Summary of How Quantum Physics Can Make Encryption Stronger

Looking for the video?
We have the summary! Get the key insights in just 5 minutes.

 How Quantum Physics Can Make Encryption Stronger summary
Start getting smarter:
or see our plans

Rating

7 Overall

8 Importance

7 Innovation

7 Style


Recommendation

Increasingly powerful computers are making it easier to hack big corporations and even democratic elections, explains encryption expert Vikram Sharma. Quantum computing will accelerate the threat. The solution, he says, is “to fight quantum with quantum.” As well as describing two quantum solutions for cybersecurity, Sharma provides an encryption primer. getAbstract recommends this informative, easy-to-grasp talk to the layperson interested in the future of cybersecurity.

In this summary, you will learn

  • What three encryption elements help secure data transfer and
  • How scientists are developing quantum solutions to address cyberthreats.
 

About the Speaker

Vikram Sharma is a cybersecurity expert working to improve quantum computing encryption.

 

Summary

Corporate giants like Target, Yahoo and JPMorgan Chase have suffered costly cyberattacks. An increase in such attacks could hurt the global economy. Hackers have hit public agencies as well. From 2012 to 2014, cyberthieves stole sensitive data from 22 million employees of the US Office of Personnel Management. And cybercriminals are targeting democracy. State-sponsored hackers have worked to influence elections in several nations.


More on this topic

Customers who read this summary also read

How to Encrypt Your Entire Life in Less than an Hour
How to Encrypt Your Entire Life in Less than an Hour
8
Forget Apple vs. the FBI
Forget Apple vs. the FBI
8
The Principles of Quantum Team Management
The Principles of Quantum Team Management
8
Inside the Hunt for Russia’s Most Notorious Hacker
Inside the Hunt for Russia’s Most Notorious Hacker
8
The Industries of the Future
The Industries of the Future
9
How to Withstand a Cyberattack
How to Withstand a Cyberattack
8

Related Channels

Comment on this summary