How Quantum Computers Break The Internet... Starting Now
A quantum computer in the next decade could crack the encryption our society relies on using Shor’s Algorithm. Head to to start your free 30-day trial, and the first 200 people get 20% off an annual premium subscription.
▀▀▀
A huge thank you to those who helped us understand this complex field and ensure we told this story accurately - Dr. Lorenz Panny, Prof. Serge Fehr, Dr. Dustin Moody, Prof. Benne de Weger, Prof. Tanja Lange, PhD candidate Jelle Vos, Gorjan Alagic, and Jack Hidary.
A huge thanks to those who helped us with the math behind Shor’s algorithm - Prof. David Elkouss, Javier Pagan Lacambra, Marc Serra Peralta, and Daniel Bedialauneta Rodriguez.
▀▀▀
References:
Joseph, D., et al. (2022). Transitioning organizations to post-quantum cryptography. Nature, 605(7909), 237-243. -
Bernstein, D. J., & Lange, T. (2017). Post-quantum cryptography. Nature, 549(7671), 188-194. -
An Insight, An Idea with Sundar Pichai - Quantum Computing, Wold Economic Forum via YouTube -
Migrating to Post-Quantum Cryptography, The White House -
Kotas, W. A. (2000). A brief history of cryptography. University of Tennessee -
Hellman, M. (1976). New directions in cryptography. IEEE transactions on Information Theory, 22(6), 644-654. -
Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126. -
Kak, A. (2023). Lecture 12: Public-Key Cryptography and the RSA Algorithm -
Calderbank, M. (2007). The RSA Cryptosystem: History, Algorithm, Primes. University of Chicago. -
Cryptographic Key Length Recommendation, Keylength -
Coppersmith, D. (2002). An approximate Fourier transform useful in quantum factoring. arXiv preprint quant-ph/0201067. -
Quantum Fourier Transform, Qiskit -
Shor, P. W. (1994, November). Algorithms for quantum computation: discrete logarithms and factoring. In Proceedings 35th annual symposium on foundations of computer science (pp. 124-134). IEEE. -
Shor’s algorithm, Wikipedia -
Euler’s totient function, Wikipedia -
Asfaw, A. (2020). Shor’s Algorithm Lecture Series, Qiskit Summer School -
How Quantum Computers Break Encryption, minutephysics via YouTube -
Breaking RSA Encryption - an Update on the State-of-the-Art, QuintessenceLabs -
O’Gorman, J., & Campbell, E. T. (2017). Quantum computation with realistic magic-state factories. Physical Review A, 95(3), 032338. -
Gidney, C., & Ekerå, M. (2021). How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits. Quantum, 5, 433. -
2021 Quantum Threat Timeline Report, Global Risk Institute -
The IBM Quantum Development Roadmap, IBM -
Post-Quantum Cryptography, Computer Security Resource Center (NIST) -
Alagic, G., et al. (2022). Status report on the third round of the NIST post-quantum cryptography standardization process. US Department of Commerce, NIST. -
Thijs, L. (2015). Lattice cryptography and lattice cryptanalysis -
▀▀▀
Special thanks to our Patreon supporters:
Tj Steyn, Meg Noah, Bernard McGee, KeyWestr, Elliot Miller, Jerome Barakos, M.D., Amadeo Bee, TTST, Balkrishna Heroor, Chris LaClair, John H. Austin, Jr., Eric Sexton, john kiehl, Anton Ragin, Diffbot, Gnare, Dave Kircher, Burt Humburg, Blake Byers, Evgeny Skvortsov, Meekay, Bill Linder, Paul Peijzel, Josh Hibschman, Mac Malkawi, Juan Benet, Ubiquity Ventures, Richard Sundvall, Lee Redden, Stephen Wilcox, Marinus Kuivenhoven, Michael Krugman, Cy ’kkm’ K’Nelson, Sam Lutfi.
▀▀▀
Written by Casper Mebius & Derek Muller
Edited by Trenton Oliver
Filmed by Raquel Nuno
Animated by Ivy Tello & Mike Radjabov
Additional video/photos supplied by Getty Images & Pond5
Music from Epidemic Sound & Jonny Hyman
Produced by Derek Muller, Petr Lebedev, & Emily Zhang
1 view
367
99
2 months ago 01:16:06 1
Doctor DIED 3 TIMES: Now Knows We Have It COMPLETELY BACKWARDS! Dr. Lotte Valentin
2 months ago 00:02:14 1
Dr Masaru Emoto’s rice and water experiment shows how your thoughts and words create your reality
2 months ago 00:15:24 1
Young Woman Buys Old House and Renovates it Back to New in 2 YEARS | Start to Finish @juanxiaoliu
2 months ago 01:03:56 1
The Magic Show - Quantum leap from beginner to intermediate
2 months ago 00:05:10 1
Halocene - When Demons Come To Life feat @laurenbabic (Official Music Video)
2 months ago 00:15:11 1
Man Builds SECRET SHELTER Inside Fallen Tree | Solo Survival by @BushcraftHakankarahan
2 months ago 00:08:10 1
Few people know these SECRETS, Styrofoam! HELPFUL HANDYMAN CRAFTS ΑΝD TIPS
2 months ago 00:24:07 1
Men Build Secret 2-Room BUNKER Under a House | Start to Finish by @DashingAxe
2 months ago 00:11:01 1
Stylized Luggage Model in Maya 2025, Zbrush, and Substance Painter
2 months ago 00:06:35 1
Natural Ways to Boost Your Energy: Grounding, Meridian Flow, and Letting Go
2 months ago 00:59:34 1
ДРЕВНЕЕГИПЕТСКИЙ прецизионный ГРАНИТНЫЙ СОСУД. Техномагия древних (Все части) - ВЕРСАДОКО
2 months ago 01:00:23 1
UPROOTS Your Anxiety then DESTROYS it at 3 Mins (THIS IS SO ADDICTIVE)
2 months ago 00:04:06 1
Sirius, the brightest star!
2 months ago 03:16:16 1
Donald Hoffman: Reality is an Illusion - How Evolution Hid the Truth | Lex Fridman Podcast #293
2 months ago 00:10:29 1
Who pays for all the quantum crap? Probably you
2 months ago 00:28:36 1
Man Builds MEDIEVAL House Using Primitive Techniques | Start to Finish by @gesithasgewissa
2 months ago 00:32:42 1
The Actual Reason Semiconductors Are Different From Conductors and Insulators.
2 months ago 00:32:33 1
Watch OUT Lian Li and Phanteks | LUCA L70 Review
2 months ago 00:39:39 1
Man Turns BUS into Amazing MOBILE HOME with Rooftop Terrace | Start to Finish by @guvencsyn
2 months ago 00:00:00 1
Signs That A Parallel Version Of You Is Trying To Send You A Message. SEE WISDOM
2 months ago 00:29:42 4
Exposing The NESARA GESARA Lies
2 months ago 02:57:50 2
Craig Connelly’s 3-Hour Greatest Hits Set in Johannesburg (LIVE 2024)
2 months ago 01:05:24 1
Trap Music Fusion ⚡️ Trap Workout Motivation 🥊 Workout Music
2 months ago 00:02:01 1
Slavoj Žižek | Why Be Happy When You Could Be Interesting? | Big Think