#cryptography Created at 210323 # [Anonymous feedback](https://www.admonymous.co/louis030195) # [[Epistemic status]] #shower-thought Last modified date: 210323 Commit: 0 # Related # TODO > [!TODO] TODO # The second death of the internet Imagine two people, Alice and Bob, who want to keep their conversation private. To do this, they multiply two very large prime numbers together and share the result with each other. This multiplication produces a number that is almost impossible to factorize without knowing the original prime numbers, and as long as Alice and Bob keep those primes secret, their conversation is secure. However, a third person, Eve, wants to eavesdrop on their conversation. She has access to a powerful computer, but unfortunately, all classical computers are limited in their ability to factorize large numbers quickly. So she cannot crack the code with her classical computer and has to listen in on Alice and Bob's conversation in order to find out what they are saying. But one day, a quantum computer is invented, and with it comes Shor's algorithm. Shor's algorithm is a quantum algorithm specifically designed to factorize large numbers exponentially faster than any classical computer. It works by using a quantum version of the Fourier Transform to find the period of a function, which can then be used to factorize the original number. When Eve hears about Shor's algorithm, she realizes that she could use it to crack the encryption that Alice and Bob are using. She builds a quantum computer and uses Shor's algorithm to factorize their secret number. Now she can easily listen in on their conversation and find out what they are saying. This is why the development of quantum computers is such a concern for society. The security of our online communication, financial transactions, and personal data relies on encryption that is currently unbreakable by classical computers. However, if a quantum computer is developed that can implement Shor's algorithm, it would pose a serious threat to our security. Therefore, researchers are actively working on developing quantum-resistant encryption methods that can withstand attacks from even the most powerful quantum computers. It is important that we stay one step ahead of potential attackers to ensure the privacy and security of our digital lives in the future.