WEBVTT 00:00:00.782 --> 00:00:04.057 I'm in the business of safeguarding secrets, 00:00:04.081 --> 00:00:06.253 and this includes your secrets. NOTE Paragraph 00:00:07.206 --> 00:00:09.340 Cryptographers are the first line of defense 00:00:09.364 --> 00:00:12.946 in an ongoing war that's been raging for centuries: 00:00:12.970 --> 00:00:15.233 a war between code makers 00:00:15.257 --> 00:00:16.509 and code breakers. 00:00:17.030 --> 00:00:19.124 And this is a war on information. 00:00:20.227 --> 00:00:23.711 The modern battlefield for information is digital. 00:00:23.735 --> 00:00:25.897 And it wages across your phones, 00:00:25.921 --> 00:00:27.097 your computers 00:00:27.121 --> 00:00:28.290 and the internet. 00:00:29.299 --> 00:00:34.278 Our job is to create systems that scramble your emails and credit card numbers, 00:00:34.302 --> 00:00:36.561 your phone calls and text messages -- 00:00:36.585 --> 00:00:38.777 and that includes those saucy selfies -- NOTE Paragraph 00:00:38.801 --> 00:00:40.023 (Laughter) NOTE Paragraph 00:00:40.047 --> 00:00:42.800 so that all of this information can only be descrambled 00:00:42.824 --> 00:00:44.945 by the recipient that it's intended for. NOTE Paragraph 00:00:46.017 --> 00:00:48.330 Now, until very recently, 00:00:48.354 --> 00:00:50.909 we thought we'd won this war for good. 00:00:51.694 --> 00:00:54.639 Right now, each of your smartphones is using encryption 00:00:54.663 --> 00:00:58.363 that we thought was unbreakable and that was going to remain that way. 00:00:59.654 --> 00:01:01.594 We were wrong, 00:01:01.618 --> 00:01:04.004 because quantum computers are coming, 00:01:04.028 --> 00:01:06.818 and they're going to change the game completely. NOTE Paragraph 00:01:08.445 --> 00:01:10.901 Throughout history, cryptography and code-breaking 00:01:10.925 --> 00:01:12.995 has always been this game of cat and mouse. 00:01:13.598 --> 00:01:15.275 Back in the 1500s, 00:01:15.299 --> 00:01:18.478 Queen Mary of the Scots thought she was sending encrypted letters 00:01:18.502 --> 00:01:20.479 that only her soldiers could decipher. 00:01:21.074 --> 00:01:23.120 But Queen Elizabeth of England, 00:01:23.144 --> 00:01:25.544 she had code breakers that were all over it. 00:01:26.116 --> 00:01:28.121 They decrypted Mary's letters, 00:01:28.145 --> 00:01:31.318 saw that she was attempting to assassinate Elizabeth 00:01:31.342 --> 00:01:33.773 and, subsequently, they chopped Mary's head off. 00:01:35.729 --> 00:01:38.081 A few centuries later, in World War II, 00:01:38.987 --> 00:01:41.871 the Nazis communicated using the Engima code, 00:01:41.895 --> 00:01:45.536 a much more complicated encryption scheme that they thought was unbreakable. 00:01:46.274 --> 00:01:48.204 But then good old Alan Turing, 00:01:48.228 --> 00:01:51.263 the same guy who invented what we now call the modern computer, 00:01:51.287 --> 00:01:53.902 he built a machine and used it to break Enigma. 00:01:54.545 --> 00:01:56.150 He deciphered the German messages 00:01:56.174 --> 00:01:58.889 and helped to bring Hitler and his Third Reich to a halt. 00:01:59.772 --> 00:02:02.331 And so the story has gone throughout the centuries. 00:02:02.821 --> 00:02:05.323 Cryptographers improve their encryption, 00:02:05.347 --> 00:02:08.485 and then code breakers fight back and they find a way to break it. 00:02:08.969 --> 00:02:12.356 This war's gone back and forth, and it's been pretty neck and neck. NOTE Paragraph 00:02:13.533 --> 00:02:16.248 That was until the 1970s, 00:02:16.272 --> 00:02:18.932 when some cryptographers made a huge breakthrough. 00:02:19.781 --> 00:02:23.342 They discovered an extremely powerful way to do encryption 00:02:23.366 --> 00:02:25.118 called "public-key cryptography." 00:02:25.839 --> 00:02:30.114 Unlike all of the prior methods used throughout history, it doesn't require 00:02:30.138 --> 00:02:33.745 that the two parties that want to send each other confidential information 00:02:33.769 --> 00:02:35.828 have exchanged the secret key beforehand. 00:02:36.602 --> 00:02:40.714 The magic of public-key cryptography is that it allows us to connect securely 00:02:40.738 --> 00:02:42.282 with anyone in the world, 00:02:43.481 --> 00:02:46.350 whether we've exchanged data before or not, 00:02:46.374 --> 00:02:50.036 and to do it so fast that you and I don't even realize it's happening. 00:02:51.001 --> 00:02:54.239 Whether you're texting your mate to catch up for a beer, 00:02:54.263 --> 00:02:58.510 or you're a bank that's transferring billions of dollars to another bank, 00:02:58.534 --> 00:03:01.585 modern encryption enables us to send data that can be secured 00:03:01.609 --> 00:03:03.630 in a matter of milliseconds. NOTE Paragraph 00:03:05.502 --> 00:03:08.384 The brilliant idea that makes this magic possible, 00:03:08.408 --> 00:03:10.935 it relies on hard mathematical problems. 00:03:11.623 --> 00:03:15.457 Cryptographers are deeply interested in things that calculators can't do. 00:03:17.250 --> 00:03:20.651 For example, calculators can multiply any two numbers you like, 00:03:20.675 --> 00:03:22.361 no matter how big the size. 00:03:23.175 --> 00:03:25.116 But going back the other way -- 00:03:25.140 --> 00:03:27.358 starting with the product and then asking, 00:03:27.382 --> 00:03:29.747 "Which two numbers multiply to give this one?" -- 00:03:29.771 --> 00:03:32.152 that's actually a really hard problem. 00:03:33.358 --> 00:03:37.949 If I asked you to find which two-digit numbers multiply to give 851, 00:03:39.051 --> 00:03:40.243 even with a calculator, 00:03:40.267 --> 00:03:43.374 most people in this room would have a hard time finding the answer 00:03:43.398 --> 00:03:45.314 by the time I'm finished with this talk. 00:03:45.338 --> 00:03:47.999 And if I make the numbers a little larger, 00:03:48.023 --> 00:03:51.680 then there's no calculator on earth that can do this. 00:03:51.704 --> 00:03:54.587 In fact, even the world's fastest supercomputer 00:03:54.611 --> 00:03:57.101 would take longer than the life age of the universe 00:03:57.125 --> 00:03:59.997 to find the two numbers that multiply to give this one. 00:04:01.029 --> 00:04:04.370 And this problem, called "integer factorization," 00:04:04.394 --> 00:04:08.020 is exactly what each of your smartphones and laptops is using right now 00:04:08.044 --> 00:04:09.578 to keep your data secure. 00:04:10.254 --> 00:04:12.671 This is the basis of modern encryption. 00:04:14.266 --> 00:04:18.476 And the fact that all the computing power on the planet combined can't solve it, 00:04:18.500 --> 00:04:21.373 that's the reason we cryptographers thought we'd found a way 00:04:21.397 --> 00:04:23.655 to stay ahead of the code breakers for good. NOTE Paragraph 00:04:25.131 --> 00:04:26.783 Perhaps we got a little cocky 00:04:27.902 --> 00:04:30.248 because just when we thought the war was won, 00:04:30.272 --> 00:04:33.210 a bunch of 20th-century physicists came to the party, 00:04:33.234 --> 00:04:35.913 and they revealed that the laws of the universe, 00:04:35.937 --> 00:04:38.532 the same laws that modern cryptography was built upon, 00:04:39.422 --> 00:04:41.237 they aren't as we thought they were. 00:04:42.205 --> 00:04:45.716 We thought that one object couldn't be in two places at the same time. 00:04:46.262 --> 00:04:47.803 It's not the case. 00:04:47.827 --> 00:04:51.539 We thought nothing can possibly spin clockwise and anticlockwise 00:04:51.563 --> 00:04:52.848 simultaneously. 00:04:53.265 --> 00:04:54.652 But that's incorrect. 00:04:55.173 --> 00:04:58.883 And we thought that two objects on opposite sides of the universe, 00:04:58.907 --> 00:05:01.208 light years away from each other, 00:05:01.232 --> 00:05:04.798 they can't possible influence one another instantaneously. 00:05:05.932 --> 00:05:07.179 We were wrong again. NOTE Paragraph 00:05:08.403 --> 00:05:10.612 And isn't that always the way life seems to go? 00:05:10.636 --> 00:05:14.032 Just when you think you've got everything covered, your ducks in a row, 00:05:14.056 --> 00:05:15.611 a bunch of physicists come along 00:05:15.635 --> 00:05:19.327 and reveal that the fundamental laws of the universe are completely different 00:05:19.351 --> 00:05:20.512 to what you thought? NOTE Paragraph 00:05:20.536 --> 00:05:21.594 (Laughter) NOTE Paragraph 00:05:21.618 --> 00:05:22.974 And it screws everything up. NOTE Paragraph 00:05:22.998 --> 00:05:27.524 See, in the teeny tiny subatomic realm, 00:05:27.548 --> 00:05:30.560 at the level of electrons and protons, 00:05:30.584 --> 00:05:32.406 the classical laws of physics, 00:05:32.430 --> 00:05:34.270 the ones that we all know and love, 00:05:34.294 --> 00:05:35.532 they go out the window. 00:05:36.023 --> 00:05:38.834 And it's here that the laws of quantum mechanics kick in. 00:05:39.688 --> 00:05:40.874 In quantum mechanics, 00:05:40.898 --> 00:05:45.376 an electron can be spinning clockwise and anticlockwise at the same time, 00:05:45.400 --> 00:05:47.964 and a proton can be in two places at once. 00:05:49.940 --> 00:05:52.063 It sounds like science fiction, 00:05:52.087 --> 00:05:56.282 but that's only because the crazy quantum nature of our universe, 00:05:56.306 --> 00:05:57.977 it hides itself from us. 00:05:58.884 --> 00:06:02.176 And it stayed hidden from us until the 20th century. 00:06:03.494 --> 00:06:07.263 But now that we've seen it, the whole world is in an arms race 00:06:07.287 --> 00:06:09.563 to try to build a quantum computer -- 00:06:10.455 --> 00:06:14.794 a computer that can harness the power of this weird and wacky quantum behavior. NOTE Paragraph 00:06:16.375 --> 00:06:18.831 These things are so revolutionary 00:06:18.855 --> 00:06:20.621 and so powerful 00:06:20.645 --> 00:06:22.998 that they'll make today's fastest supercomputer 00:06:23.022 --> 00:06:25.102 look useless in comparison. 00:06:25.868 --> 00:06:28.886 In fact, for certain problems that are of great interest to us, 00:06:29.633 --> 00:06:32.244 today's fastest supercomputer is closer to an abacus 00:06:32.268 --> 00:06:33.943 than to a quantum computer. 00:06:33.967 --> 00:06:37.503 That's right, I'm talking about those little wooden things with the beads. 00:06:38.477 --> 00:06:42.745 Quantum computers can simulate chemical and biological processes 00:06:42.769 --> 00:06:45.675 that are far beyond the reach of our classical computers. 00:06:46.812 --> 00:06:52.403 And as such, they promise to help us solve some of our planet's biggest problems. 00:06:53.492 --> 00:06:55.764 They're going to help us combat global hunger; 00:06:57.074 --> 00:06:59.391 to tackle climate change; 00:06:59.415 --> 00:07:03.375 to find cures for diseases and pandemics for which we've so far been unsuccessful; 00:07:04.213 --> 00:07:07.122 to create superhuman artificial intelligence; 00:07:08.034 --> 00:07:10.938 and perhaps even more important than all of those things, 00:07:10.962 --> 00:07:14.688 they're going to help us understand the very nature of our universe. NOTE Paragraph 00:07:16.376 --> 00:07:18.590 But with this incredible potential 00:07:19.788 --> 00:07:21.419 comes an incredible risk. 00:07:22.785 --> 00:07:25.169 Remember those big numbers I talked about earlier? 00:07:26.152 --> 00:07:28.251 I'm not talking about 851. 00:07:28.275 --> 00:07:30.456 In fact, if anyone in here has been distracted 00:07:30.480 --> 00:07:31.919 trying to find those factors, 00:07:31.943 --> 00:07:35.497 I'm going to put you out of your misery and tell you that it's 23 times 37. NOTE Paragraph 00:07:35.521 --> 00:07:36.715 (Laughter) NOTE Paragraph 00:07:36.739 --> 00:07:39.474 I'm talking about the much bigger number that followed it. 00:07:40.300 --> 00:07:43.800 While today's fastest supercomputer couldn't find those factors 00:07:43.824 --> 00:07:46.157 in the life age of the universe, 00:07:46.181 --> 00:07:49.061 a quantum computer could easily factorize numbers 00:07:49.085 --> 00:07:50.652 way, way bigger than that one. NOTE Paragraph 00:07:51.882 --> 00:07:55.292 Quantum computers will break all of the encryption currently used 00:07:55.316 --> 00:07:57.294 to protect you and I from hackers. 00:07:57.318 --> 00:07:58.745 And they'll do it easily. 00:08:00.539 --> 00:08:01.872 Let me put it this way: 00:08:01.896 --> 00:08:03.666 if quantum computing was a spear, 00:08:04.666 --> 00:08:06.201 then modern encryption, 00:08:06.225 --> 00:08:09.598 the same unbreakable system that's protected us for decades, 00:08:09.622 --> 00:08:12.280 it would be like a shield made of tissue paper. 00:08:13.578 --> 00:08:17.566 Anyone with access to a quantum computer will have the master key 00:08:17.590 --> 00:08:20.278 to unlock anything they like in our digital world. 00:08:21.293 --> 00:08:23.105 They could steal money from banks 00:08:23.129 --> 00:08:24.560 and control economies. 00:08:25.303 --> 00:08:28.200 They could power off hospitals or launch nukes, 00:08:28.224 --> 00:08:31.561 or they could just sit back and watch all of us on our webcams 00:08:31.585 --> 00:08:33.943 without any of us knowing that this is happening. NOTE Paragraph 00:08:37.314 --> 00:08:41.273 Now, the fundamental unit of information on all of the computers we're used to, 00:08:41.297 --> 00:08:42.802 like this one, 00:08:42.826 --> 00:08:44.168 it's called a "bit." 00:08:44.651 --> 00:08:46.874 A single bit can be one of two states: 00:08:46.898 --> 00:08:49.157 it can be a zero or it can be a one. 00:08:50.157 --> 00:08:52.985 When I FaceTime my mum from the other side of the world -- 00:08:53.746 --> 00:08:56.232 and she's going to kill me for having this slide -- NOTE Paragraph 00:08:56.256 --> 00:08:57.651 (Laughter) NOTE Paragraph 00:08:57.675 --> 00:09:01.409 we're actually just sending each other long sequences of zeroes and ones 00:09:01.433 --> 00:09:04.635 that bounce from computer to computer, from satellite to satellite, 00:09:04.659 --> 00:09:06.805 transmitting our data at a rapid pace. 00:09:06.829 --> 00:09:08.832 Bits are certainly very useful. 00:09:08.856 --> 00:09:11.552 In fact, anything we currently do with technology 00:09:11.576 --> 00:09:13.638 is indebted to the usefulness of bits. 00:09:14.840 --> 00:09:16.229 But we're starting to realize 00:09:16.253 --> 00:09:20.768 that bits are really poor at simulating complex molecules and particles. 00:09:21.394 --> 00:09:23.370 And this is because, in some sense, 00:09:23.394 --> 00:09:26.479 subatomic processes can be doing two or more opposing things 00:09:26.503 --> 00:09:27.691 at the same time 00:09:27.715 --> 00:09:30.701 as they follow these bizarre rules of quantum mechanics. NOTE Paragraph 00:09:31.232 --> 00:09:32.776 So, late last century, 00:09:32.800 --> 00:09:36.017 some really brainy physicists had this ingenious idea: 00:09:36.041 --> 00:09:38.042 to instead build computers that are founded 00:09:38.066 --> 00:09:40.156 on the principles of quantum mechanics. 00:09:42.557 --> 00:09:45.776 Now, the fundamental unit of information of a quantum computer, 00:09:45.800 --> 00:09:47.048 it's called a "qubit." 00:09:47.582 --> 00:09:49.382 It stands for "quantum bit." 00:09:50.986 --> 00:09:54.243 Instead of having just two states, like zero or one, 00:09:54.267 --> 00:09:57.156 a qubit can be an infinite number of states. 00:09:57.849 --> 00:10:01.515 And this corresponds to it being some combination of both zero and one 00:10:01.539 --> 00:10:03.326 at the same time, 00:10:03.350 --> 00:10:05.539 a phenomenon that we call "superposition." 00:10:06.569 --> 00:10:09.274 And when we have two qubits in superposition, 00:10:09.298 --> 00:10:11.680 we're actually working across all four combinations 00:10:11.704 --> 00:10:14.214 of zero-zero, zero-one, one-zero and one-one. 00:10:14.940 --> 00:10:16.286 With three qubits, 00:10:16.310 --> 00:10:19.551 we're working in superposition across eight combinations, 00:10:19.575 --> 00:10:20.727 and so on. 00:10:21.294 --> 00:10:25.244 Each time we add a single qubit, we double the number of combinations 00:10:25.268 --> 00:10:28.870 that we can work with in superposition 00:10:28.894 --> 00:10:30.073 at the same time. 00:10:31.005 --> 00:10:33.634 And so when we scale up to work with many qubits, 00:10:33.658 --> 00:10:37.280 we can work with an exponential number of combinations 00:10:37.304 --> 00:10:38.623 at the same time. 00:10:39.440 --> 00:10:43.075 And this just hints at where the power of quantum computing is coming from. NOTE Paragraph 00:10:44.964 --> 00:10:46.291 Now, in modern encryption, 00:10:47.429 --> 00:10:51.357 our secret keys, like the two factors of that larger number, 00:10:51.381 --> 00:10:53.658 they're just long sequences of zeroes and ones. 00:10:54.539 --> 00:10:55.783 To find them, 00:10:55.807 --> 00:11:00.251 a classical computer must go through every single combination, 00:11:00.275 --> 00:11:01.426 one after the other, 00:11:01.450 --> 00:11:04.529 until it finds the one that works and breaks our encryption. 00:11:06.191 --> 00:11:07.739 But on a quantum computer, 00:11:08.779 --> 00:11:11.972 with enough qubits in superposition, 00:11:13.001 --> 00:11:17.332 information can be extracted from all combinations at the same time. 00:11:18.912 --> 00:11:20.166 In very few steps, 00:11:20.190 --> 00:11:24.164 a quantum computer can brush aside all of the incorrect combinations, 00:11:24.188 --> 00:11:25.601 home in on the correct one 00:11:25.625 --> 00:11:27.686 and then unlock our treasured secrets. NOTE Paragraph 00:11:32.215 --> 00:11:34.781 Now, at the crazy quantum level, 00:11:35.900 --> 00:11:38.522 something truly incredible is happening here. 00:11:40.625 --> 00:11:44.299 The conventional wisdom held by many leading physicists -- 00:11:44.323 --> 00:11:46.942 and you've got to stay with me on this one -- 00:11:46.966 --> 00:11:51.389 is that each combination is actually examined by its very own quantum computer 00:11:51.413 --> 00:11:53.962 inside its very own parallel universe. 00:11:55.303 --> 00:11:59.204 Each of these combinations, they add up like waves in a pool of water. 00:12:00.085 --> 00:12:02.071 The combinations that are wrong, 00:12:02.095 --> 00:12:04.073 they cancel each other out, 00:12:04.097 --> 00:12:05.857 and the combinations that are right, 00:12:05.881 --> 00:12:07.740 they reinforce and amplify each other. 00:12:08.241 --> 00:12:10.906 So at the end of the quantum computing program, 00:12:10.930 --> 00:12:13.747 all that's left is the correct answer, 00:12:13.771 --> 00:12:16.324 that we can then observe here in this universe. NOTE Paragraph 00:12:17.575 --> 00:12:20.711 Now, if that doesn't make complete sense to you, don't stress. NOTE Paragraph 00:12:20.735 --> 00:12:21.783 (Laughter) NOTE Paragraph 00:12:21.807 --> 00:12:23.030 You're in good company. 00:12:24.205 --> 00:12:27.371 Niels Bohr, one of the pioneers of this field, 00:12:27.395 --> 00:12:30.402 he once said that anyone who could contemplate quantum mechanics 00:12:30.426 --> 00:12:32.789 without being profoundly shocked, 00:12:32.813 --> 00:12:34.269 they haven't understood it. NOTE Paragraph 00:12:34.293 --> 00:12:35.720 (Laughter) NOTE Paragraph 00:12:35.744 --> 00:12:37.899 But you get an idea of what we're up against, 00:12:37.923 --> 00:12:39.985 and why it's now up to us cryptographers 00:12:40.009 --> 00:12:41.372 to really step it up. NOTE Paragraph 00:12:42.674 --> 00:12:44.763 And we have to do it fast, 00:12:44.787 --> 00:12:46.819 because quantum computers, 00:12:46.843 --> 00:12:49.866 they already exist in labs all over the world. NOTE Paragraph 00:12:51.248 --> 00:12:53.145 Fortunately, at this minute, 00:12:53.169 --> 00:12:55.839 they only exist at a relatively small scale, 00:12:55.863 --> 00:12:58.928 still too small to break our much larger cryptographic keys. 00:13:00.127 --> 00:13:01.811 But we might not be safe for long. 00:13:02.968 --> 00:13:05.464 Some folks believe that secret government agencies 00:13:05.488 --> 00:13:07.401 have already built a big enough one, 00:13:07.425 --> 00:13:09.398 and they just haven't told anyone yet. 00:13:09.961 --> 00:13:12.390 Some pundits say they're more like 10 years off. 00:13:12.414 --> 00:13:14.274 Some people say it's more like 30. 00:13:15.163 --> 00:13:18.020 You might think that if quantum computers are 10 years away, 00:13:18.044 --> 00:13:21.108 surely that's enough time for us cryptographers to figure it out 00:13:21.132 --> 00:13:22.826 and to secure the internet in time. NOTE Paragraph 00:13:22.850 --> 00:13:24.737 But unfortunately, it's not that easy. 00:13:25.521 --> 00:13:27.709 Even if we ignore the many years that it takes 00:13:27.733 --> 00:13:31.399 to standardize and deploy and then roll out new encryption technology, 00:13:31.423 --> 00:13:33.751 in some ways we may already be too late. 00:13:35.407 --> 00:13:38.579 Smart digital criminals and government agencies 00:13:38.603 --> 00:13:42.882 may already be storing our most sensitive encrypted data 00:13:42.906 --> 00:13:45.499 in anticipation for the quantum future ahead. 00:13:47.069 --> 00:13:48.807 The messages of foreign leaders, 00:13:50.100 --> 00:13:51.455 of war generals 00:13:52.653 --> 00:13:54.815 or of individuals who question power, 00:13:55.936 --> 00:13:57.486 they're encrypted for now. 00:13:58.487 --> 00:14:00.088 But as soon as the day comes 00:14:00.112 --> 00:14:02.888 that someone gets their hands on a quantum computer, 00:14:02.912 --> 00:14:06.038 they can retroactively break anything from the past. 00:14:07.078 --> 00:14:09.108 In certain government and financial sectors 00:14:09.132 --> 00:14:10.535 or in military organizations, 00:14:10.559 --> 00:14:13.633 sensitive data has got to remain classified for 25 years. 00:14:14.273 --> 00:14:17.453 So if a quantum computer really will exist in 10 years, 00:14:17.477 --> 00:14:19.767 then these guys are already 15 years too late 00:14:19.791 --> 00:14:21.501 to quantum-proof their encryption. NOTE Paragraph 00:14:22.858 --> 00:14:24.834 So while many scientists around the world 00:14:24.858 --> 00:14:27.761 are racing to try to build a quantum computer, 00:14:27.785 --> 00:14:31.235 us cryptographers are urgently looking to reinvent encryption 00:14:31.259 --> 00:14:33.461 to protect us long before that day comes. 00:14:34.718 --> 00:14:37.692 We're looking for new, hard mathematical problems. 00:14:38.435 --> 00:14:41.446 We're looking for problems that, just like factorization, 00:14:41.470 --> 00:14:44.479 can be used on our smartphones and on our laptops today. 00:14:45.596 --> 00:14:49.971 But unlike factorization, we need these problems to be so hard 00:14:49.995 --> 00:14:52.841 that they're even unbreakable with a quantum computer. NOTE Paragraph 00:14:54.366 --> 00:14:57.972 In recent years, we've been digging around a much wider realm of mathematics 00:14:57.996 --> 00:14:59.522 to look for such problems. 00:15:00.205 --> 00:15:02.176 We've been looking at numbers and objects 00:15:02.200 --> 00:15:04.368 that are far more exotic and far more abstract 00:15:04.392 --> 00:15:06.348 than the ones that you and I are used to, 00:15:06.372 --> 00:15:07.969 like the ones on our calculators. 00:15:07.993 --> 00:15:10.373 And we believe we've found some geometric problems 00:15:10.397 --> 00:15:11.796 that just might do the trick. 00:15:12.383 --> 00:15:15.446 Now, unlike those two- and three-dimensional geometric problems 00:15:15.470 --> 00:15:19.169 that we used to have to try to solve with pen and graph paper in high school, 00:15:19.193 --> 00:15:23.422 most of these problems are defined in well over 500 dimensions. 00:15:24.453 --> 00:15:28.209 So not only are they a little hard to depict and solve on graph paper, 00:15:28.233 --> 00:15:31.705 but we believe they're even out of the reach of a quantum computer. 00:15:33.392 --> 00:15:35.089 So though it's early days, 00:15:35.113 --> 00:15:39.618 it's here that we are putting our hope as we try to secure our digital world 00:15:39.642 --> 00:15:41.612 moving into its quantum future. NOTE Paragraph 00:15:43.171 --> 00:15:45.024 Just like all of the other scientists, 00:15:45.048 --> 00:15:47.211 we cryptographers are tremendously excited 00:15:47.235 --> 00:15:51.092 at the potential of living in a world alongside quantum computers. 00:15:52.839 --> 00:15:54.992 They could be such a force for good. 00:15:57.508 --> 00:16:01.756 But no matter what technological future we live in, 00:16:04.867 --> 00:16:09.723 our secrets will always be a part of our humanity. 00:16:10.637 --> 00:16:12.871 And that is worth protecting. NOTE Paragraph 00:16:13.559 --> 00:16:14.713 Thanks. NOTE Paragraph 00:16:14.737 --> 00:16:17.843 (Applause)