Will Quantum Computers break encryption?


  1. James Logan

    James Logan4 ชั่วโมงที่ผ่านมา


  2. Zackary Eerola

    Zackary Eerola4 ชั่วโมงที่ผ่านมา

    I am way to dumb for this ;(

  3. Mickael Bobovitch

    Mickael Bobovitch8 ชั่วโมงที่ผ่านมา

    brain.exe has stopped working

  4. Pokemoneuro


    The internet will die with article 13, so there will be nothing to protect

  5. ThatScienceGuy

    ThatScienceGuy2 วันที่ผ่านมา

    I love how computer science people try to explain quantum mechanics. This video is like the most watered down explanation yet. Please don't make any more videos on Quantum computers since you don't understand what you are talking about.

  6. Kerem gürbey

    Kerem gürbey2 วันที่ผ่านมา

    Though, here is the issue confusing me: in BB84, if the attacker eavesdrops on all the messages (i.e. the qbits server sends the client initially, the guesses client sends the server, and the confirmation of the guesses server sends the client), wouldn't they be able to figure out the key? They could just apply the guesses of the client on the qbits the server sent previously, which would allow them to obtain the same bits as the client on the bits whose direction the client guessed correctly. After eavesdropping on the message from server confirming the correct guesses, wouldn't the attacker also know about the key?

  7. Paticul ENG

    Paticul ENG7 วันที่ผ่านมา

    F yeah

  8. SpaysE McG

    SpaysE McG8 วันที่ผ่านมา


  9. Mustafa Açık

    Mustafa Açık8 วันที่ผ่านมา

    i am asking you all. How i can learn english very well? (Translated by google)google translate sometimes gets boring. Any suggestions would be appericated.(stolen from the stack overflow)

  10. Max Holbrook

    Max Holbrook16 วันที่ผ่านมา

    But to do that, you have to know what the rules are for the encryption. If you create your own set of rules that are not published, I don't think there is any way in hell you can can decode it. The rules for all well known encryption are very well known, and that's the problem.

  11. Corey Hartman

    Corey Hartman16 วันที่ผ่านมา

    Public key encryption is what we have to worry about. Symmetric key encryption will be fine for now.

  12. Victor  Popov

    Victor Popov18 วันที่ผ่านมา

    Ok but you didnt explain the important part. How much faster will quantum computers be able to guess or do a "brute force" of 2^256 encryption? Take a cryptocurrency as example, currently it is mathematically impossible to guess a combination of public and private keys because computer power is not enough. How much closer if at all will quantum computers bring it to the "possible" range ?

  13. Tarek BR

    Tarek BR18 วันที่ผ่านมา

    The evel one in the middle trying to steal data is backtrack Linux ?

  14. soham dey

    soham dey18 วันที่ผ่านมา

    What if a quantum computer use all the permutation and combination of the qubits to encrypt the password

  15. Linden Abbott

    Linden Abbott19 วันที่ผ่านมา

    In my opinion at the start it’s funny (Scarednes) : ARE WE DOMED ???!!!???!!!????!!!??! Him (comely): maybe.

  16. Prithvi Chintha

    Prithvi Chintha19 วันที่ผ่านมา

    In BB84 algorithm, But the hacker can get our orientations when we send it to the server to check them and also track the response of the server about which orientations are right. In that way a hacker can get the key right?

  17. Frame of Essence

    Frame of Essence19 วันที่ผ่านมา

    Nope, because they can't know the results of the measurements with that information, so they can't get the key.

  18. julia robbinson

    julia robbinson23 วันที่ผ่านมา

    I have been using Signal Private messenger for almost two years and it never disappoints, i keep reading about stuff that how secure the signal private messenger is. Recently they have extra level of security called sealed sender which is very unique and Signal messenger is first and only messenger to offer such kind of extra layer of security.

  19. Cheyne Simons

    Cheyne Simons27 วันที่ผ่านมา


  20. Eli jakubowicz

    Eli jakubowicz29 วันที่ผ่านมา

    but what if u both get a vertical qbit but yours is up ( 0 ) and the servers is down ( 1 ). you will both think that its the same and will not have the same key?????????????????????

  21. Frame of Essence

    Frame of Essence24 วันที่ผ่านมา

    No problem :)

  22. Eli jakubowicz

    Eli jakubowicz25 วันที่ผ่านมา

    thx so much. i get it now! :)

  23. Frame of Essence

    Frame of Essence25 วันที่ผ่านมา

    You publically send the server a list of the orientations (vertical, horizontal, vertical, etc...). When the server receives your message, it compares it against the orientations that it created initially (vertical, vertical, horizontal, etc...). It then send back a list of correct and incorrect orientations (correct, incorrect, incorrect, etc...). Now you both have a list of which orientations match.

  24. Eli jakubowicz

    Eli jakubowicz25 วันที่ผ่านมา

    +Frame of Essence thx. this answers my first question. but you didnt answer my second question. at 9:55 how do they compare the orientation of each others qbits? none of you know what the others qbits are.

  25. Frame of Essence

    Frame of Essence25 วันที่ผ่านมา

    If there's no eavesdropper and both you and server measure horizontally, then you will get the same bit 100% of the time, because we made the qubits entangled. An entangled pair of particles has that physical property. When each is measured in the same orientation, no matter what orientation it is, the measurements are the same. EDIT: I just realized I misinterpreted your question. My mistake. If you measure horizontally and get 1, that's because the server gave you a horizontal 1 on purpose. The server already knows the exact qubits it sends to you, so there's no way they can't match up when measured in the same orientation. (Unless there's an eavesdropper) Does that answer your question?

  26. kaustubh mani

    kaustubh mani29 วันที่ผ่านมา

    Which algorithm are you talking about which can only run on quantum computers.

  27. Frame of Essence

    Frame of Essence29 วันที่ผ่านมา

    Shor's algorithm, Grover's algorithm, etc... Though, you can technically run them on a normal computer if you use it to simulate a quantum computer.

  28. ORO 0147

    ORO 0147หลายเดือนก่อน

    Computers get better? Encryption gets better.

  29. Berk Can

    Berk Canหลายเดือนก่อน

    still cannot understand how can server identify that you are the one that server should communicate with if you are guessing like eavesdropper

  30. Frame of Essence

    Frame of Essenceหลายเดือนก่อน

    The server can't know that for sure. It needs to ask you for a password if it wants to identify you. The protocol in the video just sets up a secure channel with no authentication.

  31. zorg org

    zorg orgหลายเดือนก่อน

    no, they won't do anything, because Quantum mechanics is fraud. Its just as stupid as Einstein's time dilation, or curved space-time.

  32. Espen Bøgh

    Espen Bøghหลายเดือนก่อน

    I'm still confused as th efact that there is quantum computer on the marked - D-Wave with 1024 or 2048 bits, but all they are doing is som secret, that no pubic results have been publisized, that really puzzles my mind! Why can't we read anything about these wonderfull computers ability to solve common problems like those stated in many videos about these quantum computers alility. Often had I seen THreporter stories about the how these somputers in an instance can solve the probem of the lowest valley in the landscape - "you could map everything(the khole world9 in a trillion of a nanosecond" with a quantumcomputer. - But it's still not hapening. It can't all be that secret these computers are doing.

  33. Tyler H

    Tyler Hหลายเดือนก่อน

    E91 is the only way to ensure safety

  34. Tyler H

    Tyler Hหลายเดือนก่อน

    IBM and Google have Quantum computers that don’t rely on quantum annealing... D-Wave is the only major quantum annealing company

  35. Sergio Judahson

    Sergio Judahsonหลายเดือนก่อน

    Thanks for follow update My online business making Database corporate Thanks Elder Adino,RM

  36. izzynelo



  37. Mariann Mariann

    Mariann Mariannหลายเดือนก่อน

    I'm helping! -Quantum Computer I'm helping! -Vermilion, VVVVVV

  38. Dimi Savage

    Dimi Savageหลายเดือนก่อน

    listen to me,make another network just for bitcoin

  39. Josua Robson

    Josua Robsonหลายเดือนก่อน

    couldn't you just make a reverse-function to do the exact thing that the public key encryption function does, but in reverse so all you need is the public key? If you only use private keys, then the public keys can't be turned into private keys, because there is nothing stopping the functions that encode strings with public keys to be reversed into functions that decode encrypted text into a valid string of characters with the public key.

  40. Frame of Essence

    Frame of Essenceหลายเดือนก่อน

    Technically yes, but we can choose an encoding function whose inverse is very time-consuming. Most schemes use a function called modular exponentiation, which is easy to perform but difficult to reverse.

  41. Tele Tepat

    Tele Tepatหลายเดือนก่อน

    how server send we a key ?

  42. Frame of Essence

    Frame of Essenceหลายเดือนก่อน

    Your computer requests it from the server.

  43. Zenner


    Cool, I didn't understand any of this.

  44. Ali Akbar

    Ali Akbarหลายเดือนก่อน

    Best explaination ever you can get about cryptography.

  45. Aaaa Bbbb

    Aaaa Bbbbหลายเดือนก่อน


  46. Horny Fruit Flies

    Horny Fruit Fliesหลายเดือนก่อน

    Nope. I still don't understand how quantum computers work. What's the point of the uncertainty? How is it better than being certain what the bits are?

  47. Horny Fruit Flies

    Horny Fruit Fliesหลายเดือนก่อน

    +Frame of Essence Wow, I didn't think you would answer some dumbass on the comment section. Thanks for the info, that explains it a bit !

  48. Frame of Essence

    Frame of Essenceหลายเดือนก่อน

    It's only applicable to certain situations. For encryption, you can use uncertainty to your advantage to limit what the eavesdropper can do. And for some algorithms, it's possible to make the uncertainties cancel eachother, resulting in a certain answer, and the algorithm ends up being more efficient overall.

  49. somebody


    Use a quantum computer to make encryption. Simply use quantum computers to make 2039274628729383758202019471947927467284729847389382749287462674912738273498472365867787346748237984787834343423457387145858725833974796474798324873465982865774387556298473644246337958484728330576428434523439285849837492374998446873349183612533545328470959073814226558342039274628729383758202019471947927467284729847389382749287462674912738273498472365867787346748237984787834343423457387145858725833974796474798324873465982865774387556298473644246337958484728330576428434523439285849837492374998446873349183612533545328470959073814226558342039274628729383758202019471947927467284729847389382749287462674912738273498472365867787346748237984787834343423457387145858725833974796474798324873465982865774387556298473644246337958484728330576428434523439285849837492374998446873349183612533545328439482928471 bit encyptions

  50. WangleLine


    Super insightful. Thanks! :D

  51. Speeding Sniper

    Speeding Sniperหลายเดือนก่อน

    If a quantum computer can decode, can't it encode just as well?

  52. Василий Немцов

    Василий Немцовหลายเดือนก่อน

    Dislike for music. Please no freaking stupid music next time! I need useful information, not a freaking dancing horseshit.

  53. Electroneum Rich

    Electroneum Richหลายเดือนก่อน

    "But Bitcoin is a bubble! It does nothing! Worthless technology!" 😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂😂

  54. tx356 56795

    tx356 56795หลายเดือนก่อน

    how about you just send the person an heavily encrypted file through an email and then send the encryption code in the post, it is very unlikely it will be intercepted, and you could just send it to a PO box or have it split into 5 parts and sent to different po boxes.

  55. ale perez moreno

    ale perez morenoหลายเดือนก่อน


  56. En Hui Lim

    En Hui Limหลายเดือนก่อน

    good luck to the next generation of scientist to study for a breakthrough or whatever....

  57. Krazie 02

    Krazie 02หลายเดือนก่อน

    this is end to end enscription, isnt it?

  58. Sanket Varia

    Sanket Variaหลายเดือนก่อน

    why do all this hasle? its a quantum computer, just teleport the Qbits server to PCs. encryption won't be needed.

  59. Frame of Essence

    Frame of Essenceหลายเดือนก่อน

    Quantum teleportation still requires transmission of qubits. It's teleporting a quantum state, not matter.



    so fuck backwords capibility got it.

  61. Bulb Flowers of Southern Africa

    Bulb Flowers of Southern Africaหลายเดือนก่อน

    13:45 needs to be a screan saver on my computer

  62. crypticnonsense


    Can someone explain why it’s a problem if nobody has confidentiality on the internet?

  63. Frame of Essence

    Frame of Essenceหลายเดือนก่อน

    You also don't want people impersonating you on the internet. Security matters for many reasons.

  64. Deadbolt

    Deadbolt2 หลายเดือนก่อน

    5:17 Devil: FUCK YEAH!

  65. Pixel Pavel

    Pixel Pavel2 หลายเดือนก่อน


  66. Balto Farlander

    Balto Farlander2 หลายเดือนก่อน

    Can you do video about quantum steganography?

  67. David Porowski

    David Porowski2 หลายเดือนก่อน

    Man in the Middle // Quantum Entanglement RSA can/has been Broken One Way Hash // Collisions DNS Spoofing BlockChain Vulnerabilities? crickets Gold Bullion // Tungsten ingots

  68. mickaleb campbell

    mickaleb campbell2 หลายเดือนก่อน

    Why cant you just reverse the incyption? Like if you were sent one that was to make everything backwards? For example if I had ABCDEFG then use it cant people have my reverse key then reverse the reverse to make it normal? Like how you solve a math problem that is missing values.

  69. Frame of Essence

    Frame of Essence2 หลายเดือนก่อน

    There are certain operations you can do that can't be reversed. They're called one-way functions. RSA uses modular exponentiation, which we don't know an efficient way of reversing.

  70. Sinan Akkoyun

    Sinan Akkoyun2 หลายเดือนก่อน

    Easy DOS incoming

  71. Sinan Akkoyun

    Sinan Akkoyun2 หลายเดือนก่อน

    And if you can't clone them how the heck are you supposed to send them along??

  72. Frame of Essence

    Frame of Essence2 หลายเดือนก่อน

    You can make multiple copies of a known qubit state without cloning.

  73. Blue Winter

    Blue Winter2 หลายเดือนก่อน

    Will quantum computers make my THreporter video load faster?

  74. Boneless Communism

    Boneless Communism2 หลายเดือนก่อน

    Okay so can it run games like hella fast or..?

  75. Guardianofsunshine

    Guardianofsunshine2 หลายเดือนก่อน

    Wouldn't quantum computing allow for even safer encryption? Based upon how quantum particles behave

  76. Cska Hooligan

    Cska Hooligan2 หลายเดือนก่อน

    We also could just have a new encryption system for quantum computing, just like people made different encryption methods for different things or like a function that does the same thing but in 2 different coding languages

  77. Toshihiro Kun

    Toshihiro Kun2 หลายเดือนก่อน


  78. Wheels Lifts

    Wheels Lifts2 หลายเดือนก่อน

    This is just like a physical lock dilemma. The best lock for your door is to turn your door into a solid steel wall that doesnt open, but that is too secure because even the owner cant get in. The easiest door for the owner to get in is none at all. The goal is to have the most secure door with the easiest way in. Somewhere in the middle.

  79. digimon69

    digimon692 หลายเดือนก่อน

    What if the server is quantum and the computer is the today's standards?

  80. Rehan Karimi

    Rehan Karimi2 หลายเดือนก่อน

    What if the Eve's dropper acts as the receiver by blocking the receiver message to pass to client?

  81. Arjun Nurdin

    Arjun Nurdin2 หลายเดือนก่อน


  82. Mantas Jedinkus

    Mantas Jedinkus2 หลายเดือนก่อน

    Very well explained, subscribed.

  83. ExploitCode

    ExploitCode2 หลายเดือนก่อน

    Brain.exe has stopped working

  84. Rohit Benake

    Rohit Benake2 หลายเดือนก่อน

    Please do more videos ...

  85. vonforum

    vonforum2 หลายเดือนก่อน

    I feel like they don't fix the problem they solve, specifically because of the new transport system required. If the computers themselves can break the encryption, then any eavesdropper has now a way to decrypt messages. However, the new system requires a way to transport qubits. So, in order to safely encrypt, we have to have an infrastructure overhaul. So, what happens is, some parties will have a way of decrypting our messages, but until the infrastructure gets rebuilt, we have no way to counter it.

  86. Toast

    Toast2 หลายเดือนก่อน

    2:32, idk but this killed me lol.

  87. iCEplays /// Isaac Gibson Plays

    iCEplays /// Isaac Gibson Plays2 หลายเดือนก่อน

    lol the "ARE WE DÖO͍M͡ED̪???"

  88. Luis Alberto Fierro Salinas

    Luis Alberto Fierro Salinas2 หลายเดือนก่อน


  89. HWM Torque Jr

    HWM Torque Jr2 หลายเดือนก่อน

    Quantum? as In the gray, oblong pill Quantum nano-technology CPU A SQUIP?

  90. Hex

    Hex2 หลายเดือนก่อน

    5:14 the fact that the server is surprised is so cute

  91. AlphaCorinthian

    AlphaCorinthian2 หลายเดือนก่อน

    Quantum meKEYnics.

  92. a guy

    a guy2 หลายเดือนก่อน


  93. Dennis

    Dennis2 หลายเดือนก่อน

    5:17 F YEAH!

  94. Phoenix1969

    Phoenix19692 หลายเดือนก่อน

    With Quantum computers comes quantum encryption, making this point null.

  95. Apex-Inxane

    Apex-Inxane3 หลายเดือนก่อน

    the eavesdropper takes the public key, encrypts a message like "pls send me the private key" and sends it to the server lmao

  96. shingshongshamalama

    shingshongshamalama3 หลายเดือนก่อน

    Unless we invent qbits that work at room temperature or somehow micronize the cryogenic cooling systems for them, there will always be at least some significant obstacle to overcome in regards to using quantum computing for hacking. You can't exactly build your own supercomputer in your basement for pennies.

  97. IKTeam

    IKTeam3 หลายเดือนก่อน

    Thanks for so detailed video, only after you I got how RSA keys work! :D

  98. Hunter Bar

    Hunter Bar3 หลายเดือนก่อน

    stupid shor


    CAMPER PRO3 หลายเดือนก่อน

    This is like finding a solution before the problem gets big. Damn son! 😘😅

  100. Nate

    Nate3 หลายเดือนก่อน

    You gotta get a new mic, narrator or something because those mouth sounds are horrendous. Those smacking, wet sounds after every syllable is so distracting. I wanna listen to what you have to say, not what sounds like you talking while eating scrambled eggs.

  101. Diet John Jhon Jon Johnson

    Diet John Jhon Jon Johnson3 หลายเดือนก่อน


  102. Imperialist

    Imperialist3 หลายเดือนก่อน

    Sure, but can my MacBook Pro simulate quantum mecha- *Explosion*

  103. Alexander Petrovic

    Alexander Petrovic3 หลายเดือนก่อน

    Answer: No, quantum-level encryption will be invented.

  104. Monko Games

    Monko Games3 หลายเดือนก่อน

    oh noooo, someone is gonna see my cat video collection DX

  105. batuhan şekeroğlu

    batuhan şekeroğlu3 หลายเดือนก่อน

    NASA: Lets send message to usa and the reports of succesfully going to mars Network: Whats that thing(qubits) umm lets say it 011001010 USA: NASA why you send me random things?

  106. batuhan şekeroğlu

    batuhan şekeroğlu2 หลายเดือนก่อน


  107. MrSonny6155

    MrSonny61553 หลายเดือนก่อน

    When a random video on THreporter discussing a random topic explains public and private keys better than your computer science teacher or textbook. And that segment is literally the introduction. I could have used that explanation half a year ago, because some teachers don't really teach to well.

  108. Dylan Boyd

    Dylan Boyd3 หลายเดือนก่อน

    great illustrations, really helped me understand what the hecc u was talking about.

  109. Sneakerhead Farb

    Sneakerhead Farb3 หลายเดือนก่อน

    This would require both the client and the server to have quantum computing and unfortunately many hackers will potentially be able to use this technology before all possible clients; meaning we would not be able to use quantum encryption before we would already be overwhelmed by quantum decryption

  110. Boom Miner

    Boom Miner3 หลายเดือนก่อน


  111. HalfExotic

    HalfExotic3 หลายเดือนก่อน

    But what if you where a spoopy boi and got sum lockpicks and picked the padlock. I'm intelligent.

  112. Danny SJ

    Danny SJ3 หลายเดือนก่อน

    Is "Pictures of cats" code for "Hentai" cuz by now I think cats are irrelevant

  113. Gnar

    Gnar3 หลายเดือนก่อน

    now question... what programs do you use to encrypt data via privet/public key

  114. Frame of Essence

    Frame of Essence3 หลายเดือนก่อน

    It's done automatically by your web browser when you visit a site using https. Though technically, any program could do it in principle, as long as it performs the TLS protocol.

  115. Silver GoldTwine

    Silver GoldTwine3 หลายเดือนก่อน

    why not just add 4 different locks next to each other like having to open 4 doors with 4 different padlocks and 2 of the padlocks are easy to unlock by quantum computers causing the old hackers not to be able to hack it and 2 of them are diffecult to solve by quantum computers. ofc they wouldnt have the same lock in a row they would go from quantum lock to normal lock and repeat this once or the other way aroundyou even only need 2

  116. Frame of Essence

    Frame of Essence3 หลายเดือนก่อน

    The systems that are difficult to break with quantum computers are also difficult to break with classical computers. Also, the eavesdropper might have both quantum and classical computers. Also, doubling the number of keys just doubles the amount of time it takes to break. We want our systems to take an astronomically long time to break. In order to do that, we need a system where the time taken to break it increases exponentially.

  117. Jake Bramhall

    Jake Bramhall3 หลายเดือนก่อน

    I just want a quantum computer so I can finally run crisis and play minecraft

  118. DasMaffin

    DasMaffin3 หลายเดือนก่อน

    what i learned: because quantum mechanics im so glad i know how these work xD

  119. Whoofian Brony

    Whoofian Brony3 หลายเดือนก่อน

    This is a very good explanation of the concepts behind Transport Layer Security (TLS), the thing which kicks in when you have https configured correctly