Return to Video

Cryptographers, quantum computers and the war for information

  • 0:01 - 0:04
    I'm in the business
    of safeguarding secrets,
  • 0:04 - 0:06
    and this includes your secrets.
  • 0:06 - 0:10
    Cryptographers are
    the first line of defense
  • 0:10 - 0:13
    in an ongoing war that's been
    raging for centuries,
  • 0:13 - 0:16
    a war between codemakers and codebreakers.
  • 0:17 - 0:20
    And this is a war on information.
  • 0:20 - 0:23
    The modern battlefield
    for information is digital,
  • 0:23 - 0:26
    and it wages across your phones,
  • 0:26 - 0:29
    your computers and the internet.
  • 0:29 - 0:35
    Our job is to create systems that scramble
    your emails and credit card numbers,
  • 0:35 - 0:37
    your phone calls and text messages,
  • 0:37 - 0:40
    and that includes those saucy selfies,
  • 0:40 - 0:43
    so that all of this information
    can only be de-scrambled
  • 0:43 - 0:45
    by the recipient that it's intended for.
  • 0:45 - 0:49
    Now until very recently,
  • 0:49 - 0:50
    we thought we'd won this war for good.
  • 0:50 - 0:55
    Right now, each of your smartphones
    is using encryption
  • 0:55 - 0:58
    that we thought was unbreakable
    and that was going to remain that way.
  • 0:59 - 1:01
    We were wrong,
  • 1:01 - 1:04
    because quantum computers are coming
  • 1:04 - 1:07
    and they're going to change
    the game completely.
  • 1:09 - 1:11
    Throughout history,
    cryptography and codebreaking
  • 1:11 - 1:14
    has always been this game
    of cat and mouse.
  • 1:14 - 1:16
    Back in the 1500s,
  • 1:16 - 1:18
    Queen Mary of the Scots thought she
    was sending encrypted letters
  • 1:18 - 1:20
    that only her soldiers could decipher,
  • 1:20 - 1:23
    but Queen Elizabeth of England,
  • 1:23 - 1:26
    she had codebreakers
    that were all over it.
  • 1:26 - 1:28
    They decrypted Mary's letters,
  • 1:28 - 1:31
    saw that she was attempting
    to assassinate Elizabeth,
  • 1:31 - 1:34
    and subsequently
    they chopped Mary's head off.
  • 1:34 - 1:39
    A few centuries later, in World War II,
  • 1:39 - 1:42
    the Nazis communicated
    using the Engima code,
  • 1:42 - 1:46
    a much more complicated encryption scheme
    that they thought was unbreakable,
  • 1:46 - 1:48
    but then good old Alan Turing,
  • 1:48 - 1:51
    the same guy who invented
    what we now call the modern computer,
  • 1:51 - 1:54
    he built a machine and used it
    to break Enigma.
  • 1:54 - 1:56
    He deciphered the German messages
  • 1:56 - 1:59
    and helped to bring Hitler
    and his Third Reich to a halt.
  • 2:00 - 2:03
    And so the story has gone
    throughout the centuries.
  • 2:03 - 2:05
    Cryptographers
    improve their encryption,
  • 2:05 - 2:09
    and then codebreakers fight back
    and they find a way to break it.
  • 2:09 - 2:12
    This war's gone back and forth,
    and it's been pretty neck-and-neck.
  • 2:12 - 2:17
    That was, until the 1970s,
  • 2:17 - 2:20
    when some cryptographers
    made a huge breakthrough.
  • 2:20 - 2:24
    They discovered an extremely
    powerful way to do encryption
  • 2:24 - 2:26
    called public key cryptography.
  • 2:26 - 2:29
    Now, unlike all of the prior methods
    used throughout history,
  • 2:29 - 2:32
    it doesn't require that the two parties
  • 2:32 - 2:34
    that want to send each other
    confidential information
  • 2:34 - 2:36
    have exchanged the secret key beforehand.
  • 2:36 - 2:40
    The magic of public key cryptography
    is that it allows us to connect securely
  • 2:40 - 2:42
    with anyone in the world
  • 2:42 - 2:46
    whether we've exchanged
    data before or not,
  • 2:46 - 2:51
    and to do it so fast that you and I
    don't even realize that it's happening.
  • 2:51 - 2:54
    Whether you're texting your mate
    to catch up for a beer,
  • 2:54 - 2:55
    or you're a bank
  • 2:55 - 2:59
    that's transferring billions
    of dollars to another bank,
  • 2:59 - 3:02
    modern encryption enables us
    to send data that can be secured
  • 3:02 - 3:04
    in a matter of milliseconds.
  • 3:04 - 3:08
    The brilliant idea that makes
    this magic possible,
  • 3:08 - 3:11
    it relies on hard mathematical problems.
  • 3:12 - 3:15
    in a matter of milliseconds.
  • 3:15 - 3:17
    Cryptographers are deeply interested
    in things that calculators can't do.
  • 3:17 - 3:21
    For example, calculators can multiply
    any two numbers you like,
  • 3:21 - 3:23
    no matter how big the size,
  • 3:23 - 3:26
    but going back the other way,
  • 3:26 - 3:27
    starting with the product
  • 3:27 - 3:30
    and then asking, which two numbers
    multiply to give this one,
  • 3:30 - 3:33
    that's actually a really hard problem.
  • 3:33 - 3:36
    If I asked you to find
    which two-digit numbers
  • 3:36 - 3:39
    multiply to give 851,
    even with a calculator,
  • 3:39 - 3:45
    most people in this room
    would have a hard time
  • 3:45 - 3:46
    finding the answer by the time
    I'm finished with this talk.
  • 3:46 - 3:48
    And if I make the numbers a little larger,
  • 3:48 - 3:51
    then there's no calculator on Earth
  • 3:51 - 3:52
    that can do this.
  • 3:52 - 3:55
    In fact, even the world's
    fastest supercomputer
  • 3:55 - 3:57
    would take longer
    than the life age of the universe
  • 3:57 - 4:01
    to find the two numbers
    that multiply to give this one.
  • 4:01 - 4:05
    And this problem,
    called integer factorization,
  • 4:05 - 4:09
    is exactly what each of your smartphones
    and laptops is using right now
  • 4:09 - 4:11
    to keep your data secure.
  • 4:11 - 4:14
    This is the basis of modern encryption,
  • 4:14 - 4:19
    and the fact that all of the computing
    power on the planet can't solve it,
  • 4:19 - 4:21
    that's the reason we cryptographers
  • 4:21 - 4:24
    thought we'd found a way to stay ahead
    of the codebreakers for good.
  • 4:25 - 4:28
    Perhaps we got a little cocky,
  • 4:28 - 4:30
    because just when we thought
    the war was won,
  • 4:30 - 4:33
    a bunch of 20th century physicists
    came to the party
  • 4:33 - 4:36
    and they revealed
    that the laws of the universe,
  • 4:36 - 4:39
    the same laws that modern
    cryptography was built upon,
  • 4:39 - 4:42
    they aren't as we thought they were.
  • 4:42 - 4:47
    We thought that one object couldn't be
    in two places at the same time.
  • 4:47 - 4:48
    It's not the case.
  • 4:48 - 4:52
    We thought nothing can possibly spin
    clockwise and anti-clockwise
  • 4:52 - 4:54
    simultaneously,
  • 4:54 - 4:55
    but that's incorrect.
  • 4:55 - 4:57
    And we thought that two objects
  • 4:57 - 5:01
    on opposite sides of the universe,
    light years away from each other,
  • 5:01 - 5:05
    they can't possible influence
    one another instantaneously.
  • 5:06 - 5:08
    We were wrong again.
  • 5:09 - 5:11
    And isn't that always the way
    life seems to go?
  • 5:11 - 5:13
    Just when you think
    you've got everything covered,
  • 5:13 - 5:14
    you've got your ducks in a row,
  • 5:14 - 5:15
    a bunch of physicists come along
  • 5:15 - 5:17
    and reveal that the fundamental
    laws of the universe
  • 5:17 - 5:19
    are completely different
    to what you thought?
  • 5:19 - 5:19
    (Laughter)
  • 5:19 - 5:21
    And it screws everything up.
  • 5:21 - 5:28
    See, in the teeny tiny subatomic realm,
  • 5:28 - 5:30
    at the level of electrons and protons,
  • 5:30 - 5:33
    the classical laws of physics,
  • 5:33 - 5:34
    the ones that we all know and love,
  • 5:34 - 5:36
    they go out the window,
  • 5:36 - 5:39
    and it's here that the laws
    of quantum mechanics kick in.
  • 5:40 - 5:42
    In quantum mechanics, an electron
  • 5:42 - 5:46
    can be spinning clockwise
    and anti-clockwise at the same time
  • 5:46 - 5:49
    and a proton can be in two places at once.
  • 5:49 - 5:52
    It sounds like science fiction,
  • 5:52 - 5:57
    but that's only because
    the crazy quantum nature of our universe,
  • 5:57 - 5:59
    it hides itself from us.
  • 5:59 - 6:03
    And it stayed hidden from us
    until the 20th century.
  • 6:03 - 6:07
    But now that we've seen it,
    the whole world is in an arms race
  • 6:07 - 6:11
    to try to build a quantum computer,
  • 6:11 - 6:16
    a computer that can harness the power
    of this weird and wacky quantum behavior.
  • 6:17 - 6:19
    These things are so revolutionary
  • 6:19 - 6:21
    and so powerful
  • 6:21 - 6:23
    that they'll make today's
    fastest supercomputer
  • 6:23 - 6:26
    look useless in comparison.
  • 6:26 - 6:30
    In fact, for certain problems
    that are of great interest to us,
  • 6:30 - 6:33
    today's fastest supercomputer
    is closer to an abacus
  • 6:33 - 6:34
    than to a quantum computer.
  • 6:34 - 6:39
    That's right, I'm talking about
    those little wooden things with the beads.
  • 6:39 - 6:44
    Quantum computers can simulate
    chemical and biological processes
  • 6:44 - 6:47
    that are far beyond the reach
    of our classical computers,
  • 6:47 - 6:53
    and as such, they promise to help us solve
    some of our planet's biggest problems.
  • 6:54 - 6:57
    They're going to help us
    combat global hunger,
  • 6:57 - 7:00
    to tackle climate change,
  • 7:00 - 7:05
    to find cures for diseases and pandemics
    for which we've so far been unsuccessful,
  • 7:05 - 7:08
    to create superhuman
    artificial intelligence,
  • 7:08 - 7:11
    and perhaps even more important
    than all of those things,
  • 7:11 - 7:15
    they're going to help us understand
    the very nature of our universe.
  • 7:17 - 7:20
    But with this incredible potential
  • 7:20 - 7:23
    comes an incredible risk.
  • 7:23 - 7:25
    Remember those big numbers
    I talked about earlier?
  • 7:25 - 7:29
    I'm not talking about 851.
  • 7:29 - 7:31
    In fact, if anyone in here
    has been distracted
  • 7:31 - 7:32
    trying to find those factors,
  • 7:32 - 7:36
    I'm going to put you out of your misery
    and tell you that it's 23 times 37.
  • 7:36 - 7:37
    (Laughter)
  • 7:37 - 7:40
    I'm talking about the much
    bigger number that followed it.
  • 7:40 - 7:44
    While today's fastest supercomputer
    couldn't find those factors
  • 7:44 - 7:46
    in the life's age of the universe,
  • 7:46 - 7:48
    a quantum computer
    could easily factorize numbers
  • 7:48 - 7:52
    way, way bigger than that one.
  • 7:52 - 7:55
    Quantum computers will break
    all of the encryption
  • 7:55 - 7:58
    currently used to protect
    you and I from hackers,
  • 7:58 - 8:00
    and they'll do it easily.
  • 8:00 - 8:02
    Let me put it this way:
  • 8:02 - 8:04
    if quantum computing was a spear,
  • 8:04 - 8:07
    then modern encryption,
  • 8:07 - 8:10
    the same unbreakable system
    that's protected us for decades,
  • 8:10 - 8:14
    it would be like a shield
    made of tissue paper.
  • 8:14 - 8:17
    Anyone with access to a quantum computer
  • 8:17 - 8:22
    will have the master key to unlock
    anything they like in our digital world.
  • 8:22 - 8:26
    They could steal money from banks
  • 8:26 - 8:26
    and control economies.
  • 8:26 - 8:28
    They could power off hospitals
    or launch nukes,
  • 8:28 - 8:33
    or they could just sit back
    and watch all of us on our webcams
  • 8:33 - 8:36
    without any of us knowing
    that this is happening.
  • 8:36 - 8:42
    Now, the fundamental unit of information
    on all of the computers we're used to,
  • 8:42 - 8:43
    like this one,
  • 8:43 - 8:45
    it's called a bit.
  • 8:45 - 8:47
    A single bit can be one of two states.
  • 8:47 - 8:50
    It can be a zero or it can be a one.
  • 8:50 - 8:53
    When I FaceTime my mum
    from the other side of the world,
  • 8:53 - 8:58
    and she's going to kill me
    for having this slide (Laughter)
  • 8:58 - 9:02
    we're actually just sending each other
    long sequences of zeroes and ones
  • 9:02 - 9:05
    that bounce from computer to computer,
    from satellite to satellite,
  • 9:05 - 9:07
    transmitting our data at a rapid pace.
  • 9:07 - 9:09
    Bits are certainly very useful.
  • 9:09 - 9:12
    In fact, anything
    we currently do with technology
  • 9:12 - 9:15
    is indebted to the usefulness of bits.
  • 9:15 - 9:18
    But we're starting to realize
    that bits are really poor
  • 9:18 - 9:21
    at simulating complex
    molecules and particles,
  • 9:21 - 9:24
    and this is because in some sense
  • 9:24 - 9:27
    subatomic processes can be doing
    two or more opposing things
  • 9:27 - 9:28
    at the same time
  • 9:28 - 9:32
    as they follow these bizarre
    rules of quantum mechanics.
  • 9:32 - 9:34
    So late last century,
  • 9:34 - 9:36
    some really brainy physicists
    had this ingenious idea:
  • 9:36 - 9:38
    to instead build computers
    that are founded
  • 9:38 - 9:41
    on the principles of quantum mechanics.
  • 9:43 - 9:46
    Now, the fundamental unit of information
    of a quantum computer,
  • 9:46 - 9:47
    it's called a qubit.
  • 9:47 - 9:51
    It stands for "quantum bit."
  • 9:51 - 9:55
    Instead of having just two states,
    like zero or one,
  • 9:55 - 9:58
    a qubit can be an infinite
    number of states,
  • 9:58 - 10:02
    and this corresponds to it being
    some combination of both zero and one
  • 10:02 - 10:04
    at the same time,
  • 10:04 - 10:07
    a phenomenon that we call superposition.
  • 10:07 - 10:10
    And when we have two qubits
    in superposition,
  • 10:10 - 10:12
    we're actually working across
    all four combinations
  • 10:12 - 10:15
    of zero-zero, zero-one,
    one-zero and one-one.
  • 10:15 - 10:17
    With three qubits,
  • 10:17 - 10:20
    we're working in superposition
    across eight combinations,
  • 10:20 - 10:22
    and so on.
  • 10:22 - 10:24
    Each time we add a single qubit,
  • 10:24 - 10:26
    we double the number of combinations
  • 10:26 - 10:31
    that we can work with
    in superposition at the same time.
  • 10:31 - 10:34
    And so when we scale up to work
    with many qubits,
  • 10:34 - 10:37
    we can work with an exponential
    number of combinations
  • 10:37 - 10:40
    at the same time.
  • 10:40 - 10:44
    And this just hints at where the power
    of quantum computing is coming from.
  • 10:44 - 10:46
    Now, in modern encryption,
  • 10:46 - 10:49
    our secret keys,
  • 10:49 - 10:51
    like the two factors
    of that larger number,
  • 10:51 - 10:54
    they're just long sequences
    of zeroes and ones.
  • 10:54 - 10:57
    To find them, a classical computer
  • 10:57 - 11:01
    must go through every single combination
  • 11:01 - 11:02
    one after the other
  • 11:02 - 11:05
    until it finds the one that works
    and breaks our encryption.
  • 11:06 - 11:08
    But on a quantum computer,
  • 11:08 - 11:13
    with enough qubits in superposition,
  • 11:13 - 11:19
    information can be extracted
    from all combinations at the same time.
  • 11:19 - 11:22
    In very few steps, a quantum computer
  • 11:22 - 11:25
    can brush aside all of
    the incorrect combinations,
  • 11:25 - 11:26
    home in on the correct one,
  • 11:26 - 11:29
    and then unlock our treasured secrets.
  • 11:29 - 11:36
    Now, at the crazy quantum level,
  • 11:36 - 11:39
    something truly incredible
    is happening here.
  • 11:39 - 11:45
    The conventional wisdom
    held by many leading physicists --
  • 11:45 - 11:48
    and you've got to stay
    with me on this one --
  • 11:48 - 11:49
    is that each combination is actually
    examined by its own quantum computer
  • 11:49 - 11:52
    inside its very own parallel universe.
  • 11:52 - 11:59
    Each of these combinations,
    they add up like waves in a pool of water.
  • 11:59 - 12:02
    The combinations that are wrong,
  • 12:02 - 12:04
    they cancel each other out,
  • 12:04 - 12:06
    and the combinations that are right,
  • 12:06 - 12:08
    they reinforce and amplify each other.
  • 12:08 - 12:11
    So at the end of
    the quantum computing program,
  • 12:11 - 12:14
    all that's left is the correct answer
  • 12:14 - 12:18
    that we can then observe
    here in this universe.
  • 12:18 - 12:21
    Now if that doesn't make
    complete sense to you, don't stress.
  • 12:21 - 12:22
    (Laughter)
  • 12:22 - 12:23
    You're in good company.
  • 12:23 - 12:27
    Niels Bohr, one of
    the pioneers of this field,
  • 12:27 - 12:31
    he once said that anyone
    who could contemplate quantum mechanics
  • 12:31 - 12:34
    without being profoundly shocked,
    they haven't understood it.
  • 12:34 - 12:36
    (Laughter)
  • 12:36 - 12:38
    But you get an idea
    of what we're up against
  • 12:38 - 12:40
    and why it's now up to us cryptographers
  • 12:40 - 12:42
    to really step it up.
  • 12:42 - 12:45
    And we have to do it fast,
  • 12:45 - 12:47
    because quantum computers,
  • 12:47 - 12:50
    they already exist in labs
    all over the world.
  • 12:51 - 12:53
    Fortunately, at this minute,
  • 12:53 - 12:56
    they only exist
    at a relatively small scale,
  • 12:56 - 12:59
    still too small to break
    our much larger cryptographic keys,
  • 12:59 - 13:03
    but we might not be safe for long.
  • 13:03 - 13:06
    Some folks believe that secret
    government agencies
  • 13:06 - 13:07
    have already built a big enough one
  • 13:07 - 13:10
    and they just haven't told anyone yet.
  • 13:10 - 13:13
    Some punters say
    they're more like 10 years off.
  • 13:13 - 13:15
    Some people say it's more like 30.
  • 13:15 - 13:17
    And you might think that
    if quantum computers are 10 years away,
  • 13:17 - 13:19
    surely that's enough time
    for us cryptographers
  • 13:19 - 13:22
    to figure it out and
    to secure the internet in time.
  • 13:22 - 13:27
    But unfortunately it's not that easy.
  • 13:27 - 13:29
    Even if we ignore the many years
    that it takes to standardize and deploy
  • 13:29 - 13:32
    and then roll out
    new encryption technology,
  • 13:32 - 13:36
    in some ways we may already be too late.
  • 13:36 - 13:39
    Smart digital criminals
    and government agencies
  • 13:39 - 13:43
    may already be storing
    our most sensitive encrypted data
  • 13:43 - 13:47
    in anticipation for
    the quantum future ahead.
  • 13:47 - 13:49
    The messages of foreign leaders,
  • 13:49 - 13:52
    of war generals,
  • 13:52 - 13:56
    or of individuals who question power,
  • 13:56 - 13:59
    they're encrypted for now,
  • 13:59 - 14:01
    but as soon as the day comes
  • 14:01 - 14:03
    that someone gets their hands
    on a quantum computer,
  • 14:03 - 14:07
    they can retroactively break
    anything from the past.
  • 14:07 - 14:09
    In certain government
    and financial sectors
  • 14:09 - 14:11
    or in military organizations,
  • 14:11 - 14:14
    sensitive data has got
    to remain classified for 25 years.
  • 14:15 - 14:18
    So if a quantum computer
    really will exist in 10 years,
  • 14:18 - 14:20
    then these guys are already
    15 years too late
  • 14:20 - 14:23
    to quantum-proof their encryption.
  • 14:23 - 14:26
    So while many scientists around the world
  • 14:26 - 14:28
    are racing to try to build
    a quantum computer,
  • 14:28 - 14:32
    us cryptographers are urgently
    looking to reinvent encryption
  • 14:32 - 14:35
    to protect us long before that day comes.
  • 14:35 - 14:39
    We're looking for new,
    hard mathematical problems.
  • 14:39 - 14:42
    We're looking for problems that,
    just like factorization,
  • 14:42 - 14:45
    can be used on our smartphones
    and on our laptops today.
  • 14:46 - 14:50
    But unlike factorization,
    we need these problems to be so hard
  • 14:50 - 14:53
    that they're even unbreakable
    with a quantum computer.
  • 14:55 - 14:59
    In recent years, we've been digging
    around a much wider realm of mathematics
  • 14:59 - 15:00
    to look for such problems.
  • 15:00 - 15:01
    We've been looking at numbers and objects
  • 15:01 - 15:03
    that are far more exotic
    and far more abstract
  • 15:03 - 15:06
    than the ones that you and I are used to,
  • 15:06 - 15:08
    like the ones on our calculators.
  • 15:08 - 15:11
    And we believe we've found
    some geometric problems
  • 15:11 - 15:13
    that just might do the trick.
  • 15:13 - 15:15
    Now, unlike those two-
    and three-dimensional geometric problems
  • 15:15 - 15:19
    that we used to have to try to solve
    with pen and graph paper in high school,
  • 15:19 - 15:24
    most of these problems are defined
    in well over 500 dimensions.
  • 15:24 - 15:29
    So not only are they a little hard
    to depict and solve on graph paper,
  • 15:29 - 15:32
    but we believe they're even
    out of the reach of a quantum computer.
  • 15:34 - 15:37
    So though it's early days,
  • 15:37 - 15:40
    it's here that we are putting our hope
    as we try to secure our digital world
  • 15:40 - 15:42
    moving into its quantum future.
  • 15:43 - 15:46
    Just like all of the other scientists,
  • 15:46 - 15:48
    we cryptographers are tremendously excited
  • 15:48 - 15:53
    at the potential of living in a world
    alongside quantum computers.
  • 15:53 - 15:57
    They could be such a force for good.
  • 15:57 - 16:03
    But no matter what
    technological future we live in,
  • 16:04 - 16:08
    our secrets
  • 16:08 - 16:11
    will always be a part of our humanity,
  • 16:11 - 16:14
    and that is worth protecting.
  • 16:14 - 16:15
    Thanks.
  • 16:15 - 16:18
    (Applause)
Title:
Cryptographers, quantum computers and the war for information
Speaker:
Craig Costello
Description:

more » « less
Video Language:
English
Team:
closed TED
Project:
TEDxTalks
Duration:
16:31

English subtitles

Revisions Compare revisions