With its ability to run through prime number factorization in a heartbeat, will Quantum Computers Break Bitcoin?

Content index:

  • 00:00:00 INTRO
  • 00:01:21 Introduction to quantum computers
  • 00:01:56 The history of quantum computers
  • 00:02:50 How does quantum mechanics apply to quantum computers?
  • 00:03:36 Superpositioning?
  • 00:04:06 What is so interesting about quantum computing?
  • 00:05:27 Entanglement?
  • 00:05:45 Quantum computers and BIG DATA
  • 00:06:48 Quantum computer requirements
  • 00:07:40 Advantages and disadvangates of Qbits
  • 00:07:57 The quantum computer advantage
  • 00:09:07 Quantum computers explained to grandma with bullet-points

In this video, Sabine Hossenfelder explains how public key cryptography works on the internet today, using RSA as example, what the risk is that quantum computers pose for internet security, what post-quantum cryptography is, how quantum key distribution works, and what quantum cryptography is.

Video contents:

  • 0:00 Intro
  • 0:31 Public Key Cryptography
  • 2:43 Risk posed by Quantum Computers
  • 4:03 Post Quantum Cryptography
  • 5:31 Quantum Key Distribution
  • 10:25 Quantum Cryptography and Summary
  • 11:16 NordVPN Sponsor Message
  • 12:28 Thanks

Quantum technology has the potential to revolutionize whole fields of computing; from cryptography to molecular modelling. But how do quantum computers work? Subscribe for regular science videos: http://bit.ly/RiSubscRibe

Join leading experts to untangle the quantum computing hype, at this event supported by the Embassy of the Kingdom of the Netherlands.

Not content to school the world on the wonderful world of AI, Siraj Raval brings his unique teaching style to bare on the mathematics behind cryptography (and, by association, cryptocurrencies).

From the video description:

The math behind cryptography is immensely fascinating, I could spend all day studying it! We’re going to go over some fundamental cryptographic concepts like hashing, zero knowledge proofs, and my favorite ‘ZK-Snarks’. This is quite an in-depth video, i had to pick and choose the topics i wanted to dive into more. There is so, so much i could talk about. Each of these topics could deserve their own course. Cryptography is going to be paramount to building future decentralized Artificial Intelligence systems that we can both control and protect from attackers.