Why Quantum Computing Requires Quantum Cryptography

  Рет қаралды 446,139

PBS Space Time

PBS Space Time

Күн бұрын

Пікірлер: 1 100
@SophieSchmieg
@SophieSchmieg 5 жыл бұрын
Cool video as always, but this time I have two comments: - The description of RSA contained a minor mistake, both factors have to be big (otherwise factoring is trivial in O(p) time, with p being the smaller factor). - The future of classical cryptography isn't quite as grim as the video makes it sound. There are several candidates for post quantum cryptography, based on lattices, hashes, and isogenies of supersingular curves. They are currently being standardized by NIST. The upside of these is that they do not require the transfer of quantum objects, which is a bit tricky, to say the least.
@AdamJayS
@AdamJayS 5 жыл бұрын
Add me on LinkedIn if you have it
@williamwesner4268
@williamwesner4268 5 жыл бұрын
Would current fiber optic infrastructure not be capable of efficiently transmitting polarized photon packets?
@SophieSchmieg
@SophieSchmieg 5 жыл бұрын
@@williamwesner4268 I'm not an expert on fiber optic cables, as far as I know it's not that simple because you have to identify a single photon. On top of that you have switches between networks to deal with, where you'd need to somehow transport the quantum state from one wire to the next. Currently you go up the ISO stack at least a few layers to do so, which I can't see being possible with quantum objects.
@Darkhunter190able
@Darkhunter190able Жыл бұрын
​@@williamwesner4268you're not transmitting the actual photon here - you are transmitting information about the photon.
@amihart9269
@amihart9269 Жыл бұрын
The future of quantum cryptography is actually... nothing, it has no future. The BB84 protocol mentioned in the video can be trivially broken using a man-in-the-middle attack. It can only detect if someone observes a key in transit, but you can avoid ever observing a key in transit by the eavesdropper generating a second key which they can send to the recipient pretending to be the sender and receive another key from the sender by pretending to be the recipient. They would eavesdrop by decrypting the sender's messages with the sender's key and then re-encrypting them with their own key and sending that to the recipient. Not only is the BB84 protocol trivially broken and eavesdropping is possible, but even if it couldn't be broken, it still is not a good algorithm, because it does not actually _prevent_ a person from observing the key in transit, it only prevents communication if a person is observing the key. That means person could just intentionally observe the communication line in a sort of denial-of-service attack that would make communication on that line impossible. There is actually no solution to these problems. The Diffie-Hellman key exchange is well known to also be susceptible to a man-in-the-middle attack, but this is thwarted by combining it with a quantum digital signature algorithm. But it is provably impossible to construct a scalable quantum digital signature algorithm that would be at least as unbreakable as the quantum one-time pad (which it would be pointless to use quantum encryption if your key exchange algorithm is not at least as secure as it). The reason this is provably impossible is because quantum cryptography is centered around the No Cloning Theorem, but the No Cloning Theorem does not actually say you cannot clone qubits, but that you cannot derive enough information from a single qubit to then clone it. If you had millions of qubits in the same state, you could do statistical analysis on them and figure out their internal state, and then begin cloning them. Hence, the No Cloning Theorem would actually break down in any public key based cryptography since they rely on an arbitrary number of public keys being able to be distributed. The only documented quantum digital signature algorithm I'm aware of is the Gottesman-Chuang algorithm, but even they note in their own paper it is not scalable because the security declines the greater the number of copies of the public key are made.
@entyropy3262
@entyropy3262 5 жыл бұрын
That polarised filter stuff is very well explained.
@bormisha
@bormisha 5 жыл бұрын
It sounds so weird! I need to try it out with real polarization filters!
@annoloki
@annoloki 5 жыл бұрын
I don't think it is, the description of the filter is incomplete... it says what happens to light that passes through, but not the light that is "blocked"... this light is actually absorbed, and can be re-emitted by the crystals in the new orientation, which can constructively interfere with the light that passes through, which is why adding the middle filter means you get light pass through the third... at each stage, you're absorbing the light that won't get through, and re-emitting it at the new angle, so while you might get 50% of the light passing through, the amount of light that you detect the other side is more than 50%. A filter can't simply throw 50% of the energy away, energy must be conserved.
@BadDogeU
@BadDogeU 5 жыл бұрын
​@@annolokiThat's simply not true.
@Xeridanus
@Xeridanus 5 жыл бұрын
@@annoloki That energy conserved is usually transformed into heat, just like when light is absorbed by anything else. It doesn't have to be reemitted as light.
@Cythil
@Cythil 5 жыл бұрын
I do not find is such a hard concept to understand as long as one change perspective a bit.
@tomareani512
@tomareani512 5 жыл бұрын
Quantum Internet, huh? I can see it now: "You might or might not have mail!"
@perks6292
@perks6292 5 жыл бұрын
"You've got or have not got mail!"
@seventyfive7597
@seventyfive7597 5 жыл бұрын
Well, there are additional options, such as when you try to check the weather, but get mail, since you're checking for mail hence the weather report gets polarized to the mail axis.
@togwam
@togwam 5 жыл бұрын
Tom Areani you may or may not be connected to the internet
@Vasharan
@Vasharan 5 жыл бұрын
My news feed is already alarmingly polarized.
@colleen9493
@colleen9493 5 жыл бұрын
More like, “you have mail and you also do not have mail”
@EebstertheGreat
@EebstertheGreat 5 жыл бұрын
2:15 In fact, both prime numbers p and q have to be very large. For optimal security, both should be of similar magnitude.
@CrashM85
@CrashM85 5 жыл бұрын
Agreed, you also wouldn't exchange a "private key" under a bridge, you would exchange a "symmetric" under a bridge. No one other than yourself should ever know your private key.
@fmaz1952
@fmaz1952 5 жыл бұрын
Like 11 and 3?
@Ceelvain
@Ceelvain 5 жыл бұрын
Both should be very large, but not too close. Otherwise some methods would find the prime factors very quickly. Like the quadratic sieve IIRC.
@EebstertheGreat
@EebstertheGreat 5 жыл бұрын
​ F Maz With modern computers, we can sometimes handle even larger primes. @@Ceelvain Yes, in principle there are a lot of details you should follow for RSA, those just weren't details that came up in the video.
@Halberdin
@Halberdin 5 жыл бұрын
@@CrashM85 The exchange would be of the respective public keys. They can also be transferred openly if they are signed by someone trustworthy (creating a certificate) or if the key fingerprint can be checked over a different, secure channel. Of course, symmetric keys can be shared under the bridge, too. But with a secure channel using RSA, this is not necessary. Symmetric encryption is used for the actual data because it is much faster.
@warren286
@warren286 5 жыл бұрын
A secret rendezvous under the Einstein-Rosen Bridge 🤓
@striker22343
@striker22343 5 жыл бұрын
@Dog Ma Why are you being so rude to someone making a joke? They don't mean it literally, it's a play on words.
@WWLinkMasterX
@WWLinkMasterX 5 жыл бұрын
"I got salty over an obvious joke so I'm SMART!"
@chrisholdread174
@chrisholdread174 5 жыл бұрын
i literally LOL'ed
@warren286
@warren286 5 жыл бұрын
@Michael Bishop you got me there! 🤓
@zes3813
@zes3813 3 жыл бұрын
wr
@marie-helenemoreau5968
@marie-helenemoreau5968 5 жыл бұрын
Gilles Brassard the co-developer of BB84 is from my hometown! Fun fact: he started university at 13, got his bachelor's degree at 17, Master's at 20, and PhD at 24. He also helped develop quantum teleportation! A true genius.
@taliastocks
@taliastocks 5 жыл бұрын
Slight correction: It is possible to have public-key security in a post-quantum computing world using classical computers, for example with lattice-based cryptography.
@veggiet2009
@veggiet2009 5 жыл бұрын
Go on...
@Smerpyderp
@Smerpyderp 5 жыл бұрын
Go on...
@vinlud
@vinlud 5 жыл бұрын
en.wikipedia.org/wiki/Lattice-based_cryptography
@ReaperUnreal
@ReaperUnreal 5 жыл бұрын
I'm also a big fan of supersingular elliptic curve isogeny cryptography. There's a whole bunch of post-quantum classical encryption schemes.
@mscheese000
@mscheese000 5 жыл бұрын
I think that's more than a slight correction. It refutes the entire premise of the video, although most of the information presented is still accurate. But yeah, there are definitely classical asymmetric encryption and key-exchange algorithms that are quantum resistant.
@johnscott6072
@johnscott6072 5 жыл бұрын
The Quantum Internet will have lots of Schrödinger's cat videos.
@michaelworkman4057
@michaelworkman4057 5 жыл бұрын
But the weird thing about schrodinger jokes is that they remain both funny and unfunny even after they are viewed >;
@nandkumarzagade9583
@nandkumarzagade9583 4 жыл бұрын
@@michaelworkman4057 woah
@privateness.network
@privateness.network 3 жыл бұрын
that's the whole point of making it; memes and cat videos and I think (in 2018) Emercoin Randpay implemented enough radomness if used in that way actually allow QKD without any quantum computers
@rufflefpv
@rufflefpv 2 жыл бұрын
Quantum KZbin might or might not have dislikes
@jaehoo_park
@jaehoo_park 2 жыл бұрын
With Quantum KZbin, you can view and not view a video.
@_Killkor
@_Killkor 5 жыл бұрын
Me, trying to grasp cryptography: _this is difficult, to be honest_ Quantum cryptography: *hElLo tHeRe*
@discomfort5760
@discomfort5760 5 жыл бұрын
You encode using probability. Makes zero sense, but it works. Similar to how our Universe works, it just does.
@Eric_Pham
@Eric_Pham 5 жыл бұрын
GeNeRaL kEnObI, yOu ArE a BoLd OnE
@michaelcharlesthearchangel
@michaelcharlesthearchangel 5 жыл бұрын
Super dense information/transformation/interformation is a difficult subject/project to comprehend. But quantum computer scrypts are meant to help us utilize quantum machine-human language, polysemiotic holographic lanGuage, in the easiest to understand method. So ya. H🤓llo tHere¡
@firen777
@firen777 5 жыл бұрын
Quantum Cryptography: O̥̣͕̫b̷̼͖͓͎̟̤s͈̳̖͉̼͎̀e̯̻r̶v̙̠͓̯e͝
@AURADRCalifornia
@AURADRCalifornia 5 жыл бұрын
Hey, I hear you. Me too🤔 keep learning PEACE-OUT
@delson84
@delson84 5 жыл бұрын
Misleading on Internet security. I'll assume the physics is correct, but the security aspect is not. QC only breaks some public-key algorithms, not all. Yes, it breaks RSA. But we already have algorithms it doesn't break, and they don't need special quantum hardware to run; your phone can run them today. "Post-quantum cryptography" is the field that researches these algorithms.
@PlasmaHH
@PlasmaHH 5 жыл бұрын
which ones are you referring to? even with elliptic curve you can use shors algorithm to break it
@liquidluck711
@liquidluck711 5 жыл бұрын
Thank you mork and micro for putting some real information out about cryptography. This video came across as a 5th grade level scare tactics to get younger generations to want quantum computing because of "muh privacy". We dont have privacy already and it's not like this Gov shill will mention that...there are still unbreakable codes used today that neither ai or quantum ai can predict. For them to be able to predict the keys would be to simulate massive amounts of raw irregular data and make sense of it. It cant. Atleast not in our lifetimes. Possibly our kids....
@Fermion.
@Fermion. 5 жыл бұрын
@@liquidluck711Hmm, talking about "muh privacy" and government shills? This is a scientific channel; Alex Jones is that way ----> www.infowars.com/
@delson84
@delson84 5 жыл бұрын
I don't follow this well enough to explain it; recommending "post-quantum cryptography" as a search term is the best I can do. From a security standpoint, the important thing is that the key sizes are larger (but not too much larger), and not all the algorithms are good at generating disposable session keys (a property called "forward secrecy"). But some are, and the researchers have time to find more. This media narrative "we need quantum tech for when the quantum computers factor our numbers" is popular, because it makes quantum computing sound more exciting. But it's unfair to the researchers finding new algorithms, and it scares the public unnecessarily.
@liquidluck711
@liquidluck711 5 жыл бұрын
@@Fermion. lmao except Alex Jones is a shill too. Science is not a democracy and popular vote should not rule what gets said and what doesnt. Looking into the past, look no further than Nikola Tesla who died penniless and a public joke, yet it was his patents which brought about the modern age. AC current, telecommunication devices, motors/generators, etc. Yet for some odd reason, he believed in aliens and was labeled a lunatic. This channel only tells you the surface level of popular science. And is gov funded (even tho they say viewers are the ones keeping the channel going)..I'll edit this comment with some links in a bit. Edit 1: TR3B Anti-Gravity Spacecraft - credible link: www.google.com/amp/s/www.military.com/video/aircraft/military-aircraft/tr-3b-aurora-anti-gravity-spacecrafts/2860314511001/amp Edit 2: Plasmoid vs Black hole? Idk, let's put it to a vote... kzbin.info/www/bejne/gGWxl5mKp8R6g80 Need more? I have a library full of truth, this channel doesnt even talk about 5% of what's real...
@MrRolnicek
@MrRolnicek 5 жыл бұрын
Regular internet is full of misinformation. Let's ask the QUANTUM internet: Me: "Hey quantum internet, is this true or false?" QI: "Yes."
@jogandsp
@jogandsp 5 жыл бұрын
Technically it’s correct though. The chance of your statement being true or false is 100%
@MrRolnicek
@MrRolnicek 5 жыл бұрын
@@jogandsp I was referring to the phenomenon of quantum states being in superposition of both contradictory possibilities at the same time.
@MrKelenek
@MrKelenek 5 жыл бұрын
it might or might not
@entyropy3262
@entyropy3262 5 жыл бұрын
Truth does not exist, that is why the question cannot be answered correctly (or told in another way : with certainty).
@lyrimetacurl0
@lyrimetacurl0 5 жыл бұрын
In a superposition it is true *and* false. (True *or* false means it's not in a superposition).
@wntu4
@wntu4 5 жыл бұрын
Quantum internet: When the pages load before you knew you were going there.
@galgrunfeld9954
@galgrunfeld9954 5 жыл бұрын
Where the ad tunnels into your house
@r7diego
@r7diego 5 жыл бұрын
nice one !! 😂 😂 😂
@elinope4745
@elinope4745 5 жыл бұрын
Already happens to me. Sometimes the KZbin algorithm is downright scary, and sometimes it is laughably wrong.
@LuisAldamiz
@LuisAldamiz 5 жыл бұрын
The page migh or not load. It may be this or that page. Wait, it sounds familiar...
@Xackus
@Xackus 5 жыл бұрын
Browsers can do this already
@sogerc1
@sogerc1 5 жыл бұрын
Oh come on, no cryptography related example worth it's salt without Alice and Bob.
@AmpDecay
@AmpDecay 5 жыл бұрын
bringing back the pain that was intro to computer security class, only time i've ever had to use a long long int lol
@TimLF
@TimLF 5 жыл бұрын
Salt having 3 meanings
@Vercingetorix525
@Vercingetorix525 5 жыл бұрын
"Of course, you could just meet under a bridge" had me cracking up, I love it. The "metaphorical quantum mechanics bridge" follow up seemed kind of Vsauce-yish but with a touch of O'dowd to make it work. Watching new episodes of Space Time is always one of my favorite parts of the week. #O'dowd2020
@austinglugla
@austinglugla 5 жыл бұрын
It is not necessarily true that all classical cryptographic ciphers will be compromised. There are many algorithms that will only have to adjust their properties in a post-quantum era. For example, symmetric key block ciphers(such as AES and Twofish) will only need to double their key size in order to remain secure against attack from Grover's Algorithm. By that same token, most hash functions will also remain secure with similar adjustments.
@michaelsommers2356
@michaelsommers2356 5 жыл бұрын
Why don't Albert and Niels just wait until the next Solvay Conference to meet and exchange keys?
@terryboyer1342
@terryboyer1342 5 жыл бұрын
Because they're dead. Or not.
@LuisAldamiz
@LuisAldamiz 5 жыл бұрын
That would be too primitive, almost like using Cherokee translators instead of cryptography. Oops, they did it, it worked.
@G0NZA11
@G0NZA11 5 жыл бұрын
I miss PBS Infinite Series :( (at least we have 3blue1brown...)
@g07denslicer
@g07denslicer 5 жыл бұрын
What?? What happened to Infinite Series?
@peterpiper6
@peterpiper6 5 жыл бұрын
@@g07denslicer The guru, who was kissed by fire, left to conduct throrough research of the Banach space. Then they brough back the Sith Lord who used to host this show and we all know and love to fill the gap. Then the corporate tycoons decided to make the infinite series finite. Hope that clears things up!
@G0NZA11
@G0NZA11 5 жыл бұрын
@@g07denslicer kzbin.info/www/bejne/i3ran3alpt1sZ7M
@paultapping9510
@paultapping9510 5 жыл бұрын
Me too 😔
@gabor6259
@gabor6259 5 жыл бұрын
Don't forget about the Mathologer.
@alonamaloh
@alonamaloh 5 жыл бұрын
"One of which is very large" [2:15] is not going to cut it. Trial division or [even better] Pollard's rho algorithm would crack the key very quickly if one of the primes is small.
@benibachmann9274
@benibachmann9274 5 жыл бұрын
Correct, both should be large and of similar magnitude. The public key consists of the product of those two numbers and an exponent (e). This exponent can be small. Many implementations simply take 65537. Maybe the confusion comes from this fact.
@LesMiserables10th
@LesMiserables10th 5 жыл бұрын
"small" in this case means at least 1.340781e+154. Not exactly small, and that's just SHA 256.
@lanvu9323
@lanvu9323 5 жыл бұрын
I like watching videos about knowledge that I'm not capable to understand.
@pflernak
@pflernak 5 жыл бұрын
Hopeing something rubs off on you, aye. #MeToo
@2hedz77
@2hedz77 5 жыл бұрын
I feel smarter...and dumber at the same time. Is that something to do with quantum superposition?
@lanvu9323
@lanvu9323 5 жыл бұрын
2Hedz maybe you just got quantum-ed
@pflernak
@pflernak 5 жыл бұрын
@@2hedz77 Its the intelligence uncertainty principle: "The greater the intelligence the larger the uncertainty in it."
@2hedz77
@2hedz77 5 жыл бұрын
Haha nice
@AFastidiousCuber
@AFastidiousCuber 5 жыл бұрын
To anyone interested in learning about quantum algorithms, I suggest reading "Quantum Algorithms via Linear Algebra: A Primer" by Richard J. Lipton and Kenneth W. Regan. If you've taken an introductory linear algebra class then you already know everything you need, the math is much nicer than you may think.
@LunarDelta
@LunarDelta 5 жыл бұрын
Too much bass and a huge suckout in the mids in the audio. New mic? Poorly mixed?
@benw-l7k
@benw-l7k 5 жыл бұрын
i think you've been smoking crack, sounds good to me
@LunarDelta
@LunarDelta 5 жыл бұрын
@@benw-l7k I'm not the only person to mention this, so I think you're either not experienced enough to hear it or just have shitty equipment.
@geoffgordon5445
@geoffgordon5445 5 жыл бұрын
Shut up and watch the video asshole
@mikejones-vd3fg
@mikejones-vd3fg 5 жыл бұрын
sound like a room effect, maybe they're in a new studio?
@a64738
@a64738 5 жыл бұрын
It sounds really weird, like a some sort of distorted deep bass sound added to the voice. Think it muse be something wrong with the equipment somewhere, have heard something almost identical before on a laptop mic. You will probably on hear that effect on speakers that go deep in the bass.
@traviscobbs
@traviscobbs 5 жыл бұрын
While current public/private key algorithms aren't quantum safe, research is ongoing for non-quantum algorithms that will be safe from quantum computers. Take a look at "Post-quantum cryptography" on Wikipedia. So the advent of practical quantum computers does NOT necessitate quantum cryptography.
@iainmackenzieUK
@iainmackenzieUK 5 жыл бұрын
Sound (and video?) quality seems a bit dicey. A second, best copy available??
@thewavewarden3315
@thewavewarden3315 5 жыл бұрын
yeah sounds like a hally studio to me
@T33K3SS3LCH3N
@T33K3SS3LCH3N 5 жыл бұрын
Yeah there is an annoying background sound throughout. Great episode otherwise but its a bit harder to listen to than normally.
@nerdbot4446
@nerdbot4446 5 жыл бұрын
It's probably that Werner guy that messed with the soundwaves
@iainmackenzieUK
@iainmackenzieUK 5 жыл бұрын
@@T33K3SS3LCH3N Maybe there is a "middleman" interrupting the communication... :)
@AngDavies
@AngDavies 5 жыл бұрын
hmm, the background music seems a bit more lively than usual, or is that just me? maybe the compression is having trouble dealing with it+ his voice.
@RobertQuattlebaum
@RobertQuattlebaum 5 жыл бұрын
I'm not a physicist, but I do know a thing or two about cryptography, as well as a working understanding of quantum key exchange (QKE). The physics described in the video seem spot on, but the cryptography bits are highly misleading. QKE is not a viable way to address the security problems that will come from powerful quantum computers, for a variety of reasons: 1. Quantum computers don't break all existing cryptography. Symmetric encryption is weakened to effectively half of the key size. This problem is addressed by doubling the key size. 256 bit keys become the new normal, and yes, that is plenty. The mechanisms that Quantum computers completely break are the classical algorithms for authentication and key-exchange: RSA, ECC, etc. 2. QKE can only be used to secure the point-to-point links that have a high-quality "quantum channel" between them to facilitate the key exchange. This is typically requires line-of-sight or expensive wave-guides (like fiber-optics). Thus, QKE does not scale without "trusted repeaters", which can't be trusted by everyone. It also does nothing for authentication. 3. The industry is currently hard at work to develop quantum-hard asymmetric key-exchange and authentication algorithms to replace RSA and ECC. Indeed, quantum hard authentication mechanisms (like Merkle signatures) do already exist. QKE has its uses, but it doesn't address the real problems that quantum computers create. A "Quantum Internet", where planet-wide end-to-end switchable quantum channels are a reality, isn't likely physically possible. Even if it were, it just doesn't provide enough security over simply doubling the symmetric encryption key size and using quantum-hard classical key exchange methods.
@alivateRocket
@alivateRocket 5 жыл бұрын
Also - there are post-quantum cryptography algorithms, where there are no known methods to break the underlying mathematical problem by quantum or classic computer. One is based on "lattice". So the answer to the problem of "Quantum Computers" breaking the "Factorisation of Large Primes" problem doesn't require a "Quantum Internet" solution, a different unbroken mathematical basis with classical computers should also work.
@acetate909
@acetate909 5 жыл бұрын
Quantum internet huh? "I got your email and I didn't get your email" sounds like fun.
@MrTomtomtest
@MrTomtomtest 5 жыл бұрын
More like "I got your email and I am certain no one has read it"
@ToxicTerrance
@ToxicTerrance 5 жыл бұрын
"Certainty is irrelevant, resistance is futile."
@acetate909
@acetate909 5 жыл бұрын
@@MrTomtomtest I was making a super position joke. You're making a literal quantum cryptography statement. Awesome job on getting the point of the comment 👍
@koenvandamme6901
@koenvandamme6901 5 жыл бұрын
You won't know if you received the email until you check if your cat is dead.
@michaelcharlesthearchangel
@michaelcharlesthearchangel 5 жыл бұрын
The Neuronet, the near future & quantum encrypted/enciphered "quantum internet", is very vary v_ry hologram heavy and super dense. Much like the Matrix 4's screenplay and hypergraphic novel. On Facebook before Thanksgiving of 2020's release in theaters worldwide. :; facebook.com/The-Matrix-4-495972587598587/
@charoleawood
@charoleawood 5 жыл бұрын
16:29 "At this point do we just give up trying to disprove the old man and just settle for the fact that it's probably all right?" Answer: NEVER!! I love this channel. Never stop never stopping, scientific inquiry! I am PASSIONATE about inquisition. I barely understand anything on this channel but I understand that and give a hearty Here Here!
@jeffwilken7241
@jeffwilken7241 5 жыл бұрын
Sounds like this wasn’t filmed at your typical location! Room reverb is boomy and gated. Fascinating content as always!
@Megalomaniakaal
@Megalomaniakaal 5 жыл бұрын
mic broke?
@jeffwilken7241
@jeffwilken7241 5 жыл бұрын
Felix Kütt Sounds like a diff. room!
@Megalomaniakaal
@Megalomaniakaal 5 жыл бұрын
@@jeffwilken7241 Might be moving the recording space/studio, so green screen temporarily set up in a random room with no sound proofing then? Now the real mystery is where are they moving?
@jeffwilken7241
@jeffwilken7241 5 жыл бұрын
Felix Kütt Hahaha indeed. Sounds like they’re in a superposition of studios.
@Megalomaniakaal
@Megalomaniakaal 5 жыл бұрын
@@jeffwilken7241 It's a studio but also a watermelon?
@EvenTheDogAgrees
@EvenTheDogAgrees 5 жыл бұрын
For those who don't understand one iota of the process, I had the same problem. So I had to look it up. This whole thing is not particularly complicated; here's a simpler explanation with some of the activities reshuffled for clarity. The first two steps are simply the creation, transmission and decoding of the bit string. 1) For each bit in a long string of bits, Albert picks a value (can be 1 or 0) and a basis (orthilinear or diagonal) through which to filter (encode) that value. This list of encoded values is sent to Niels. 2) Niels doesn't know which basis Albert used, so he has to guess as he decodes. On average, he will guess correctly about half the time. The next three steps throw away all the bits where Niels guessed wrong. Matt doesn't do this until much later, but these bits are useless anyway. So let's get rid of them now and reduce our cognitive load for the rest of the process. 3) Niels tells Albert which basis he used to decode each bit, but importantly: not which value he obtained. 4) Next, Albert compares Niels' choices to his own, and tells Niels where he guessed correctly. 5) Both parties now know which bits can be discarded since they would decode randomly anyway. After discarding them, they're left with about 50% of the bits in the sequence, since Niels guessed correctly about 50% of the time. Of all of these remaining bits, one thing is known for certain: if nobody was eavesdropping, both Albert and Niels should have the same values for them. Now we verify confidentiality of the photon communication. For this, some bits are sacrificed. 6) Albert and Niels decide on a subset of bits to compare amongst each other, and see if they match up. If the communication has been tampered with, odds of all bits decoding correctly are astronomically small since Heisenberg also had to guess, and only guessed correctly about half the time. So if we see anything other than a perfect 100% match for these randomly chosen bits, we know something's up. Finally, we can construct our key. 7) The key is simply the sequence of values for the remaining bits, after we've removed the sacrificial ones. Of these remaining bits, we know that the values have never been transmitted in the clear. They are known to both Albert and Niels, but nobody else. Sidenote: Matt doesn't remove the sacrificial bits from the key. And strictly speaking, it's not necessary. But their values have been transmitted over an open channel, so they may have been overheard. A key of 100 bits is exactly as strong as a key of 200 bits if the position and value of 100 out of those 200 bits in the second key are known. But the key takes up twice as much space, so there's no incentive to keep the 100 known bits around. Oh, and here's a list of errors I found in the animations. I may have missed some, so feel free to add to the list. 7:50 - Albert's second to last diagonal points in the wrong direction. 8:07 - Niels' diagonal points in the wrong direction. 9:14 - Werner's sixth diagonal points in the wrong direction. 9:24 Again, Niels' first diagonal points in the wrong direction for the value it decodes to. The problem I had with this video is that the narrative structure was quite confusing and made things more complicated than they need to be. The fact that Matt is a fast speaker, and that you're trying to interpret the complex matter he's presenting while simultaneously trying to interpret the fast moving visuals, _which in turn contain text as well_ that competes with Matt's voice for the same set of neurons that's responsible for decoding language, doesn't help. Yeah, as much as I appreciate how these guys and girls are trying to bring some intellect to KZbin, I sometimes wonder whether disseminating knowledge is actually anywhere on their list of priorities.
@nexusvoid314
@nexusvoid314 5 жыл бұрын
Ha! Jokes on you, my internet history is all past episodes of Spacetime
@FirstRisingSouI
@FirstRisingSouI 5 жыл бұрын
Hmm, interesting, it doesn't seem to go back before a few hours ago. . . .
@nexusvoid314
@nexusvoid314 5 жыл бұрын
@@FirstRisingSouI *Laughs nervously* pff, well yeah I only discovered the internet a few hours ago
@FirstRisingSouI
@FirstRisingSouI 5 жыл бұрын
@@nexusvoid314 Sure. That makes sense. *winks*
@gotenks222
@gotenks222 5 жыл бұрын
This is the first video i watched after discovering the internet
@atrumluminarium
@atrumluminarium 5 жыл бұрын
9:32 that's not a man-in-the-middle attack that's intercept-resend. BB84 cannot detect MitM but E91 can *Edit for clarification:* A MitM attack involves severing the AB connection entirely and setting up two distinct connections AE and EB and E pretends to be the other party to both of them. As far as A is concerned, she is talking to B and as far as B is concerned he is talking to A.
@annachow4631
@annachow4631 5 жыл бұрын
No, I'm pretty sure it's a man-in-the-middle attack. In order to perform an "attack," the original message (or key) must be manipulated; not just observed. Now if the point is detecting an eavesdropper, then I agree that BB84 won't work for that, but entanglement-based encryption will.
@atrumluminarium
@atrumluminarium 5 жыл бұрын
@@annachow4631 A MitM attack involves severing the AB connection entirely and setting up two distinct connections AE and EB and E pretends to be the other party to both of them. As far as A is concerned, she is talking to B and as far as B is concerned he is talking to A. E91 "solves" this by making the system symmetric between A and B and leaving the pair production to a third party. That way E would need to own her own (potentially expensive) equipment to carry out the attack undetected thus providing a barrier to entry
@bogdanieczezbyszka6538
@bogdanieczezbyszka6538 5 жыл бұрын
But isn’t that the whole point of quantum messaging that even reading the message changes it? What am I missing here?
@atrumluminarium
@atrumluminarium 5 жыл бұрын
@@bogdanieczezbyszka6538 it's the key that is being generated quantum mechanically. The message encryptions and transmissions are done as they already are in a "classical" way.
@delsquaredphysics2897
@delsquaredphysics2897 5 жыл бұрын
This is true
@briancrane7634
@briancrane7634 5 жыл бұрын
Best explanation of the 'sunglasses-lens' experiment that I've heard...thanks!
@yuvalne
@yuvalne 5 жыл бұрын
Veritasium and 3b1b have a wonderful collab about the quantum filter experiment in minute 7.
@Tondadrd
@Tondadrd 5 жыл бұрын
Forgot to clear the audio by Audacity? It really hurts my attention.
@uint16_t
@uint16_t 5 жыл бұрын
Sounds like compression artifacts
@trelligan42
@trelligan42 5 жыл бұрын
Or the background music got blended in somehow. 1:34 "Classical".
@3ATIVE
@3ATIVE 5 жыл бұрын
Did you change your audio setup?? Your voice is way Bass-y-er now.
@fatmn
@fatmn 5 жыл бұрын
Their productions techniques seem to vary greatly every week when it comes to lighting and audio.
@alejandromartinezmontes6700
@alejandromartinezmontes6700 5 жыл бұрын
I think it's missing EQ and compression.
@mikejones-vd3fg
@mikejones-vd3fg 5 жыл бұрын
@@alejandromartinezmontes6700 I think its a room effect, like they're in a larger room or something, hmmm, the mystery continues, is there anyway to test these hypothesis'es? We could train a neural network to process all the videos audio data and find out what happened, id imagine a quantum computer powered nueral network would definately figure it out.
@MrSomeSkeptic
@MrSomeSkeptic 5 жыл бұрын
Dude, I thought I was just really high. Thanks.
@sarcasmo57
@sarcasmo57 5 жыл бұрын
My darling I.... can't get enough of you love baby.
@alanlee1355
@alanlee1355 5 жыл бұрын
I love this channel even though i can't understand most of it half the time. 👍
@caixiuying8901
@caixiuying8901 5 жыл бұрын
lucky for you, I can't understand half of it most of the time
@samsonsliteye
@samsonsliteye 5 жыл бұрын
audio quality for this video sucks, what happened?
@TylerMatthewHarris
@TylerMatthewHarris 5 жыл бұрын
PBS needs to bring Infinite Series back :(
@zes3813
@zes3813 5 жыл бұрын
wrr, happyx nmw
@disgruntledwookie369
@disgruntledwookie369 5 жыл бұрын
Btw if anyone wants to try the experiment with the polarising filters, you don't really need 3 of them, you can use a PC monitor or TV as the light source. This light is already polarised. In fact, I noticed this weird quantum behaviour myself not long ago after buying a pack of polarising filters (I'm just a nerd). If you hold one filter up to the screen and turn it until no light gets through, you can then take another filter and place it behind the first one. As you rotate the new filter, you will see some amount of light coming through, which really is quite surprising when you first see it. I was puzzled, and immediately began trying to explain my observations, ultimately drawing on some quantum physics lectures from half a life time ago. I was reminded of the way electron spin works when measured (really the similarity between these experiments is no coincidence). If you measure an electron spin to be "up", then you will never afterwards find it "down". That is, unless you measure it again on a different axis, forcing the spin to collapse into one of the new eigenstates. Following this, there is a non-zero probability that the electron will be measured "down" in the initial axes. I might have butchered that explanation a bit, but the principle is the same as we see here with polarised light. It is a fundamentally quantum phenomenon, yet you can see it in your own home for the cost of a couple of polarising filters (pennies)
@filipsperl
@filipsperl 5 жыл бұрын
I suggest watching Veritasium's video on these quantum filters, it really helped me understand this one
@r7diego
@r7diego 5 жыл бұрын
For me was the oposite: this video clarified me some obscure stuff from Veritasium ... both are great !!
@trinitygoldmedia
@trinitygoldmedia 5 жыл бұрын
LMAO!! Thank you for that delivery.. Your humor @16:23 reminded me of Feynman discussing Cavendish, "Determining the constant of the gravitation equation... Weighing the Earth!!!". Your series is amazingly educational, humorous and just down right addicting! smh. Can't wait for the next one!
@andysantarelli3056
@andysantarelli3056 3 жыл бұрын
I just watched the entirety of the Quantum Mechanics Learning Playlist on this channel, and all the way up to now I've felt mostly comfortable in understanding the contents, even if it took me a bit. This one was a doozy for some reason though, much more difficult to wrap my head around.
@universaltravellers7906
@universaltravellers7906 Жыл бұрын
Nope, he I understand QP and Cryptography very well and I can tell you that he didn't this wasn’t his best work
@MaddGameMaker
@MaddGameMaker 5 жыл бұрын
It's not true that "even the most sophisticated classical security systems will be compromised". There are classical algorithms which are secure against quantum computers, such as Ring Learning With Errors.
@-sui-
@-sui- 5 жыл бұрын
As someone who does cryptography as his day job this video made me seriously cringe. Quantum computing does break RSA (and Elliptic Curve Cryptography and Diffie-Hellman based systems), but the obvious solution to this is not quantum cryptography. Instead we would switch to quantum-resistant cryptosystems such as NTRU which are basically drop-in replacements for the systems which get broken by quantum computing. Even though those admittedly come with a hefty performance penalty this is only an issue for the connection establishment as the actual data encryption is never done with public key cryptography but rather with symmetric cryptography for which a key is agree upon using public key cryptography. But most notably symmetric cryptography (such as AES) is not broken by quantum computing at all. The summary starting at 13:16 is false. You do not need a quantum internet for security in a post quantum computer age because quantum computing resistant public key cryptography is already available.
@dalebewan
@dalebewan 5 жыл бұрын
水 -sui- Thank you. Was about to try to explain all that myself, but you beat me to it.
@PappLacc
@PappLacc 5 жыл бұрын
What was wrong with the audio? It's a bit weird this time. New Mic. perhaps?
@mertk.2376
@mertk.2376 5 жыл бұрын
I think this audio is outright disturbing. I had to go watch an older video to calm myself after hearing this.
@kyjo72682
@kyjo72682 5 жыл бұрын
too much bass
@ploppyploppy
@ploppyploppy 5 жыл бұрын
They've had this before. It's due to the audio being overcompressed to achieve a uniform loudness. It's really quite an amateur home recording mistake so I can only think either they are skimping on the editing wage or their resident editor is not well :)
@cmilkau
@cmilkau 5 жыл бұрын
2:20 You definitely need to ensure that at least TWO prime factors are large. All small prime factors are easy to find and provide virtually no benefit for the extra cost. If you have all but one prime factor, finding the remaining factor is trivial.
@SvenLeuschner1
@SvenLeuschner1 4 жыл бұрын
how you weave "Spacetime" at the end of every video is magical
@willisverynice
@willisverynice 5 жыл бұрын
When people ask what I do with my physics degree, I tell them that I am able to watch PBS space time videos without having to go back and watch all the lead in videos first.
@christopherthomas9541
@christopherthomas9541 5 жыл бұрын
I love this show!! Sometimes I leave with a headache and having to re-watch it lol, but I love it!! Great job!!
@lloydchildress9239
@lloydchildress9239 5 жыл бұрын
You lost me at 3:08 falls apart...or did you gain me back on the uncertainty principle, yes I'm certain.
@MusicalRaichu
@MusicalRaichu 5 жыл бұрын
I think I only lasted a few seconds longer than you ... maybe we're entangled or something.
@JoshuaHillerup
@JoshuaHillerup 5 жыл бұрын
We won't need quantum cryptography to resist against quantum computers. There's a ton of classical cryptography algorithms out there that also can't be cracked by quantum computers, although you're right that the most popular algorithms are vulnerable. But switching our encryption libraries/protocols is a lot easier/cheaper than setting up these quantum computer setups, since no new hardware is needed.
@jeanvincent4764
@jeanvincent4764 5 жыл бұрын
Yet quantum cryptography would be very cool. The main issue I see is that quantum cryptography might be very hard to implement end-to-end, say in everyone's smart phone.
@JoshuaHillerup
@JoshuaHillerup 5 жыл бұрын
@John T why? Encryption has to be end to end to work.
@JoshuaHillerup
@JoshuaHillerup 5 жыл бұрын
@John T what do I do about evesdropping along A-K and N-Z?
@JoshuaHillerup
@JoshuaHillerup 5 жыл бұрын
@John T huh?
@louis-philip
@louis-philip 5 жыл бұрын
New production team? Sound and image have been a bit off for the last few episodes compared to what it was. Anyway, always good content though!
@mykulpierce
@mykulpierce 5 жыл бұрын
Very nice to see this concept being developed more fully.
@hiqwertyhi
@hiqwertyhi 5 жыл бұрын
oh no the ridiculous audio compression is back...
@da1otta
@da1otta 5 жыл бұрын
Yeah, Matt sounds slightly drunk because of it.
@danielyount9812
@danielyount9812 5 жыл бұрын
Excellent topic of quantum encryption(One of my favorites). With IBM and Google and even Canadian company D-wave, the Quantum computer for everyday use use is quickly becoming a reality. Knowing how to protect its data and what to watch out for and when to completely discontinue classical encryption methods.
@philippvoid1800
@philippvoid1800 5 жыл бұрын
heatdeath is coming... still a better story than winter is coming
@the1exnay
@the1exnay 5 жыл бұрын
Is there a difference? The heat death will probably be rather cold
@tehguitarque
@tehguitarque 5 жыл бұрын
(1) Thank you for being someone who finally explains the 3rd polarization phenomena! I've never heard a fundamental explanation before.. (2) You... and I've noticed this from the start.. use Star Trek SFX. Where'd you get them all? wav files from a bunch of old ST games? That's the only place I've found them! My inner child must know!
@JWhittskey
@JWhittskey 5 жыл бұрын
new mic? The EQ sounds off on all of the dialog
@Stabacs
@Stabacs 5 жыл бұрын
Justin Whittenberg monolog
@xenorac
@xenorac 5 жыл бұрын
Thank You! I thought it was my hearing!
@MrSchrodingersCat01
@MrSchrodingersCat01 5 жыл бұрын
While Quantum computing is interesting, it is important to understand that no practical quantum computer currently exists. In fact, quantum computing may not be practical in the foreseeable future. That is quite a claim, but this article explains it better. spectrum.ieee.org/computing/hardware/the-case-against-quantum-computing
@pij3333
@pij3333 5 жыл бұрын
As as cryptography nerd I felt voilated when you switched out Alice and Bob. Also, really interested in hearing about how they solve packet routing when sending quantum bits over the internet without breaking the entaglement
@kevinr7216
@kevinr7216 5 жыл бұрын
Bruh ive been watching your vids for years nonstop, and ive never asked this, HOW DO YOU KNOW SO MUCH.....
@MegaRabbitPower
@MegaRabbitPower 5 жыл бұрын
Did you guys just cover the Triple Polarizer Paradox off-handedly without an episode to cover how it implies there's potentially no such thing as free will? For shame.
@FineFlu
@FineFlu 5 жыл бұрын
I’ve come to appreciate the craftsmanship in these videos. Well done
@artemZinn
@artemZinn 5 жыл бұрын
PhD in Quantum Mechanics Voice: **IM IN**
@pierreabbat6157
@pierreabbat6157 5 жыл бұрын
Actually, there are three independent ways the polarization can be measured: orthogonal, diagonal, and circular. Circular polarization is fundamental, as the two states are the same as the signs of the photon's spin; orthogonal and diagonal polarizations are superpositions of two circular polarizations with different phase differences.
@danfg7215
@danfg7215 5 жыл бұрын
I’m now in a superposition of understanding and not understanding this video 🤔
@cleemcnabb2363
@cleemcnabb2363 6 ай бұрын
It's fine the only difference in you and them is they know how to do the math for what they are also in a superposition of understanding and not understanding.
@Practicalinvestments
@Practicalinvestments 3 ай бұрын
I now collapse the wave function by pointing out that if you understood the video, then you couldn’t ’not understand’ therefore: you don’t understand the video
@eddyestevez500
@eddyestevez500 5 жыл бұрын
I can imagine how hard it is to write these episodes. Adapt the technical text in way that is understandable by the general public AND do not sacrifice the accuracy of the concepts.
@TheLevano22
@TheLevano22 5 жыл бұрын
Internet, where you can find Joe Jonas explaining Quantum Physics to you.
@wesleyrm76
@wesleyrm76 5 жыл бұрын
I like this much more than the Peter Dinklage comparisons
@Hisu0
@Hisu0 5 жыл бұрын
Cavemen.
@ananths5905
@ananths5905 5 жыл бұрын
As a computer science student and now developer just thinking that computing hasn't changed much in the last many years this video was very interesting
@DingoDjango
@DingoDjango 5 жыл бұрын
You might be interested in a video titled "Quantum Computing for Computer Scientists" on the Microsoft Research channel
@fzigunov
@fzigunov 5 жыл бұрын
The problem with quantum internet is that we still have to invent quantum modems... (Not kidding, if cryptography is physics-based instead of math-based, how to handle sending unaltered pairs of photons over very long distances across multiple switches and servers? How to handle traffic from multiple clients?)
@kukulroukul4698
@kukulroukul4698 5 жыл бұрын
just throw a shovel of coal in the system
@kaitlyn__L
@kaitlyn__L 5 жыл бұрын
Totally. The existing functional experiments send the quanta directly. There's a lot to go into making this functional.
@HakaiKaien
@HakaiKaien 2 жыл бұрын
Personal quantum computer may be off the table for a very long time but I strongly urge people with the necesary resources to invest massively in this technology. Just a few stable quantum computers, with a few thousand qubits will change the world
@osmosisjones4912
@osmosisjones4912 5 жыл бұрын
Negative mass asentally is the flow of Mass. Away from heavy bodies as a pose to towards. When molecles are excelurared .they get denser. And some energy should get released. As your ship gets faster
@paramountx
@paramountx 5 жыл бұрын
Lol I've seen Matt a few times in NYC. First time he gave me that look that was like "yeah, I am that person" when I was glancing. The second time he was in a rush and I don't think he had time to talk. Either way; my hero
@tinymidged
@tinymidged 5 жыл бұрын
What do you use as background music, its soo relaxing!
@soliddanii
@soliddanii 5 жыл бұрын
The background music at the end during the comments is from "sine wave digital" (radio station from the game: the crew)
@tinymidged
@tinymidged 5 жыл бұрын
Thanks for the answer :).
@mynameisZhenyaArt_
@mynameisZhenyaArt_ 5 жыл бұрын
2:06, NO, it is called PSK (Pre-Shared KEY). Also, We not only use RSA, but Diffie-Hellman alg. as well, combined with AES most often...
@samirm
@samirm 5 жыл бұрын
You can have quantum resistant classical cryptography though...
@sethgrasse9082
@sethgrasse9082 5 жыл бұрын
Great video on quantum cryptography. In case anyone's wondering, the mathematics of how quantum computing beats classical cryptography is very well explained in MinutePhysics.
@Thee_Sinner
@Thee_Sinner 5 жыл бұрын
_Infinite Series_ was a finite series.
@petersinclair3997
@petersinclair3997 5 жыл бұрын
Uriah Siner .... Well depend how many times a finite series be divided? Zeno would fun, here.
@johnransom9983
@johnransom9983 5 жыл бұрын
I have played around with the IBM publicly available quantum computer. I want to point out something in the FAQ. "Superposition is strictly weaker than full parallelism, and strictly stronger than probabilism." You can find this at quantumexperience.ng.bluemix.net/qx/tutorial?sectionId=beginners-guide&page=000-FAQ_for_Beginners~2F001-FAQ_for_Beginners. You and others frequently say that because of superposition that it can do multiple computations at once. That is incorrect from my experience of playing around with it. Ordinary computers already have full parallelism and therefore that is not how quantum computers will be faster. It is the entanglement property that will give them an advantage but only in certain types of calculations. Otherwise conventional computing will be faster.
@KohuGaly
@KohuGaly 5 жыл бұрын
ordinary computers do not have full parallelism. Their parallelism is limited by the number of physical circuits that you connect in parallel. Whenever you have a problem that can be beaten by full parallelism, you can still make it practically unsolvable, by ramping up the parallel paths necessary to solve it quickly. Quantum computers technically can compute multiple things at once, but you can actually read out only one of the results randomly. Superposition allows you to cancel out the "wrong answers" so you only read the right ones. It only works in some special cases, which is why QC is weaker than parallel computing.
@tutoringwestern4970
@tutoringwestern4970 5 жыл бұрын
I think we need two videos next week to make up for this late one with bad audio.
@XEinstein
@XEinstein 5 жыл бұрын
This was the first PBS Space Time video that I actually didn't find that interesting. Normally, any PBS-ST upload is a highlight of my weekend. I guess I'm becoming spoiled with all the wonderful content this channels normally delivers.
@charlesrosenbauer3135
@charlesrosenbauer3135 5 жыл бұрын
Or we could just use Quantum-Resistant Cryptography like NTRU.
@octoman_games
@octoman_games 5 жыл бұрын
Like IOHK and Cardano are using
@ThueJanusKristensen
@ThueJanusKristensen 5 жыл бұрын
The impractical key you exchange under a bridge would be called a "symmetric key" or "shared secret". A "private key" (the term you used) is one half of an asymmetric key pair as used in e.g. RSA.
@joshderr
@joshderr 5 жыл бұрын
Thanks for the video, and for reminding me that Infinite Series was awesome but is also no more :(
@veggiet2009
@veggiet2009 5 жыл бұрын
I really miss infinite series, I it was my favorite of pbs shows
@nafrost2787
@nafrost2787 5 жыл бұрын
6:50 Are you sure that this is because of the Heisenberg uncertainty principle? I thought it is because in quantum mechanics only certain quantized values are allowed.
@randycarvalho468
@randycarvalho468 5 жыл бұрын
Wtf is with the audio in this? Sound like Max Headroom.
@madscientistshusta
@madscientistshusta 5 жыл бұрын
Thnx for using niels bohr, i never get to see enough bohr rep in these science channels and he's kinda my hero.
@freezybut
@freezybut 5 жыл бұрын
3:46 what would you do if we kissed under the metaphorical quantum mechanical bridge?? ☺️😍👀
@Belodri
@Belodri 5 жыл бұрын
Since you know where you were, you wouldn't know if you had kissed or not.
@PeterB12345
@PeterB12345 5 жыл бұрын
Or you knew you kissed but had no idea where!
@DaKoopaKing
@DaKoopaKing 5 жыл бұрын
ZOOMERS OUT
@AndrewKay
@AndrewKay 5 жыл бұрын
"Choose two prime numbers, one of which is very large, multiply them together to get an even larger number, and broadcast that as your public key" They both have to be large! The smaller the factors are, the easier they are to find by trial division. Generally, both prime numbers are chosen on the same order of magnitude. Not just for security - the RSA encryption and decryption processes only work when the message is coprime to the public key, so if it has a small factor then there's a non-negligible chance of a message sharing this factor and being undecryptable. It's also just more efficient to generate e.g. a 2048-bit key by finding two 1024-bit primes than it is to generate a 2000-bit prime and a 48-bit prime, because primality-testing algorithms are much worse than linear complexity in the number of bits.
@S.R.400
@S.R.400 5 жыл бұрын
Thanks for the reminder.. RIP Infinite Series:(
@BlueZirnitra
@BlueZirnitra 5 жыл бұрын
I only learned of it from this video and just subscribed, what happened to it?
@andrewxc1335
@andrewxc1335 5 жыл бұрын
Ran out of funding vs. the size of the audience. It was pretty sad.
@mentalchillnesss
@mentalchillnesss 5 жыл бұрын
F for finite. The universe would give us another paradox by making the Infinite Series so short, so finite, wouldn't it?
@feynstein1004
@feynstein1004 5 жыл бұрын
@andrewxc1335 That's a shame. But I guess I can understand. I myself unsubscribed a long time ago. Not because the content wasn't good, but because I just didn't find pure mathematics very interesting.
@frankschneider6156
@frankschneider6156 5 жыл бұрын
Ben McCann The original (and very good) host of infinite series stopped, to get her PhD done, and the guy they hired to replace her (who was also the former SpaceTime host, before Matt took over) sunk the show to a level that was unwatchable, so the show went pretty fast belly up thereafter. That guy also nearly sunk SpaceTime, and it just became good after Matt took over. Initially they had videos about farting astronauts and such stuff (no joke, but sad truth).
@bugsdelany
@bugsdelany 5 жыл бұрын
will definitely watch this episode at least 2 times before it starts to make proper sense
@DrakiniteOfficial
@DrakiniteOfficial 5 жыл бұрын
Gosh, what happened to the audio?
@Sagivbh
@Sagivbh 4 жыл бұрын
I found this channel now!! insane. best channel of physics in the world!
@pat151uk
@pat151uk 5 жыл бұрын
I thumbed up before I even pressed play!
@LeoMindedSage
@LeoMindedSage 5 жыл бұрын
As you should
@damjanpecijareski2088
@damjanpecijareski2088 5 жыл бұрын
I actually have quantum information processing in my 6 semester love this video❤
@kayvee256
@kayvee256 5 жыл бұрын
Have you had The Talk? www.smbc-comics.com/comic/the-talk-3
@estudiordl
@estudiordl 5 жыл бұрын
"Do You Guys Just Put The Word 'Quantum' In Front Of Everything?" Antman, 2018.
@BlueZirnitra
@BlueZirnitra 5 жыл бұрын
I take it that movie isn't very funny?
@kailomonkey
@kailomonkey 5 жыл бұрын
@@BlueZirnitra I love quantum physics and I love Antman movies... Although they stretched what is actually possible with quantum understanding a bit too far in Endgame...
@YoungTheFish
@YoungTheFish 5 жыл бұрын
@@kailomonkey it almost feels like 1960s pulp sci fi logic tbh
@VerthNeel
@VerthNeel 5 жыл бұрын
And the Wasp.(the prettiest part of it)
@Sam_on_YouTube
@Sam_on_YouTube 5 жыл бұрын
The PBS Infinite Series video was fine, and they were produced by the same studio that makes your show, but 3 Blue 1 Brown was a lot better.
@jdtug8251
@jdtug8251 5 жыл бұрын
Your audio sounds distorted by the gravitational pull of a nearby black hole.
@vadymzayets6401
@vadymzayets6401 5 жыл бұрын
The example with polarizers is a simple trick. In this case, there are 4 independent optical data transmission channels (2 polarizations*( phase + amplitude)). Even a simplest multi-channel encryption is practically unbreakable. There are millions of reliable and unbreakable encryption methods, which do nothing with the Quantum Mechanics. One of oldest one is the synchronized oscillators. The simplified version of which is a random-number generator, which is synchronized to the year time or the day time of an event of the user. If I recall correctly, none of the “powerful governments” was able to break even a relatively- simple Skype encryption. Of course, one, who has the encryption key, will be always able to break any encryption. It is because another powerful QM rule of “Uncertainty of the user”. In the case when the user does not have a distinguish feature (like a biological feature), any hacker with the correct encryption key can break the code. The Quantum Mechanics cannot help. Bureaucrats from science love the words “Quantum Computer” and “Quantum Encryption”. This is a common case when a good fancy name is sufficient to pump some money from government.
@terryboyer1342
@terryboyer1342 5 жыл бұрын
The Heisenberg Uncertainty Principle. I'm not sure what I think about that.
@colleen9493
@colleen9493 5 жыл бұрын
You can never know for sure...
@kevinocta9716
@kevinocta9716 5 жыл бұрын
You're wrong. My history IS just episodes of PBS Space Time! (Cause it's so damn good, that it's the only show i need!)
Solving Quantum Cryptography
17:43
PBS Space Time
Рет қаралды 259 М.
How Quantum Entanglement Creates Entropy
19:36
PBS Space Time
Рет қаралды 1,1 МЛН
Players push long pins through a cardboard box attempting to pop the balloon!
00:31
Как Я Брата ОБМАНУЛ (смешное видео, прикол, юмор, поржать)
00:59
ТВОИ РОДИТЕЛИ И ЧЕЛОВЕК ПАУК 😂#shorts
00:59
BATEK_OFFICIAL
Рет қаралды 6 МЛН
Чистка воды совком от денег
00:32
FD Vasya
Рет қаралды 3,4 МЛН
How Quantum Computers Break The Internet... Starting Now
24:29
Veritasium
Рет қаралды 9 МЛН
Quantum Physics in a Mirror Universe
17:11
PBS Space Time
Рет қаралды 653 М.
Electrons DO NOT Spin
18:10
PBS Space Time
Рет қаралды 3,5 МЛН
I never understood why you can't go faster than light - until now!
16:40
FloatHeadPhysics
Рет қаралды 4 МЛН
Does Gravity Require Extra Dimensions?
16:42
PBS Space Time
Рет қаралды 1,1 МЛН
Quantum Computers Explained in a Way Anyone Can Understand
12:33
TheUnlockr
Рет қаралды 534 М.
The Strange Physics Principle That Shapes Reality
32:44
Veritasium
Рет қаралды 7 МЛН
Why Is The Universe Perfect?
35:30
History of the Universe
Рет қаралды 2,6 МЛН
What Makes The Strong Force Strong?
21:37
PBS Space Time
Рет қаралды 1,1 МЛН
Was Penrose Right? NEW EVIDENCE For Quantum Effects In The Brain
19:19
PBS Space Time
Рет қаралды 725 М.
Players push long pins through a cardboard box attempting to pop the balloon!
00:31