SlideShare a Scribd company logo
Quantum Computers
vs.
Computers Security
@veorq — http://aumasson.jp
Schrodinger equation
Entanglement
Bell states
EPR pairs
Wave functions
Uncertainty principle
Tensor products
Unitary matrices
Hilbert spaces
Nobody understands this stuff, and you don’t
need it to understand quantum computing
1. QC 101
2. In practice
3. Breaking crypto
4. Post-quantum crypto
5. Quantum key distribution
6. Quantum copy protection
7. Quantum machine learning
8. Conclusions
1. QC 101
Quantum mechanics
Nature’s operating system
Quantum mechanics
Mathematics
Gravity Electromagnetism Nuclear forcesApplications
OS
Hardware
Quantum mechanics
Particles in the universe behaves randomly
Their probabilities can be negative
"Negative energies and probabilities should
not be considered as nonsense. They are
well-defined concepts mathematically, like a
negative of money."
—Paul Dirac, 1942
α |0⟩ + β |1⟩
When observed
0 with probability α2
1 with probability β2
Once observed, stays either 0 or 1 forever
Quantum bit (qubit)
α0x00
|0x00⟩ + …+ α0xfe
|0xfe⟩ + α0xff
|0xff⟩
Again, the sum of probabilities α2
equals 1
The α’s are called amplitudes
Generalizes to 32- or 64-bit quantum words
Quantum byte
Set of quantum registers (bits/bytes/words)
Quantum assembly instructions:
Transform the probabilities of the register
Probabilities should still sum to 1
Linear math transforms (matrix products)
A program ends with a measurement
Quantum computer
Quantum computer simulators
Impossible with a classical computer
Possible with a quantum computer!
The killer app
You heard about NP-complete problems?
SAT, scheduling, Candy Crush, etc.
Solution hard to find, but easy to verify
QC does not solve NP-complete problems!
QC vs. hard problems
NNP
P
(easy)NNP
NP
(hard)
NNP
BQP (quantum)
Quantum speedup
Make the impossible possible
Example: Factoring integers
Hard classically (exponential-ish)
Easy with a quantum computer!
Obvious application: break RSA!
Quantum parallelism
“Qubits encode all values at the same time!”
Caveat: you can only observe one result
Different observations in different worlds
2. In practice
Factoring experiments
Only for numbers with special patterns
Not really the real thing (Shor)
Constructing quantum computers
Qubits obtained from physical phenomena
Photons (2 polarizations)
Molecules (2 nuclear spins)
Superconducting (different)
Major pain: correction or errors
Qubits mixed up with the environment
Quantum noise
Recent milestone
Partial error correction for a 9-qubit state
Google-sponsored research group
D-Wave
Canadian company, pioneer in QC research
Adiabatic computers, not real QC
512-qubit system
Quantum annealing
No Shor
Stability, error-correction
How much will cost “N quantum
operations” vs “N classical operations”?
Some algorithms need quantum RAM,
which we don’t really know how to do
Unlikely to come in the next decade, if ever
Many challenges
3. Breaking crypto
TL;DR: We’re doomed
RSA: broken
Diffie-Hellman: broken
Elliptic curves: broken
El Gamal: broken
RSA
No more RSA encryption or signatures
Based on the hardness of factoring
You know N = p*q, you search p and q
Hard on a classical computer (most probably)
Easy on a quantum computer!
Xe
mod N for e in [1, 2, 3, …] and some X
will repeat with a period dividing (p-1)(q-1)
A period gives information on p and q!
Shor’s algorithm:
1. Prepare qubits to encode X,X2
,X3
,X4
, ... simultaneously
2. Find the period using the Quantum Fourier Transform
3. Exploits the period to recover p and q
Shor’s idea to factor N=pq
Discrete logarithms
Problem behind Diffie-Hellman, ECC
You know g and gy
, you search y
Like factoring, a Hidden Subgroup Problem
Shor works too!
What about symmetric ciphers?
AES with a 128-bit key:
Classical: 128-bit security
Quantum: 64-bit security
Grover’s algorithm: searches in N items in
O(√N) time and O(log N) memory
Solution: upgrade to 256-bit AES
4. Post-quantum crypto
Alternatives to RSA, Diffie-Hellman, ECC
Resistance to QC can’t be totally proved
http://pqcrypto.org/
Post-quantum crypto
Hash-based signatures
Problem: inverting hash functions
Ideas from Lamport (1979), Merkle (1989)
Example of SPHINCS:
(http://sphincs.cr.yp.to/)
41 KB signatures
1 KB public and private keys
Slow (100s signatures/sec)
Multivariate signatures
Problem: solve complex systems of equations
First ideas in the 1980s
0 =X1
X2
X3
+ X1
X3
+ X2
X4
1 = X1
X3
X4
+ X2
X3
X4
0 = X1
X3
+ X2
X3
Many schemes have been broken...
Code-based crypto
Problem: decoding error-correcting codes
Schemes: McEliece (1979), Niederreiter (1986)
Limitations:
Large keys (100 KB+)
Fewer optimized implementations
Lattice-based crypto
Based on lattice problems (duh!)
Learning-with-errors: learn a simple function
given results with random noise
Encryption, signature
5. Quantum key distribution
Quantum key distribution (QKD)
Use of quantum phenomena to share a key
Kind of “quantum Diffie-Hellman”
Not quantum computing
Not quantum cryptography
“Security based on the laws of physics”
Eavesdropping will cause errors
Keys truly random
BB84
First QKD protocol, though not really quantum
Idea:
Send bits in the form of polarized photons
Can be observed in 2 ways, only one is right
Caveats
Like any security system, it’s complicated
Security
Eventually relies on classical crypto
Typically with frequent rekeying
QKD implementations have been attacked
"Quantum hacking"
(formerly NTNU, Norway)
Deployment
Dedicated optical fiber links
Point-to-point, limited distance (< 100 km)
6. Quantum copy protection
Quantum copy protection
Idea: leverage the no-cloning principle
(cos you can't know everything about something)
Quantum cash
Impossible to counterfeit, cos' physics (1969)
Bills include qubits with some secret encoding
⬆ ⬈ ⬇ ⬅⬉⬇⬈ ⬈ ⬆
Only the bank can authenticate bills...
Publicly verifiable quantum cash
Anyone can verify that a bill isn't counterfeit
Uses public-key crypto, non-quantum
Can be secure even with black-box verification
Quantum software protection
Using quantum techniques:
"Obfuscate" the functionality
Make copies impossible
verify(pwd) {
return pwd == "p4s5w0rD"
}
1. Turn verify() into a list of qubits
2. Verification: apply a transform that depends
on pwd, then measure the qubits
7. Quantum machine learning
Machine learning
“Science of getting computers to act without
being explicitly programmed” —Andrew Ng
Supervised Non-supervised
Successful for spam filtering, fraud detection,
OCR, recommendation systems
No silver bullet, but may help
ML being used for
Intrusion detection (network, endpoint)
Binary vulnerability discovery
Nevertheless, vendors give neither
Details on the techniques used, nor
Effectiveness figures or measurements
Machine learning and security
Quantum machine learning
“Port” of basic ML techniques to QC, like
k-mean clustering
Neural networks
Support vector machines
Many use Grover for a square-root speedup
Potential exponential speedup, but...
Quantum RAM (QRAM)
Awesome concept
Addresses are given in superposition
Read values are retrieved in superposition
Many QML algorithms need QRAM
But it'd be extremely complicated to build
8. Conclusions
Quantum computers s***
Because they...
ARE NOT superfaster computers
WOULD NOT solve NP-hard problems
MAY NEVER BE BUILT anyway
Quantum computers are awesome
Because they…
Would DESTROY all pubkey crypto deployed
Give a new meaning to "COMPUTING"
May teach us a lot about physics and Nature
Thank you!

More Related Content

PPT
Ibm quantum computing
PDF
The second quantum revolution: the world beyond binary 0 and 1
PPTX
Quantum computing
PPTX
Quantum Computing and its security implications
PPT
2017 10 17_quantum_program_v2
PPT
2017 07 04_cmmse_quantum_programming_v1
PPTX
Quantum programming
PPTX
Quantum Computers
Ibm quantum computing
The second quantum revolution: the world beyond binary 0 and 1
Quantum computing
Quantum Computing and its security implications
2017 10 17_quantum_program_v2
2017 07 04_cmmse_quantum_programming_v1
Quantum programming
Quantum Computers

What's hot (15)

PDF
Quantum Roles in Quantum Computing
PDF
Recurrent Neural Networks II (D2L3 Deep Learning for Speech and Language UPC ...
PDF
Programming Language Memory Models: What do Shared Variables Mean?
PPTX
What is Quantum Computing and Why it is Important
PDF
Deep Learning for Computer Vision: Recurrent Neural Networks (UPC 2016)
PPTX
Tears for quantum fears
PPT
Quantum Cryptography
PDF
Hacking Quantum Cryptography
PDF
Recurrent Neural Networks. Part 1: Theory
PDF
Recurrent Neural Networks (D2L8 Insight@DCU Machine Learning Workshop 2017)
PDF
Recurrent Neural Networks I (D2L2 Deep Learning for Speech and Language UPC 2...
PDF
AINL 2016: Skornyakov
PDF
Recurrent Neural Networks
PPTX
Recurrent Neural Network (RNN) | RNN LSTM Tutorial | Deep Learning Course | S...
PPTX
Quantum Roles in Quantum Computing
Recurrent Neural Networks II (D2L3 Deep Learning for Speech and Language UPC ...
Programming Language Memory Models: What do Shared Variables Mean?
What is Quantum Computing and Why it is Important
Deep Learning for Computer Vision: Recurrent Neural Networks (UPC 2016)
Tears for quantum fears
Quantum Cryptography
Hacking Quantum Cryptography
Recurrent Neural Networks. Part 1: Theory
Recurrent Neural Networks (D2L8 Insight@DCU Machine Learning Workshop 2017)
Recurrent Neural Networks I (D2L2 Deep Learning for Speech and Language UPC 2...
AINL 2016: Skornyakov
Recurrent Neural Networks
Recurrent Neural Network (RNN) | RNN LSTM Tutorial | Deep Learning Course | S...
Ad

Similar to DEF CON 23 - Phillip Aumasson - quantum computers vs computers security (20)

PDF
Quantum_Safe_Crypto_Overview_v3.pdf
PPT
Quantum Computers.ppt
PPT
Quantum Computers.ppt
PDF
Quantum Computers and Where to Hide from Them
PPTX
Quantum Information FINAL.pptx
PDF
Emily Stamm - Post-Quantum Cryptography
PPT
Quantum Information
PPTX
Quantum computing
PDF
Post Quantum Cryptography: Technical Overview
PPTX
Quantum computers
PDF
Introduction to Quantum Cryptography
PPTX
quantum cryptograpy with detailed presentation
PPTX
quantumcrypto
PPT
Fundamentals of Quantum Computing
PPTX
Quantum computer
PPTX
Schaffner Quantum Computing and Cryptography.pptx
PPTX
Quantum computers
PDF
Criptografía cuántica - fundamentos, productos y empresas
PDF
Why Should You Pay Attention To Quantum Computing?
Quantum_Safe_Crypto_Overview_v3.pdf
Quantum Computers.ppt
Quantum Computers.ppt
Quantum Computers and Where to Hide from Them
Quantum Information FINAL.pptx
Emily Stamm - Post-Quantum Cryptography
Quantum Information
Quantum computing
Post Quantum Cryptography: Technical Overview
Quantum computers
Introduction to Quantum Cryptography
quantum cryptograpy with detailed presentation
quantumcrypto
Fundamentals of Quantum Computing
Quantum computer
Schaffner Quantum Computing and Cryptography.pptx
Quantum computers
Criptografía cuántica - fundamentos, productos y empresas
Why Should You Pay Attention To Quantum Computing?
Ad

More from Felipe Prado (20)

PDF
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
PDF
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
PDF
DEF CON 24 - Tamas Szakaly - help i got ants
PDF
DEF CON 24 - Ladar Levison - compelled decryption
PDF
DEF CON 24 - Clarence Chio - machine duping 101
PDF
DEF CON 24 - Chris Rock - how to overthrow a government
PDF
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
PDF
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
PDF
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
PDF
DEF CON 24 - Gorenc Sands - hacker machine interface
PDF
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
PDF
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
PDF
DEF CON 24 - Rich Mogull - pragmatic cloud security
PDF
DEF CON 24 - Grant Bugher - Bypassing captive portals
PDF
DEF CON 24 - Patrick Wardle - 99 problems little snitch
PDF
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
PDF
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
PDF
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
PDF
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
PDF
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Antonio Joseph - fuzzing android devices

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
cuic standard and advanced reporting.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Approach and Philosophy of On baking technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Electronic commerce courselecture one. Pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Spectroscopy.pptx food analysis technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
The AUB Centre for AI in Media Proposal.docx
cuic standard and advanced reporting.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Unlocking AI with Model Context Protocol (MCP)
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Big Data Technologies - Introduction.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Digital-Transformation-Roadmap-for-Companies.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Network Security Unit 5.pdf for BCA BBA.
Approach and Philosophy of On baking technology
Dropbox Q2 2025 Financial Results & Investor Presentation
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Electronic commerce courselecture one. Pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation_ Review paper, used for researhc scholars
Spectroscopy.pptx food analysis technology
“AI and Expert System Decision Support & Business Intelligence Systems”

DEF CON 23 - Phillip Aumasson - quantum computers vs computers security

  • 1. Quantum Computers vs. Computers Security @veorq — http://aumasson.jp
  • 2. Schrodinger equation Entanglement Bell states EPR pairs Wave functions Uncertainty principle Tensor products Unitary matrices Hilbert spaces Nobody understands this stuff, and you don’t need it to understand quantum computing
  • 3. 1. QC 101 2. In practice 3. Breaking crypto 4. Post-quantum crypto 5. Quantum key distribution 6. Quantum copy protection 7. Quantum machine learning 8. Conclusions
  • 5. Quantum mechanics Nature’s operating system Quantum mechanics Mathematics Gravity Electromagnetism Nuclear forcesApplications OS Hardware
  • 6. Quantum mechanics Particles in the universe behaves randomly Their probabilities can be negative "Negative energies and probabilities should not be considered as nonsense. They are well-defined concepts mathematically, like a negative of money." —Paul Dirac, 1942
  • 7. α |0⟩ + β |1⟩ When observed 0 with probability α2 1 with probability β2 Once observed, stays either 0 or 1 forever Quantum bit (qubit)
  • 8. α0x00 |0x00⟩ + …+ α0xfe |0xfe⟩ + α0xff |0xff⟩ Again, the sum of probabilities α2 equals 1 The α’s are called amplitudes Generalizes to 32- or 64-bit quantum words Quantum byte
  • 9. Set of quantum registers (bits/bytes/words) Quantum assembly instructions: Transform the probabilities of the register Probabilities should still sum to 1 Linear math transforms (matrix products) A program ends with a measurement Quantum computer
  • 11. Impossible with a classical computer Possible with a quantum computer! The killer app
  • 12. You heard about NP-complete problems? SAT, scheduling, Candy Crush, etc. Solution hard to find, but easy to verify QC does not solve NP-complete problems! QC vs. hard problems NNP P (easy)NNP NP (hard) NNP BQP (quantum)
  • 13. Quantum speedup Make the impossible possible Example: Factoring integers Hard classically (exponential-ish) Easy with a quantum computer! Obvious application: break RSA!
  • 14. Quantum parallelism “Qubits encode all values at the same time!” Caveat: you can only observe one result Different observations in different worlds
  • 16. Factoring experiments Only for numbers with special patterns Not really the real thing (Shor)
  • 17. Constructing quantum computers Qubits obtained from physical phenomena Photons (2 polarizations) Molecules (2 nuclear spins) Superconducting (different) Major pain: correction or errors Qubits mixed up with the environment Quantum noise
  • 18. Recent milestone Partial error correction for a 9-qubit state Google-sponsored research group
  • 19. D-Wave Canadian company, pioneer in QC research Adiabatic computers, not real QC 512-qubit system Quantum annealing No Shor
  • 20. Stability, error-correction How much will cost “N quantum operations” vs “N classical operations”? Some algorithms need quantum RAM, which we don’t really know how to do Unlikely to come in the next decade, if ever Many challenges
  • 22. TL;DR: We’re doomed RSA: broken Diffie-Hellman: broken Elliptic curves: broken El Gamal: broken
  • 23. RSA No more RSA encryption or signatures Based on the hardness of factoring You know N = p*q, you search p and q Hard on a classical computer (most probably) Easy on a quantum computer!
  • 24. Xe mod N for e in [1, 2, 3, …] and some X will repeat with a period dividing (p-1)(q-1) A period gives information on p and q! Shor’s algorithm: 1. Prepare qubits to encode X,X2 ,X3 ,X4 , ... simultaneously 2. Find the period using the Quantum Fourier Transform 3. Exploits the period to recover p and q Shor’s idea to factor N=pq
  • 25. Discrete logarithms Problem behind Diffie-Hellman, ECC You know g and gy , you search y Like factoring, a Hidden Subgroup Problem Shor works too!
  • 26. What about symmetric ciphers? AES with a 128-bit key: Classical: 128-bit security Quantum: 64-bit security Grover’s algorithm: searches in N items in O(√N) time and O(log N) memory Solution: upgrade to 256-bit AES
  • 28. Alternatives to RSA, Diffie-Hellman, ECC Resistance to QC can’t be totally proved http://pqcrypto.org/ Post-quantum crypto
  • 29. Hash-based signatures Problem: inverting hash functions Ideas from Lamport (1979), Merkle (1989) Example of SPHINCS: (http://sphincs.cr.yp.to/) 41 KB signatures 1 KB public and private keys Slow (100s signatures/sec)
  • 30. Multivariate signatures Problem: solve complex systems of equations First ideas in the 1980s 0 =X1 X2 X3 + X1 X3 + X2 X4 1 = X1 X3 X4 + X2 X3 X4 0 = X1 X3 + X2 X3 Many schemes have been broken...
  • 31. Code-based crypto Problem: decoding error-correcting codes Schemes: McEliece (1979), Niederreiter (1986) Limitations: Large keys (100 KB+) Fewer optimized implementations
  • 32. Lattice-based crypto Based on lattice problems (duh!) Learning-with-errors: learn a simple function given results with random noise Encryption, signature
  • 33. 5. Quantum key distribution
  • 34. Quantum key distribution (QKD) Use of quantum phenomena to share a key Kind of “quantum Diffie-Hellman” Not quantum computing Not quantum cryptography “Security based on the laws of physics” Eavesdropping will cause errors Keys truly random
  • 35. BB84 First QKD protocol, though not really quantum Idea: Send bits in the form of polarized photons Can be observed in 2 ways, only one is right
  • 36. Caveats Like any security system, it’s complicated
  • 37. Security Eventually relies on classical crypto Typically with frequent rekeying QKD implementations have been attacked "Quantum hacking" (formerly NTNU, Norway)
  • 38. Deployment Dedicated optical fiber links Point-to-point, limited distance (< 100 km)
  • 39. 6. Quantum copy protection
  • 40. Quantum copy protection Idea: leverage the no-cloning principle (cos you can't know everything about something)
  • 41. Quantum cash Impossible to counterfeit, cos' physics (1969) Bills include qubits with some secret encoding ⬆ ⬈ ⬇ ⬅⬉⬇⬈ ⬈ ⬆ Only the bank can authenticate bills...
  • 42. Publicly verifiable quantum cash Anyone can verify that a bill isn't counterfeit Uses public-key crypto, non-quantum Can be secure even with black-box verification
  • 43. Quantum software protection Using quantum techniques: "Obfuscate" the functionality Make copies impossible verify(pwd) { return pwd == "p4s5w0rD" } 1. Turn verify() into a list of qubits 2. Verification: apply a transform that depends on pwd, then measure the qubits
  • 44. 7. Quantum machine learning
  • 45. Machine learning “Science of getting computers to act without being explicitly programmed” —Andrew Ng Supervised Non-supervised Successful for spam filtering, fraud detection, OCR, recommendation systems
  • 46. No silver bullet, but may help ML being used for Intrusion detection (network, endpoint) Binary vulnerability discovery Nevertheless, vendors give neither Details on the techniques used, nor Effectiveness figures or measurements Machine learning and security
  • 47. Quantum machine learning “Port” of basic ML techniques to QC, like k-mean clustering Neural networks Support vector machines Many use Grover for a square-root speedup Potential exponential speedup, but...
  • 48. Quantum RAM (QRAM) Awesome concept Addresses are given in superposition Read values are retrieved in superposition Many QML algorithms need QRAM But it'd be extremely complicated to build
  • 50. Quantum computers s*** Because they... ARE NOT superfaster computers WOULD NOT solve NP-hard problems MAY NEVER BE BUILT anyway
  • 51. Quantum computers are awesome Because they… Would DESTROY all pubkey crypto deployed Give a new meaning to "COMPUTING" May teach us a lot about physics and Nature