In the war for information, will quantum computers defeat cryptographers? | Craig Costello

In the war for information, will quantum computers defeat cryptographers? | Craig Costello

Cryptographers: The War on Information

The speaker discusses the role of cryptographers in safeguarding information through encryption and the evolving landscape of cryptography with the advent of quantum computers.

Evolution of Cryptography

  • Cryptographers create systems to encrypt various forms of data, ensuring only intended recipients can decipher it.
  • Quantum computers pose a threat to existing encryption methods, challenging the security previously thought unbreakable.

Historical Perspective

  • Historical examples like Queen Mary's encrypted letters and Alan Turing breaking the Enigma code illustrate the ongoing battle between cryptographers and code breakers throughout history.
  • Introduction of public-key cryptography revolutionized encryption by enabling secure communication without prior key exchange.

Challenges in Modern Encryption

The speaker delves into the mathematical foundations of modern encryption and how it secures data transmission efficiently.

Mathematical Complexity

  • Public-key cryptography relies on solving complex mathematical problems that traditional calculators struggle with, ensuring secure data transmission.
  • Integer factorization, a fundamental problem in encryption, forms the basis for securing data on devices like smartphones and laptops.

Quantum Computing Revolution

Exploring how quantum mechanics challenges classical cryptographic assumptions and introduces quantum computing as a game-changer.

Quantum Mechanics Impact

  • Discoveries in quantum mechanics challenge classical laws, revealing phenomena like particles being in multiple states simultaneously.
  • Quantum mechanics at subatomic levels defies classical physics laws, paving the way for revolutionary technologies like quantum computers.

Potential of Quantum Computers

  • Quantum computers leverage unique quantum behaviors to outperform classical supercomputers significantly, promising solutions to complex global challenges.

The Power and Risks of Quantum Computing

The speaker discusses the potential of quantum computing to revolutionize various fields while highlighting the significant risks associated with its capabilities.

Understanding Quantum Computing

  • Quantum computers have the potential to create superhuman artificial intelligence and enhance our understanding of the universe.

Encryption Vulnerabilities

  • Quantum computers can easily break current encryption methods, posing a significant threat to data security.
  • Modern encryption systems will be rendered ineffective against quantum computing power, making sensitive information vulnerable.

Qubits vs. Bits

  • Traditional computers use bits as the fundamental unit of information, limited to two states (0 or 1).
  • Quantum computers utilize qubits that can exist in an infinite number of states, enabling complex computations through superposition.

Challenges Posed by Quantum Computers

The speaker delves into the unique capabilities of quantum computing and how they challenge traditional encryption methods.

Superposition in Quantum Computing

  • Qubits in superposition allow for exponential combinations of states, enhancing computational power significantly.

Breaking Encryption with Quantum Computers

  • Quantum computers can simultaneously explore all combinations to unlock encrypted data efficiently.

Parallel Universes in Quantum Computing

  • Each combination is examined by its own quantum computer within parallel universes, leading to accurate results through reinforcement and cancellation effects.

Urgency for Enhanced Cryptography

The urgency for advancing cryptography due to the imminent threat posed by quantum computers is emphasized.

Need for Advanced Cryptography

  • Cryptographers must enhance encryption technologies rapidly to counter the looming threat posed by quantum computing advancements.

Implications on Data Security

  • Current encryption methods may not suffice against future quantum threats, necessitating immediate action in securing sensitive data.

Cryptographers' Quest for Unbreakable Encryption

In this section, the speaker discusses the urgent need for cryptographers to develop encryption methods that are resistant to quantum computing threats.

Exploring New Mathematical Problems

  • Cryptographers seek new mathematical challenges that can be implemented on current devices like smartphones and laptops.
  • These problems must be so complex that even quantum computers cannot break them.

Geometric Problems in High Dimensions

  • Researchers are exploring geometric problems in over 500 dimensions, surpassing traditional two- and three-dimensional problem-solving approaches.
  • These high-dimensional problems are believed to be beyond the capabilities of quantum computers.

Securing the Digital World

  • Cryptographers place hope in these advanced geometric problems to safeguard digital information in the era of quantum computing.
  • Despite technological advancements, protecting secrets remains an essential aspect of human existence.
Channel: TED
Video description

Visit http://TED.com to get our entire library of TED Talks, transcripts, translations, personalized Talk recommendations and more. In this glimpse into our technological future, cryptographer Craig Costello discusses the world-altering potential of quantum computers, which could shatter the limits set by today's machines -- and give code breakers a master key to the digital world. See how Costello and his fellow cryptographers are racing to reinvent encryption and secure the internet. Get TED Talks recommended just for you! Learn more at http://TED.com/signup. The TED Talks channel features the best talks and performances from the TED Conference, where the world's leading thinkers and doers give the talk of their lives in 18 minutes (or less). Look for talks on Technology, Entertainment and Design -- plus science, business, global issues, the arts and more. You're welcome to link to or embed these videos, forward them to others and share these ideas with people you know. For more information on using TED for commercial purposes (e.g. employee learning, in a film or online course), submit a Media Request here: http://media-requests.TED.com Follow TED on Twitter: http://twitter.com/TEDTalks Like TED on Facebook: http://facebook.com/TED Subscribe to our channel: http://youtube.com/TED