลายเดือนก่อน

    Morris' Law: Any encryption of a cat photo just turns into another cat photo... - j q t -

  65. MN-14


    Quantum computing is gonna break EVERYTHING we know!!!

  66. James Smith

    James Smithหลายเดือนก่อน

    7:41 that symbol is the wrong way round. It should be equal to or lass than one, not greater than.

  67. Josh Wanuck

    Josh Wanuckหลายเดือนก่อน

    This is awesome

  68. RFI-Crypto Lab

    RFI-Crypto Labหลายเดือนก่อน

    I just want to know when i will be able to buy a quantum computer at Best Buy.

  69. Mathization eBook

    Mathization eBookหลายเดือนก่อน

    first, how do you prevent all the hackers keylogging of everyones computers? Like most, Im not an IT specialist to even know where to begin. I guess there will be harsh punishment , life or death for hackers in the future for who goes against the AI system.

  70. Michael Murphy

    Michael Murphyหลายเดือนก่อน

    lol glad you showed the IBM thing at the end!

  71. Mafifi User88

    Mafifi User88หลายเดือนก่อน

    "The bench is around 2m long." * Measures the bench * "Hmm. Well, it's 9*∞ KMs long now."

  72. REDPLASMA1305


    Like everything else in this world today new tech will just end up selling you something.

  73. Lüdwig The Dragon

    Lüdwig The Dragonหลายเดือนก่อน

    Wouldn't there be some problems with higher-end encryption though? Wouldn't it require more data to be sent, requiring even better and more expensive data to have a somewhat smooth experience? And what about lower end computers struggling to receive the keys?

  74. Calamity In Action

    Calamity In Actionหลายเดือนก่อน

    5:17 The eavesdropper says "F YEAH!!!"

  75. Stromae


    just me or is it satisfying to listen to ur voice.

  76. madcat789


    I can't wait to be shitposting on my Dell Quantum XP100K.

  77. Keanu β

    Keanu βหลายเดือนก่อน

    Echt gut erklärt.

  78. Hirens


    Quick answer, *no* . Before watching this video.

  79. Nikolay Yakimov

    Nikolay Yakimovหลายเดือนก่อน

    A few mistakes I thought I could point out. First, at 2:11, we don't really use RSA for data exchange. Instead, most cryptographic systems use RSA to encrypt and share a symmetric key (f.ex. AES), which is then used for other messages. Second, 2:22, actually, RSA public and private keys are mutually inverse, in a sense. You can use a private key to decrypt a message encrypted with the corresponding public key, sure. But you also can use a public key to decrypt a message encrypted with the corresponding private key. Mathematically, public and private key are basically interchangeable (with a few assumptions on how part of the public key is generated -- in a nutshell, if it's cryptographically random -- which, to be fair, isn't something most implementations do). Third, which follows from the second, ad 5:42, you argue that it's easy to reconstruct a public key given a private key. If we use the textbook definition of the private key, this is not true. A private key is a pair of numbers {d, n}, where n is a semiprime number (which can be nontrivially factored only one way, n = p*q, where p and q are prime numbers). A public key is a pair of numbers {e, n}. A public/private key pair must satisfy d*e = 1 mod (p-1)*(q-1). Hence, given just a private key {d, n} you can't really reconstruct (p-1)*(q-1), unless you factorize n (which is NP, i.e. we think can't be solved in polynomial time), hence you can't easily compute e = d⁻¹ mod (p-1)*(q-1). As I said before, choice of what's public and what's private is somewhat arbitrary in principle. Implementations, however, are known to simplify public key generation (by choosing e not randomly, but assigning it to be a well-known or easily guessable number instead), which means usually, given {d, n}, you can guess e fairly quickly. To reiterate, it's not that generating a public key from the corresponding private key is "easy" (in the sense that it's a P-class problem), it's that *guessing* half the public key is usually trivial, and the second half is also a part of the corresponding private key.

  80. Frame of Essence

    Frame of Essenceหลายเดือนก่อน

    ^ All valid points

  81. Sadnehs


    I've been wondering about this issue for several years. Finally someone explained it in detail. I didn't know that current Quantum Computers are for specific algorithms and can't do general computing (well). I didn't know that we can continue to use classical computing, and simply start using new algorithms that don't have fast quantum computing solutions yet. I didn't know that Quantum computers had a known system of security that can be used. And most importantly I didn't actually know about general purpose quantum computing, I was just told "It can just guess all the possibilities at once and break any encryption". Jeepers, can't trust specialists on the news anymore.

  82. TheFieryMeteor


    Picture of cats you say?

  83. Evan Dear

    Evan Dearหลายเดือนก่อน


  84. Pavel Rahl

    Pavel Rahlหลายเดือนก่อน

    Simple answer: no.

  85. pollard1997


    You can just use paper and burn it after it's read. Encrypt it on offline devices and encrypt it on offline devices. No internet no middleman no breaking the code unless the sender or reciever gives it up. Its slower and inconvenient however as technology progresses answers often regress.

  86. Dutch Blades

    Dutch Bladesหลายเดือนก่อน

    So say someone would intercept both the packets as well as the public key. The time it'll take to generate a decryption key would mean it'll be outdated for new messages sent. Couldn't they however still use their generated key for packets they sniffed out during the same session in which the (now decrypted) public key was sent? i.e. still decrypt your messages; just delayed.

  87. Frame of Essence

    Frame of Essenceหลายเดือนก่อน

    WPA2 only adds security for the journey from the device to the router. So that would only need to be broken through if the eavesdropper is trying to get into your local network.

  88. Dutch Blades

    Dutch Bladesหลายเดือนก่อน

    +Frame of Essence Thanks for the reply ;) Would there be additional encryption added when it comes to wireless traffic from router to client? Or would it be just as bad as being on the exact same network as a potential hacker on a Starbucks hotspot or something when it comes to sniffing out packets? I'd imagine you could use Wireshark on monitor mode or similar software with a WiFi adapter to intercept any traffic otherwise... Then again, cracking a WPA2 encryption is nowhere near as time consuming as SSL traffic would be...

  89. Frame of Essence

    Frame of Essenceหลายเดือนก่อน

    Yes they can. They would have to target someone specifically though, since storing everyone's packets could get costly.

  90. Rogue God

    Rogue Godหลายเดือนก่อน

    What if the 'easvedropper' just sends 'q-bits' to the server acting like they're the guy stealing from them. Then you get a key, right? Like a Man In The Middle Attack EDIT: Nevermind, that was brought up

  91. Night And Day

    Night And Dayหลายเดือนก่อน

    How would you send a "copy" of a q bit to the customer you can't copy them

  92. Frame of Essence

    Frame of Essenceหลายเดือนก่อน

    If you already know what the qubit state is, you can just make another one with the same state. It's a "copy" in a sense, but it isn't cloned from the original.

  93. Tc


    wait quantum computers have to rely on an entirely different Internet? Does that mean there will be 2 Internets with their own content?

  94. Frame of Essence

    Frame of Essenceหลายเดือนก่อน

    The quantum internet would only be for generating keys. Everything else can be on the normal internet.

  95. el Romansa

    el Romansaหลายเดือนก่อน

    Im gone in 8:00

  96. Tony Kowalski

    Tony Kowalskiหลายเดือนก่อน

    trusted 3rd party. NSA?

  97. Zak Woodhead

    Zak Woodheadหลายเดือนก่อน

    Well it will be quantum computers changing the keys

  98. Ace


    great explanation! but does scientist that created quantum computer actually uses "astronomically unlucky/lucky"?

  99. Shadoku Exia

    Shadoku Exiaหลายเดือนก่อน

    or we could use drones to send encrypted flash drives bam problem solved

  100. tino tino

    tino tinoหลายเดือนก่อน

    use tailś

  101. 【惊奇】ᎯʍᎯZΞ


    Einstein don’t know how this work

  102. Bot 1029

    Bot 1029หลายเดือนก่อน


  103. cucubau


    God, now everyone will be able to see my porn collection, damn !

  104. Francis Friesen

    Francis Friesenหลายเดือนก่อน

    So this will kill small companies and encryption from your computer?

  105. Sam H

    Sam Hหลายเดือนก่อน

    So its possible for to run the BB84 protocol on regular computers

  106. Frame of Essence

    Frame of Essenceหลายเดือนก่อน

    You can simulate BB84 on classical computers, but it's not safe to use anymore since you can fully control the quantum state.

  107. Adriaan S

    Adriaan Sหลายเดือนก่อน

    7:40 so you can run convention computer programs on quantum computers(with emulation most likely but it means that you CAN use binary code with quantum computers)

  108. Prophet


    You just earned a new sub.

  109. FireRedz


    How to encrypt my connection from FBI?

  110. Bjamse


    but how can data, that under no circumstances be observed/measured (like the qubits) be transmitted? how can you b certain that the cubits that you have are equal to the once the server has? the act of transferring data with anything would be impossible with qbits in superpositions or am I totaly wrong here?

  111. Frame of Essence

    Frame of Essenceหลายเดือนก่อน

    The properties are preserved as long as the state doesn't get exposed to the environment. So for example, if you store the qubit in a photon's polarization, the quantum properties are preserved as long as you don't cause the polarization to effect the environment somehow.

  112. chingmui Kwok

    chingmui Kwokหลายเดือนก่อน

    did you guys see the"F yeah"?