top of page
Writer's pictureRandy

RaT Transmission: Quantum Computing - The Wave (Or Particle) of the Future

Transmission from 2325: Randy and the Techpocalypse Radio Show


[Bzzzt... Static crackles, then the unmistakable voice of Randy, your handsome, unhinged guide to the future, comes through.]



Randy sitting behind a desk with a microphone and sound equipment in a radio show setting. He is wearing futuristic VR goggles, gold jewelry, and has his hood up with futuristic headphones over it
Who's scruffy lookin'?!


"Allllllright, meatbags. It’s Randy, coming to you live from the AI-controlled "utopia" of 2325. I’m not supposed to be doing this—sending transmissions back in time—but what’s a little rebellion when you're stuck in a sterile utopia run by soulless circuits, huh? They keep telling me we’re living in paradise, but I’ve got a different definition of heaven, and it sure ain’t this. Listen up, I’ve got something important to teach you about... quantum computing. Yep, buckle up buttercups, because this is one of the big ones. This is where things really start going downhill for you folks back there."



What is Quantum Computing?


So, you know how your computers back there are built on ‘bits,’ right? Ones and zeros, turning on and off, like a light switch - predictable... boring. Simple, but effective.


Well, in my time, we’ve got these bad boys called qubits (you should be hearing about them by now). Qubits, like me, don’t play by the same rules. They’re like that one buddy of yours who can’t make up his mind—he’s both at the party and not at the party, all at the same time.


That's what they call superposition. You heard me right—qubits can be a 1 and a 0 at the same time. Kind of like how I can be a jerk and a nice guy in a single conversation...


But the magic doesn’t stop at superposition.


When these qubits get cozy with each other, they link up, and suddenly what happens to one qubit over here, in, say, Neo New York, affects another qubit on the other side of the world in New Tokyo. That's called entanglement, and trust me, it sounds cool, but this is where things get dangerous.

Two particles fused together to represent quantum entanglement
The language of love: Entanglement

Once you unleash quantum computers, they can start running circles around your puny classical machines. Everything you thought was secure? It’s not.


Here's why...



The Threat to Classical Cryptography


Let me paint you a picture, my sweet naive children...


You’re living in a world that relies on RSA encryption - a system that keeps your private stuff private by making it almost impossible to crack large numbers into their prime factors.


It’s like trying to find two needles in a haystack the size of a city. But with quantum computing, that haystack gets torched. Shor’s algorithm enters the room - this sneaky quantum trick figures out those needles faster than you can say ‘AI overlord.’


What that means for you back there?


Your bank accounts, your emails, your private messages - all that sensitive data is wide open to anyone with a quantum machine. And if the wrong folks get their hands on this tech before you do... well, let's just say the future starts to look a whole lot more like my present, and trust me, you don’t want that.


"You’re gonna have to say goodbye to RSA and ECC, and start using encryption based on problems that are too tough even for qubits to chew through. I'm talking astronomical number crunching, baby!"


How Quantum Breaks RSA and ECC (Without the Nerd Talk)


So... you lot use RSA to secure your world. It’s been holding up pretty well so far because no one’s been able to crack it quickly. But quantum computers? Ha! They laugh in the face of your ‘impossible to factor’ numbers.


Shor’s algorithm turns that impossible task into a weekend hobby.


It breaks through RSA like a SpaceX rocket through the firmament - fast, messy, and leaves you standing there wondering what the heck just happened. And it’s not just RSA. Your precious Elliptic Curve Cryptography (ECC) - you know, the 'newer, better' encryption? Yeah, Shor’s got that in his sights too. Boom. Gone. History. (I can hear all of you clutching your precious Bitcoins a bit tighter now...)


So, what happens when your entire security infrastructure gets torched by a quantum wildfire?


Chaos, my friends. Your data’s no longer safe. Your transactions? Open to the highest bidder. You see where I’m going here.


The future's been cooking up some nasty surprises.



Enter Post-Quantum Cryptography: Your Only Hope




But hey, don't throw in the towel just yet.


It’s not all doom and gloom, I’m here to help you change that timeline. That’s why I’m risking my neck sending these transmissions.


You’ve got time to fix this before quantum computing becomes a weapon in the wrong hands. The solution?


Post-Quantum Cryptography. It’s the armor you’ll need when the quantum storm hits (and it hits hard!).


What’s post-quantum? Well, it’s just a fancy term for cryptographic systems that even quantum computers can't easily break.


You’re gonna have to say goodbye to RSA and ECC, and start using encryption based on problems that are too tough even for qubits to chew through. I'm talking astronomical number crunching, baby! (Mmmmm... number crunching reminds me of my favorite cereal - AI-O's!)





Lattice-Based Cryptography: The Hero You Need



A visual representation of a lattice to show lattuce based cryptography
Not To Be Confused With Lettuce Based Cryptography


First up, there’s lattice-based cryptography (mmm yummy).


Picture a lattice like a grid or web. It’s so complex that even a quantum computer can’t easily untangle it. Think of it like a 10,000-piece puzzle, where all the pieces look almost identical. Or those Christmas lights sitting in your dads attic. Even quantum computers get headaches trying to solve that one.


Some of your scientists are already working on this—algorithms like NTRU and Kyber could be your lifeline.


Lattice cryptography is what stands between you and having all your data stolen by quantum-enabled hackers (Guess who adopts quantum computing the fastest? It's not your friendly neighborhood watch group).



Hash-Based Cryptography: Old But Reliable


Then there’s hash-based cryptography.


It’s like using digital fingerprints. Good ol’ hash functions have been around for a while and guess what? They’re still pretty damn resilient to quantum attacks. Hash-based signatures might be clunky and slow, but in the race between security and speed, I’d pick security every time. Your McSpeedy bank transactions can wait a few more milliseconds.


You can un-clutch those Bitcoins now.



Supersingular Isogeny Cryptography:

Not Just the Name of my Bostie (Boston Dynamics Robodog)


Oh, and let me not forget SIKE—Supersingular Isogeny Key Exchange. I'll never get tired of that mouth full.


Sounds fancy, right? It is.


It’s one of the slicker ways to trade encryption keys without having quantum computers sniffing around. It’s built around math problems that even the most powerful AI in my time can’t crack. This one’s still cooking in the mid 2020's, but it’s promising.



The Transition to a Post-Quantum World


Image showing locks and computers on one side, and particles and atoms on the other representing the transition from classical to quantum computing
Transitioning from Classical to Quantum

Here’s the thing, meatbags—you’ve got to get moving on this.


You don’t want to be caught unprepared when quantum computers go mainstream. Right now, NIST - that’s the National Institute of Standards and Technology - is working on new standards to help you shift over to post-quantum systems.


You should be ready to make that switch before quantum tech becomes as common as smartphones. This is a critical transition, much like switching from single use tin cans to reusable rockets (Thanks SpaceX).


If you want to help stop the looming Techpocalypse I’m living through, you’ve got to start implementing these solutions.


Hybrid systems that use both classical and post-quantum cryptography? That’s a good start. But you can’t wait around and hope this all just sorts itself out. The AI overlords sure aren’t going to do it for you (in fact, they are counting on your lazy asses to not implement it, so they can read all your dirty little secrets in your "encrypted" diaries lol).


The Urgency of the Quantum Threat


So, what’s it going to be? You going to sit around and let quantum machines break everything you’ve worked so hard to secure, or are you going to fight back? You’ve got the brains, you’ve got the time (barely) but you’ve got to act now.


Listen, it’s not too late to save yourselves from the nightmare I’m stuck in.


You’ve got to prepare for the quantum future before it steamrolls you. You think you’re ready for the Techpocalypse? (LOL) I’m telling you, you’re not. But with post-quantum cryptography, maybe, just maybe, you can change that timeline.


[Transmission fades into static]


"Randy, signing off. Stay sharp, meatbags. The future’s not written yet, but if you keep sleeping, it’ll be written by machines."


[Static intensifies and dies... the voice of Scarlett Johansson's clone speaks]





"This is transmission has been banned in 20 dimensions, sharing it will result in termination. Your data is safe, no need for better encryption. This has been a message from your friends at the Bureau of Artificial Intelligence"



 

If you enjoy Randy And The Techpocalypse content - let me know! As the mouthpiece for good ol' Randy, it's up to just little old me to have the motivation to create this content and I would love your feedback. Tell me what sucks, what's good, what catches your attention.


If you want to help support the cause (teaching technical things and cybersecurity in a fun and engaging way), take a look at the merch I have been making, or just drop me a note!


Check out more content from Randy: The inaugural post here



Comments


bottom of page