Русские видео

Сейчас в тренде

Иностранные видео


Скачать с ютуб Will Quantum Computers break encryption? в хорошем качестве

Will Quantum Computers break encryption? 7 лет назад


Если кнопки скачивания не загрузились НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием, пожалуйста напишите в поддержку по адресу внизу страницы.
Спасибо за использование сервиса ClipSaver.ru



Will Quantum Computers break encryption?

How do you secure messages over the internet? How do quantum computers break it? How do you fix it? Why don't you watch the video to find out? Why does this description have so many questions? Why are you still reading? What is the meaning of life? 0:00 Intro - Are we DOOOOMED?? 0:52 How NOT to Send Secret Messages 2:09 RSA - Encryption Today 5:19 One-Way Functions and Post-Quantum Cryptography 7:28 Qubits and Measurement 9:03 BB84 - Quantum Cryptography 12:43 Alternatives and Problems 14:26 A Case for Quantum Computing Facebook:   / frameofessence   Twitter:   / frameofessence   YouTube:    / frameofessence   CLARIFICATIONS: You don't actually need a quantum computer to do quantum-safe encryption. As briefly mentioned at 7.04 , there are encryption schemes that can be run on regular computers that can't be broken by quantum computers. CORRECTIONS: "The public key can only be used to scramble information." (2.18) Technically, you can use any key to encrypt or decrypt whatever you want. But there's a specific way to use them that's useful, which is what's shown in the video. "Given a private key, it's easy to create its corresponding public key." (5.36) In RSA, depending on exactly what you mean by "private key", neither key is actually derivable from the other. When they are created, they are generated together from a common base (not just the public key from the private key). But typically, the file that stores the "private key" actually contains a bit more information than just the private key. For example, in PKCS #1 RSA private key format ( https://tools.ietf.org/html/rfc3447#a... ), the file technically contains the entire public key too. So in short, you technically can't get the public key from the private key or vice versa, but the file that contains the private key can hold more than just the private key alone, making it possible to retrieve the public key from it. Video links: Encryption and HUGE numbers - Numberphile    • Encryption and HUGE numbers - Numberp...   The No Cloning Theorem - minutephysics    • The No Cloning Theorem   Quantum Entanglement & Spooky Action at a Distance - Veritasium    • Quantum Entanglement & Spooky Action ...   Sources: Quantum Computing for Computer Scientists http://books.google.ca/books/about/Qu... Random person talking about Quantum MITM attacks http://crypto.stackexchange.com/quest... The Ekert Protocol (i.e. E91) http://www.ux1.eiu.edu/~nilic/Nina's-... Annealing vs. Universal Quantum Computers   / what-s-the-difference-between-quantum-anne...   Images, Documents, and Screenshots: Post-Quantum Cryptography initiatives http://csrc.nist.gov/groups/ST/post-q... http://pqcrypto.eu.org/docs/initial-r... Internet map (Carna Botnet) http://census2012.sourceforge.net/ Quantum network maps https://www.slideshare.net/ADVAOptica... IBM Quantum http://research.ibm.com/ibm-q/ Music: YouTube audio library: Blue Skies Incompetech: Jay Jay Pamgaea The House of Leaves Premium Beat: Cutting Edge Technology Second Time Around Swoosh 1 sound effect came from here: http://soundbible.com/682-Swoosh-1.html ...and is under this license: https://creativecommons.org/licenses/...

Comments