Skip to playerSkip to main content
  • 24 minutes ago
Why quantum computing is the end of Cyber security , Quantum Apocalypse, Harvest now decrypt later, explained
Transcript
00:00What if I say that everything we call secure is based on a mathematical lie.
00:05Today we are exploring why our RSA and ECC encryptions are essentially dead on arrival.
00:11Now picture this, every secret message you have ever sent, every password protecting
00:15your future college apps or bank account, every secure website you log into, all of
00:21it cracked wide open overnight.
00:22No heads, no phishing, just math winning.
00:24This is not a movie, this is the quantum apocalypse.
00:27And experts say the warning lights are flashing right now.
00:33Welcome to the 2026 quantum apocalypse.
00:36Is your IT security already dead?
00:38Today we are diving deep into why quantum computing is about to rewrite the rules of cybersecurity
00:45and what that means for you.
00:47Stick around and by the end you will know if your digital life is already on borrowed time.
00:53First things first.
00:55What even is quantum computing?
00:58Your phone or laptop uses classical bits, tiny switches that are either 0 or 1.
01:05Like a coin that is head or tail.
01:09Quantum computers use qubits.
01:11Thanks to quantum mechanics, the weird rules of tiny particles, a qubit can be 0 or 1 at the
01:18same time.
01:19That's called superposition.
01:21It's like a coin spinning in the air both heads and tails until you look.
01:26And qubits can get entangled, link up, so one state instantly affects the other.
01:32No matter the distance, Einstein called it spooky action.
01:37Result?
01:38One quantum computer can test millions of possibilities at once.
01:43Classical computers?
01:44They do it one by one.
01:46Like checking doors in a hallway.
01:49Quantum?
01:49It checks the whole building at the same time.
01:52Research from IBM and Google shows we are hitting real milestones.
01:57Error corrected qubits are coming fast.
02:01By 2026, cloud quantum services are exploding.
02:05But here's the scary part.
02:07This power doesn't just solve problems, it breaks security.
02:13As we all know that traditional IT security is built on hard math.
02:18Most of the internet security, HTTPS, banking apps, VPNs, relies on two big math problems that
02:25are insanely hard for normal computers.
02:27First, RSA encryption.
02:30It uses two massive prime numbers multiplied together to make a huge public key.
02:34To crack it, you factor the huge number back into primes.
02:39A 2048-bit RSA key.
02:43Huge number.
02:44Classical computers would take longer than the age of the universe.
02:47And the second one is elliptic curve cryptography used in Bitcoin wallets and secure chats.
02:56It hides secrets on a curved math graph, solving the discrete log problems.
03:01Here is like finding one specific point on an endless rollercoaster track.
03:07These are not encryption in the spy movie sense.
03:10They are math puzzles so tough.
03:12Even supercomputers give up.
03:15But quantum changes everything.
03:19So what makes quantum so dangerous?
03:21And what is its killer weapon?
03:24Its Shor's algorithm.
03:26Inter Shor's algorithm.
03:28It was invented in 1994 by mathematician Peter Shor on a big enough quantum computer.
03:35It turns factoring and discrete logs into an easy mode.
03:39How?
03:40Quantum parallelism.
03:42And clever metrics.
03:44It finds patterns in huge numbers that classical computers miss.
03:48Real talk from recent research shows that baking a 2048-bit RSA key might need just a million
03:57logical quivots.
03:58It seems very big amount.
04:01It's tough but doable with error-correcting advances.
04:04IBM's roadmaps and Google papers suggest cryptographically relevant machines why the early 2030s?
04:11It is near.
04:12And some optimists say that it can be invented in 2027.
04:19Governments and hackers are already scooping up encrypted data today, waiting for the quantum
04:23key.
04:24And your 2025 zoom call was safe.
04:28Yes, it is safe now but in 2032, maybe not.
04:33So the traditional security is dead.
04:36But new math is rising.
04:37Inter lattice-based cryptography.
04:40The star of NIST's post-quantum standards.
04:42A lattice?
04:44It's like an infinite grid of points in high-dimensional space.
04:48Think a 3D chessboard stretched into 500-plus dimensions.
04:53It's scary.
04:54Points are made by adding vectors, arrows from a basis-like lego instructions.
04:59Here's the math.
05:00Imagine a two-dimension for starters.
05:02The basis vectors V1 and V2.
05:06And in this space, both vectors V1 and V2 can be uniquely represented as a linear combination
05:14of 2, 0 and 1, 3.
05:17And we can calculate the coordinates of the specific point.
05:22But here comes the lattice points.
05:26All combos like 3V1 plus 2V2 and the coordinates are 8, 6.
05:33In higher dimensions, finding the shortest vector SVP between points is brutal.
05:39For the closest vector, CVP.
05:41Classical computers?
05:43Good luck.
05:44In 500 dimensions.
05:45Quantum?
05:46Still super hard.
05:49No.
05:50Shaw's shortcut here.
05:51The real star.
05:52Learning with errors.
05:54You get noisy equations like A into S plus E is equal to B, where is a tiny random error.
06:02E is a tiny random error.
06:04Solving for secret S. Easy if you know the noise pattern.
06:08But in lattices, it's like finding a needle in a hay stock that's on fire.
06:13Quantum computers can achieve this reliably.
06:16NIST picked lattice winners M-L-K-E-M Kyber for key exchange M-L-D-S-A to lithium
06:23for signatures.
06:25They are fast, secure, and ready now.
06:282016.
06:30NIST launches post-quantum crypto project.
06:332022.
06:34NIST selects lattice-based finalists.
06:372024.
06:38First PQC standards, FIPS 203-205, published.
06:442026.
06:45EU and US ramp-up mandates.
06:47Quantum cloud access.
06:492030.
06:50RSA, ECC deprecated, NIST deadline.
06:542035.
06:55Full PQC required, US NSM-10 goal.
06:582026 isn't the end, it's the wake-up year.
07:01By 2030, your school's Wi-Fi or future job systems could switch.
07:05But start prepping now.
07:07So, is your IT security dead in 2026?
07:10Not yet, but it's on life support.
07:13If you're building apps, using VPNs, or storing data.
07:16Yes, long-term stuff is vulnerable.
07:18Action steps for students and future pros.
07:211.
07:22Learn PQC basics.
07:23Try Kyber in Python demos.
07:252.
07:26Push for quantum-safe tools.
07:28Signal, some browsers already testing.
07:293.
07:31Careers alert.
07:32Post-quantum security jobs are exploding.
07:34Governments are moving.
07:36Companies like Cloudflare and IBM are deploying lattice crypto today.
07:40You can too.
07:40The 2026 quantum apocalypse isn't about panic, it's about power.
07:45Quantum computing will solve climate models, cure diseases.
07:48But only if we secure it first.
07:50Traditional IT security.
07:52It's evolving, not dying.
07:54Lattice math and PQC are your new armor.
07:57What do you think, is the apocalypse here?
07:59Or is this humanity's upgrade?
08:00Drop comments, share this with your class, and stay quantum aware.
08:04Thanks for watching.
08:05Your future digital self will thank you.
08:08See you in the post-quantum world.
08:10Credits roll with sources.
08:11NIST, IBM Quantum, Global Risk Institute reports.
Comments

Recommended