Author Topic: Physics & Mathematics  (Read 57914 times)


ccp

  • Power User
  • ***
  • Posts: 19804
    • View Profile
Here is her website
« Reply #51 on: January 18, 2016, 04:44:05 AM »
http://physicsgirl.com/

She is one in a billion (or at least 100 million)

If I had another life this is what I would wish to be:  not a President, not a sports star, not a celebrity, not the richest man, but to be a genius in physics.  Physics is the closest to truth.   The rest, as Shakespeare said, is just a playing a part on a stage.

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72433
    • View Profile
« Last Edit: February 11, 2016, 08:51:35 AM by Crafty_Dog »

ccp

  • Power User
  • ***
  • Posts: 19804
    • View Profile
Re: Physics & Mathematics
« Reply #53 on: February 12, 2016, 07:47:07 AM »
So what's the big deal?  Wasn't this obvious?   :-D

"Conveyed by these gravitational waves, power 50 times greater than the output of all the stars in the universe combined vibrated a pair of L-shaped antennas in Washington State and Louisiana known as LIGO on Sept. 14."

Wow.  One tiny step closer to an explanation of what the heck is going on.  8-)


ccp

  • Power User
  • ***
  • Posts: 19804
    • View Profile
Re: Physics & Mathematics
« Reply #54 on: April 26, 2016, 08:21:59 PM »
I struggle to get past the Ariana Huffington BS to occasionally find a good article.  Forget about figuring out what is is, or, there is classified and there is classified.  This is real food for thought:

http://www.huffingtonpost.com/george-musser/space-time-illusion_b_9703656.html

ccp

  • Power User
  • ***
  • Posts: 19804
    • View Profile

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72433
    • View Profile


Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72433
    • View Profile


Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72433
    • View Profile
Babylonian Math
« Reply #60 on: April 01, 2019, 12:29:55 AM »
Challenging the preceding:

https://blogs.scientificamerican.com/roots-of-unity/dont-fall-for-babylonian-trigonometry-hype/?fbclid=IwAR2n8gykMBh9maxvtxE3rkXVFSOoeH3v-IHaeh5gKyVt3fqW-wCp1t6RCkA

Sumerian/Babylonian Mathematics-- I found this really interesting:
https://www.storyofmathematics.com/sumerian.html?fbclid=IwAR22g8amoim4dl1KVo7QFm3_S0-Ts8mJVFXkDfMaICgYjMw2TFELDDouHEg 

Separately:   "One of me favorite "tricks " is to have someone add any two numbers together one after another ( 1 + 2 =3...2+3=5...5+3=8, etc, then divide last number by next to last number...no matter what numbers you start with, the answer is 1.618..."


ccp

  • Power User
  • ***
  • Posts: 19804
    • View Profile
Feynman lecture on Law of gravity
« Reply #61 on: April 13, 2019, 09:11:09 PM »

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72433
    • View Profile


Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72433
    • View Profile



Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72433
    • View Profile

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72433
    • View Profile

DougMacG

  • Power User
  • ***
  • Posts: 19477
    • View Profile
Re: Time
« Reply #69 on: August 10, 2020, 07:56:47 AM »
https://getpocket.com/explore/item/forget-everything-you-think-you-know-about-time?utm_source=pocket-newtab

We can't look at the stars and their locations in the sky.  We're seeing where they were thousands of years ago.
---

Space travel contemplated 45 years ago:
"so many years have gone though I'm older but a year..."
  - Brian May https://www.songfacts.com/lyrics/queen/39



DougMacG

  • Power User
  • ***
  • Posts: 19477
    • View Profile

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72433
    • View Profile
Re: Physics & Mathematics
« Reply #72 on: January 07, 2022, 12:12:05 PM »
 8-)

ccp

  • Power User
  • ***
  • Posts: 19804
    • View Profile
the physics behind hitting a tennis ball at rocket speed
« Reply #73 on: September 09, 2022, 04:18:28 PM »
if you missed fastest server recorded 163 mph, you can watch it again - and still miss it:

https://www.youtube.com/watch?v=uKeL-W7xft0

the physics behind this :

https://theconversation.com/fast-serves-dont-make-sense-unless-you-factor-in-physics-106937
« Last Edit: September 09, 2022, 04:20:50 PM by ccp »

ccp

  • Power User
  • ***
  • Posts: 19804
    • View Profile
physics nobel prize
« Reply #74 on: October 05, 2022, 02:16:02 PM »
https://www.yahoo.com/finance/news/win-nobel-prize-physics-scientists-210200546.html

If I could come back I would wish I had the mind to understand any of this.....


Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72433
    • View Profile
Re: Physics & Mathematics
« Reply #75 on: October 05, 2022, 07:03:31 PM »
Just reading that article left me feeling stupid. :-D

DougMacG

  • Power User
  • ***
  • Posts: 19477
    • View Profile
Re: Physics & Mathematics
« Reply #76 on: October 05, 2022, 08:30:43 PM »
Don't feel bad.  They don't understand it either.

Einstein was shown to be wrong?  But he made his mark showing that Newton was wrong. How long until we find out these guys are wrong too.

Wrong is kind of a harsh characterization.  The best minds puts the best explanations possible on what is known at the time.

https://www.snexplores.org/article/quantum-world-mind-bogglingly-weird

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72433
    • View Profile
Tesla Mathematics
« Reply #77 on: November 05, 2022, 02:34:41 PM »
https://www.youtube.com/watch?v=6ZrO90AI0c8

Haven't watched this yet, looks intriguing.

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72433
    • View Profile
Quantum Uncertainty
« Reply #78 on: December 10, 2022, 08:12:03 PM »

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72433
    • View Profile
Re: Physics & Mathematics
« Reply #79 on: August 29, 2023, 01:53:06 PM »


https://phys.org/news/2023-08-visualizing-mysterious-quantum-entanglement-photons.html?fbclid=IwAR2hIHqdFGbXfkgHajEqdT9lTFvYf3P9ez4dXIDLXIsv6C2vw2tCTTvFT6Y

AUGUST 21, 2023

 Editors' notes
Visualizing the mysterious dance: Quantum entanglement of photons captured in real-time
by University of Ottawa

Biphoton state holographic reconstruction. Image reconstruction. a, Coincidence image of interference between a reference SPDC state and a state obtained by a pump beam with the shape of a Ying and Yang symbol (shown in the inset). The inset scale is the same as in the main plot. b, Reconstructed amplitude and phase structure of the image imprinted on the unknown pump. Credit: Nature Photonics (2023). DOI: 10.1038/s41566-023-01272-3
Researchers at the University of Ottawa, in collaboration with Danilo Zia and Fabio Sciarrino from the Sapienza University of Rome, recently demonstrated a novel technique that allows the visualization of the wave function of two entangled photons, the elementary particles that constitute light, in real-time.


Using the analogy of a pair of shoes, the concept of entanglement can be likened to selecting a shoe at random. The moment you identify one shoe, the nature of the other (whether it is the left or right shoe) is instantly discerned, regardless of its location in the universe. However, the intriguing factor is the inherent uncertainty associated with the identification process until the exact moment of observation.

The wave function, a central tenet in quantum mechanics, provides a comprehensive understanding of a particle's quantum state. For instance, in the shoe example, the "wave function" of the shoe could carry information such as left or right, the size, the color, and so on.

More precisely, the wave function enables quantum scientists to predict the probable outcomes of various measurements on a quantum entity, e.g. position, velocity, etc.

This predictive capability is invaluable, especially in the rapidly progressing field of quantum technology, where knowing a quantum state which is generated or input in a quantum computer will allow to test the computer itself. Moreover, quantum states used in quantum computing are extremely complex, involving many entities that may exhibit strong non-local correlations (entanglement).

Knowing the wave function of such a quantum system is a challenging task—this is also known as quantum state tomography or quantum tomography in short. With the standard approaches (based on the so-called projective operations), a full tomography requires large number of measurements that rapidly increases with the system's complexity (dimensionality).

Previous experiments conducted with this approach by the research group showed that characterizing or measuring the high-dimensional quantum state of two entangled photons can take hours or even days. Moreover, the result's quality is highly sensitive to noise and depends on the complexity of the experimental setup.

The projective measurement approach to quantum tomography can be thought of as looking at the shadows of a high-dimensional object projected on different walls from independent directions. All a researcher can see is the shadows, and from them, they can infer the shape (state) of the full object. For instance, in CT scan (computed tomography scan), the information of a 3D object can thus be reconstructed from a set of 2D images.


In classical optics, however, there is another way to reconstruct a 3D object. This is called digital holography, and is based on recording a single image, called interferogram, obtained by interfering the light scattered by the object with a reference light.

The team, led by Ebrahim Karimi, Canada Research Chair in Structured Quantum Waves, co-director of uOttawa Nexus for Quantum Technologies (NexQT) research institute and associate professor in the Faculty of Science, extended this concept to the case of two photons.

Reconstructing a biphoton state requires superimposing it with a presumably well-known quantum state, and then analyzing the spatial distribution of the positions where two photons arrive simultaneously. Imaging the simultaneous arrival of two photons is known as a coincidence image. These photons may come from the reference source or the unknown source. Quantum mechanics states that the source of the photons cannot be identified.

This results in an interference pattern that can be used to reconstruct the unknown wave function. This experiment was made possible by an advanced camera that records events with nanosecond resolution on each pixel.

Dr. Alessio D'Errico, a postdoctoral fellow at the University of Ottawa and one of the co-authors of the paper, highlighted the immense advantages of this innovative approach, "This method is exponentially faster than previous techniques, requiring only minutes or seconds instead of days. Importantly, the detection time is not influenced by the system's complexity—a solution to the long-standing scalability challenge in projective tomography."

The impact of this research goes beyond just the academic community. It has the potential to accelerate quantum technology advancements, such as improving quantum state characterization, quantum communication, and developing new quantum imaging techniques.

The study "Interferometric imaging of amplitude and phase of spatial biphoton states" was published in Nature Photonics.

Body-by-Guinness

  • Power User
  • ***
  • Posts: 3244
    • View Profile
Imaging Electrons in an Billionth of Billionth Second
« Reply #80 on: October 13, 2023, 11:11:12 PM »
Ye gods, Nobel prize winner find a way to illuminate electrons on so fleeting a scale they appear almost still, allowing processes that involve electron exchange to be better visualized and understood:

https://www.quantamagazine.org/physicists-who-explored-tiny-glimpses-of-time-win-nobel-prize-20231003/?fbclid=IwAR2FAUnBBh_lZkvWxW69ngtmYWwn7aNiX8FMj-26e4Ii6MCMCIsKnHe9Af8

Body-by-Guinness

  • Power User
  • ***
  • Posts: 3244
    • View Profile
G-Hat Symmetries & Unified Math Theory?
« Reply #81 on: October 14, 2023, 12:52:49 AM »
2nd post:

The math here is WAY beyond me (I very much regret how little math I’ve learned and wish I had studied it more in school, or better yet found a math teacher able to deal with the drummer I dance to) but suggests some beautiful symmetries that may very well build bridges across various disciplines that will likely bear momentous fruit.

https://www.quantamagazine.org/echoes-of-electromagnetism-found-in-number-theory-20231012/?fbclid=IwAR3XJwaeIsRpzvSBYsG666rFnmliXMBQAuh9BwpRARL9UpvKFqLimTZvvBo

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72433
    • View Profile
Re: Physics & Mathematics
« Reply #82 on: October 18, 2023, 05:39:55 AM »
Though well over my head with nary a look back, glad to see you posting such things for they too are part of what this forum is about.

Body-by-Guinness

  • Power User
  • ***
  • Posts: 3244
    • View Profile
First Instance of AI Solving Unsolvable Math Problem
« Reply #83 on: December 17, 2023, 09:17:43 AM »
Expect reports like this to increase, though I wonder if mathematician’s ability to understand the proofs will keep pace:

https://www.technologyreview.com/2023/12/14/1085318/google-deepmind-large-language-model-solve-unsolvable-math-problem-cap-set/

Body-by-Guinness

  • Power User
  • ***
  • Posts: 3244
    • View Profile
Simultaneous Realities?
« Reply #84 on: January 25, 2024, 04:11:13 AM »
Physicists conduct an experiment confirming a photon can be in two states at the same instant, raining on objective reality’s parade:

https://digitimed.com/two-contradictory-versions-of-reality-exist-simultaneously-in-quantum-experiment/?fbclid=IwAR3DnB-rdVisDFZyFY9BfGGVkQev1aJkd-3gurBrgHeSMx2FhkdAbroD4Fc

Body-by-Guinness

  • Power User
  • ***
  • Posts: 3244
    • View Profile
Unifying Classic & Quantum Theories?
« Reply #85 on: January 25, 2024, 09:11:46 AM »
If this pans out it is a Very Big Deal, and indeed appears to have an intrinsic elegance I find intriguing:

https://charmingscience.com/breaking-new-theory-unites-einsteins-gravity-with-quantum-mechanics/

Body-by-Guinness

  • Power User
  • ***
  • Posts: 3244
    • View Profile
Small Scale Gravity Measurements First Step in Unified Theory?
« Reply #86 on: March 04, 2024, 04:59:33 PM »
My grandfather was a self-taught engineer for Allis-Chalmers back in the day and was forever tinkering and conducting various home brew experiments, one of them that wasn’t too far removed from the one mentioned below. In his case he didn’t have the kind of small scale measurement accuracy shown here—he tore up his garage floor, placed a tub of water in the center of it he could float a large cork on, had q finned piece of metal on the cork, and poured concrete in such a way that clear channel “spokes” hit the tub at an acute angel. He developed a method to rotate the copper fins as precise speeds with the acute channels in the concrete and then against them, measuring the difference

Here the difference measured is a 1,000,000,000,000,000,000 of a Newton, which I imagine the friction coefficient of the water grandpop floated his cork in beats a million or so times over. Though he didn’t have the tools to measure things so precisely, it made me grin to read this and recall helping him pour concrete in his garage. It this stuff pans out it could help unify classic and quantum theories among other possibilities:

Gravity Experiments on the Kitchen Table: Why a Tiny, Tiny Measurement May Be a Big Leap Forward for Physics
Singularity Hub / by Sam Baron / Mar 4, 2024 at 3:08 PM
Just over a week ago, European physicists announced they had measured the strength of gravity on the smallest scale ever.

In a clever tabletop experiment, researchers at Leiden University in the Netherlands, the University of Southampton in the UK, and the Institute for Photonics and Nanotechnologies in Italy measured a force of around 30 attonewtons on a particle with just under half a milligram of mass. An attonewton is a billionth of a billionth of a newton, the standard unit of force.

The researchers say the work could “unlock more secrets about the universe’s very fabric” and may be an important step toward the next big revolution in physics.

But why is that? It’s not just the result: it’s the method, and what it says about a path forward for a branch of science critics say may be trapped in a loop of rising costs and diminishing returns.

Gravity

From a physicist’s point of view, gravity is an extremely weak force. This might seem like an odd thing to say. It doesn’t feel weak when you’re trying to get out of bed in the morning!

Still, compared with the other forces that we know about—such as the electromagnetic force that is responsible for binding atoms together and for generating light, and the strong nuclear force that binds the cores of atoms—gravity exerts a relatively weak attraction between objects.

And on smaller scales, the effects of gravity get weaker and weaker.

It’s easy to see the effects of gravity for objects the size of a star or planet, but it is much harder to detect gravitational effects for small, light objects.

The Need to Test Gravity

Despite the difficulty, physicists really want to test gravity at small scales. This is because it could help resolve a century-old mystery in current physics.

Physics is dominated by two extremely successful theories.

The first is general relativity, which describes gravity and spacetime at large scales. The second is quantum mechanics, which is a theory of particles and fields—the basic building blocks of matter—at small scales.

These two theories are in some ways contradictory, and physicists don’t understand what happens in situations where both should apply. One goal of modern physics is to combine general relativity and quantum mechanics into a theory of “quantum gravity.”

One example of a situation where quantum gravity is needed is to fully understand black holes. These are predicted by general relativity—and we have observed huge ones in space—but tiny black holes may also arise at the quantum scale.

At present, however, we don’t know how to bring general relativity and quantum mechanics together to give an account of how gravity, and thus black holes, work in the quantum realm.

New Theories and New Data

A number of approaches to a potential theory of quantum gravity have been developed, including string theory, loop quantum gravity, and causal set theory.

However, these approaches are entirely theoretical. We currently don’t have any way to test them via experiments.

To empirically test these theories, we’d need a way to measure gravity at very small scales where quantum effects dominate.

Until recently, performing such tests was out of reach. It seemed we would need very large pieces of equipment: even bigger than the world’s largest particle accelerator, the Large Hadron Collider, which sends high-energy particles zooming around a 27-kilometer loop before smashing them together.

Tabletop Experiments

This is why the recent small-scale measurement of gravity is so important.

The experiment conducted jointly between the Netherlands and the UK is a “tabletop” experiment. It didn’t require massive machinery.

The experiment works by floating a particle in a magnetic field and then swinging a weight past it to see how it “wiggles” in response.

This is analogous to the way one planet “wiggles” when it swings past another.

By levitating the particle with magnets, it can be isolated from many of the influences that make detecting weak gravitational influences so hard.

The beauty of tabletop experiments like this is they don’t cost billions of dollars, which removes one of the main barriers to conducting small-scale gravity experiments, and potentially to making progress in physics. (The latest proposal for a bigger successor to the Large Hadron Collider would cost $17 billion.)

Work to Do

Tabletop experiments are very promising, but there is still work to do.

The recent experiment comes close to the quantum domain, but doesn’t quite get there. The masses and forces involved will need to be even smaller to find out how gravity acts at this scale.

We also need to be prepared for the possibility that it may not be possible to push tabletop experiments this far.

There may yet be some technological limitation that prevents us from conducting experiments of gravity at quantum scales, pushing us back toward building bigger colliders.

Back to the Theories

It’s also worth noting some of the theories of quantum gravity that might be tested using tabletop experiments are very radical.

Some theories, such as loop quantum gravity, suggest space and time may disappear at very small scales or high energies. If that’s right, it may not be possible to carry out experiments at these scales.

After all, experiments as we know them are the kinds of things that happen at a particular place, across a particular interval of time. If theories like this are correct, we may need to rethink the very nature of experimentation so we can make sense of it in situations where space and time are absent.

On the other hand, the very fact we can perform straightforward experiments involving gravity at small scales may suggest that space and time are present after all.

Which will prove true? The best way to find out is to keep going with tabletop experiments, and to push them as far as they can go.

https://singularityhub.com/2024/03/04/gravity-experiments-on-the-kitchen-table-why-a-tiny-tiny-measurement-may-be-a-big-leap-forward-for-physics/

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72433
    • View Profile
Re: Physics & Mathematics
« Reply #87 on: March 04, 2024, 05:08:09 PM »
Your Grandad sounds like quite the trip!

Body-by-Guinness

  • Power User
  • ***
  • Posts: 3244
    • View Profile
Re: Physics & Mathematics
« Reply #88 on: March 04, 2024, 05:43:29 PM »
Your Grandad sounds like quite the trip!
His basement was had just about one of everything a mad scientist might need, none of it was kid proof, and I snuck down there all the time. When I think of all the exposed amperage and such I could get into there I’m kinda surprised I made it out alive.

Body-by-Guinness

  • Power User
  • ***
  • Posts: 3244
    • View Profile
Understanding of Proton Structure Refined
« Reply #89 on: March 14, 2024, 06:25:47 PM »
Fascinating experiments provide a glimpse of proton structure and its constituent parts and forces:

https://www.quantamagazine.org/swirling-forces-crushing-pressures-measured-in-the-proton-20240314/

Body-by-Guinness

  • Power User
  • ***
  • Posts: 3244
    • View Profile
Invisibility Shield?
« Reply #90 on: March 28, 2024, 01:35:37 PM »
I’m at a loss on where to best post this and am indeed tempted to start a “Stuff BBG Don’t Know Where to Put” thread, but will call this thread as close as I can get:

https://gearjunkie.com/technology/invisibility-shield-2-kickstarter

Back in my misspent youth this puppy would have come in handy when dodging the local constabulary….

DougMacG

  • Power User
  • ***
  • Posts: 19477
    • View Profile
Re: Invisibility Shield?
« Reply #91 on: March 28, 2024, 07:00:30 PM »
Ok this is really cool.

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72433
    • View Profile
Re: Physics & Mathematics
« Reply #92 on: March 29, 2024, 05:48:02 AM »
This thread will do  :-D  This one is an option too:

https://firehydrantoffreedom.com/index.php?topic=1385.msg13240#msg13240

Body-by-Guinness

  • Power User
  • ***
  • Posts: 3244
    • View Profile
Quantum Compasses Catching Qubits?
« Reply #93 on: May 22, 2024, 08:34:32 PM »
Fascinating piece and interview with an author stalking dark matter:

https://www.quantamagazine.org/he-seeks-mystery-magnetic-fields-with-his-quantum-compass-20240517/

Body-by-Guinness

  • Power User
  • ***
  • Posts: 3244
    • View Profile
James Clerk Maxwell
« Reply #94 on: June 18, 2024, 07:43:34 AM »
Sounds like a fellow we owe a lot:

Today is the birth anniversary of James Clerk Maxwell.

James Clerk Maxwell (1831-1879)was one of the greatest scientists of the nineteenth century. He is best known for the formulation of the theory of electromagnetism and in making the connection between light and electromagnetic waves. He also made significant contributions in the areas of physics, mathematics, astronomy and engineering. He considered by many as the father of modern physics.

Maxwell was born in Edinburgh, Scotland in 1831. Even though most of his formal higher education took place in London, he was always drawn back to his family home in the hills of Scotland. As a young child, Maxwell was fascinated with geometry and mechanical models. When he was only 14 years old, he published his first scientific paper on the mathematics of oval curves and ellipses that he traced with pins and thread. Maxwell continued to publish papers on a variety of subjects. These included the mathematics of human perception of colors, the kinetic theory of gases, the dynamics of a spinning top, theories of soap bubbles, and many others.

Maxwell's early education took place at Edinburgh Academy and the University of Edinburgh. In 1850 he went on to study at the University of Cambridge and, upon graduation from Cambridge, Maxwell became a professor of natural philosophy at Marischal College in Aberdeen until 1860. He then moved to London to become a professor of natural philosophy and astronomy at King's College. In 1865, Maxwell's father died and he returned to the family home in Scotland to devote his time to research. In 1871 he accepted a position as the first professor of experimental physics at Cambridge where he set up the world famous Cavendish Laboratory in 1874.

While at Aberdeen, Maxwell was challenged by the subject of the Adams Prize of 1857: the motion of Saturn's rings. He had previously thought and theorized about the nature of the rings when he was only 16 years old. He decided to compete for the prize, and the next two years were taken up with developing a theory to explain the physical composition of the rings. He was finally able to demonstrate, by purely mathematical reasoning, that the stability of rings could only be achieved if they consisted of numerous small particles. His theory won him the prize and, more significantly, nearly a hundred years later, the Voyager 1 space probe proved his theory right.

Much of modern technology has been developed from the basic principles of electromagnetism formulated by Maxwell. The field of electronics, including the telephone, radio, television, and radar, stem from his discoveries and formulations. While Maxwell relied heavily on previous discoveries about electricity and magnetism, he also made a significant leap in unifying the theories of magnetism, electricity, and light. His revolutionary work lead to the development of quantum physics in the early 1900's and to Einstein's theory of relativity.

Maxwell began his work in electromagnetism by extending Michael Faraday's theories of electricity and magnetic lines of force. He then began to see the connections between the approaches of Faraday, Reimann and Gauss. As a result, he was able to derive one of the most elegant theories yet formulated. Using four equations, he described and quantified the relationships between electricity, magnetism and the propagation of electromagnetic waves. The equations are now known as Maxwell's Equations.

One of the first things that Maxwell did with the equations was to calculate the speed of an electromagnetic wave and found that the speed of an electromagnetic wave was almost identical to the speed of light. Based on this discovery, he was the first to propose that light was an electromagnetic wave. In 1862 Maxwell wrote:

"We can scarcely avoid the conclusion that light consists in the transverse undulations of the same medium which is the cause of electric and magnetic phenomena."

This was a remarkable achievement, for it not only unifies the theories of electricity and magnetism, but of optics as well. Electricity, magnetism and light can now be understood as aspects of a single phenomenon: electromagnetic waves.
Maxwell also described the thermodynamic properties of gas molecules using statistical mechanics. His improvements to the kinetic theory of gases included showing that temperature and heat are caused only by molecular movement. Though Maxwell did not originate the kinetic theory, he was the first to apply probability and statistics to describe temperature changes at the molecular level. His theory is still widely used by scientists as a model for rarefied gases and plasmas.

Maxwell also contributed to the development of color photography. His analysis of color perception led to his invention of the trichromatic process. By using red, green and blue filters he created the first color photograph. The trichromatic process is the basis modern color photography.

Maxwell's particular gift was in applying mathematical reasoning in solving complex theoretical problems. Maxwell's Electromagnetic Equations are perfect examples of how mathematics can be used to provide relatively simple and elegant explanations of the complex mysteries of the universe. Richard Feynman wrote of Maxwell:

"From a long view of the history of mankind, seen from, say, ten thousand years from now, there can be little doubt that the most significant event of the nineteenth century will be judged as Maxwell's discovery of the laws of electrodynamics."

Maxwell continued his work at the Cavendish Laboratory until illness forced him to resign in 1879. He returned to Scotland and died soon afterwards. He was buried with little ceremony in a small churchyard in the village of Parton in Scotland.

Source:FSU
« Last Edit: June 18, 2024, 11:53:30 AM by Body-by-Guinness »

DougMacG

  • Power User
  • ***
  • Posts: 19477
    • View Profile
Re: James Clerk Maxwell
« Reply #95 on: June 18, 2024, 10:47:15 AM »
Yes. Wow! Rock star of modern science.

Wish we had more like him today.

Body-by-Guinness

  • Power User
  • ***
  • Posts: 3244
    • View Profile
Swimmers Using Olympic Level Math
« Reply #96 on: July 10, 2024, 09:34:35 PM »
A very interesting synthesis of math and athletic performance discussed here. It would be interesting to see these tools applied to martial arts:

https://www.quantamagazine.org/how-americas-fastest-swimmers-use-math-to-win-gold-20240710/

ccp

  • Power User
  • ***
  • Posts: 19804
    • View Profile
Re: Physics & Mathematics
« Reply #97 on: July 11, 2024, 06:09:30 AM »
fascinating.
this is great

using math physics biometrics to get the human athlete to perform at maximum efficiency.

more honest and not cheating like steroids in my view.

the only sport this would not be useful for might be chess or poker.

might even have use in internet games by studying head, eye and hand motions

Crafty_Dog

  • Administrator
  • Power User
  • *****
  • Posts: 72433
    • View Profile
Re: Physics & Mathematics
« Reply #98 on: July 11, 2024, 08:03:08 AM »
I will give this a careful read.

Body-by-Guinness

  • Power User
  • ***
  • Posts: 3244
    • View Profile
Cryptography and Secrets
« Reply #99 on: August 02, 2024, 03:02:07 AM »
Tempted to start a cryptography thread off this piece. Don’t know that it would attract a lot of posts, but the ones it did would likely be fascinating:

Can you keep a secret? Modern techniques for maintaining the confidentiality of information are based on mathematical problems that are inherently too difficult for anyone to solve without the right hints. Yet what does that mean when quantum computers capable of solving many problems astronomically faster are on the horizon? In this episode, host Janna Levin talks with computer scientist Boaz Barak about the cryptographic techniques that keep information confidential, and why “security through mathematics” beats “security through obscurity.”


[Theme plays]

JANNA LEVIN: We all have secrets we want to obscure, from childhood notes between friends, to Da Vinci’s notebooks, to the wartime messages famously cracked by Alan Turing and a cohort of English cryptographers. To share secrets with a friend, an ally, a co-conspirator, there is cryptography. There are codes and ciphers, ingenious means to safeguard information against prying eyes. But in lockstep, there are codebreakers and equally ingenious means to decipher the hidden information.

Cryptography has become crucial to modern life and commerce to protect our emails, our banks, and our national security. While developing more and more secure encryptions, researchers have recently made some unexpected discoveries that reveal deeper truths about the theoretical limits of secrecy itself.

I’m Janna Levin and this is “The Joy of Why,” a podcast from Quanta Magazine where I take turns at the mic with my cohost, Steve Strogatz, exploring the biggest questions in math and science today.

In this episode, theoretical computer scientist Boaz Barak demystifies cryptography as we ask: Is it possible to perfectly protect secrets?

[Theme fades out]

Boaz is the Gordon McKay professor of computer science at Harvard University. He’s also a member of the scientific advisory board for Quanta Magazine and the Simons Institute for the Theory of Computing. His research centers on cryptography, computational complexity, quantum computing and the foundations of machine learning.

Boaz, welcome to the show.


Boaz Barak
BOAZ BARAK: Thank you. Thank you very much.

LEVIN: So glad to have you. This is quite a challenging subject, and to open, I kind of want to do the opposite of encrypting this conversation. We’re here to share ideas. And so let’s start by opening the dictionary of terms here. What is cryptography? What are ciphers?

BARAK: So, cryptography’s meaning has really evolved over the years. I think in the early days, since humans began writing, they had this notion of secret writing, some ways to obscure their secrets. And cryptography was kind of synonymous with that, with basically encryption.

But then, more recently, since the 1970s, cryptography has really expanded and evolved, and it’s no longer just encryption, it’s also authentication — like digital signatures and even more, fancier things like zero-knowledge proofs, multiparty secure computation, and many other ways to basically protect not just communication but also computation.

LEVIN: So it’s as though we figured out how to write language, and then we decide sometimes we don’t want to share our inner thoughts, and so we write secretly. And that must go back quite a long way. So what are some of the earliest encryption and decryption techniques?

BARAK: So a famous example in encryption is Caesar’s cipher, which is attributed to Julius Caesar — I believe it has predated him — which is a very, very simple system of obscuring data or messages, where the idea is just you shift letters of the alphabet. So, for example, the letter A maps to, say, the letter F, the letter B maps to G, the letter C maps to H, et cetera. And this is a very simplistic approach, which is not that hard to break.

Generally, the Caesar cipher is a special case of what’s known as a substitution cipher, where you have some kind of a table mapping the letters of your message that you’re trying to encrypt. That is what we typically call the plaintext into the encrypted form, which we call the ciphertext.

And these types of substitution ciphers have been very common. One of the famous examples was used by Mary, the Queen of Scots, when she was planning a coup against her cousin, Elizabeth. And substitution ciphers are not very secure. You can typically break them. By just looking at the frequency of how many symbols appear in the cypher text, for example, you can figure out that the most frequent symbol is probably the encoding of E because that’s the most frequent letter in the English alphabet.

LEVIN: I was going to guess E.

BARAK: Yes. And using that, Queen Elizabeth’s spies managed to crack Mary’s cipher, and it didn’t end up well for Mary, who was executed.

And that has actually been kind of a typical story with encryption throughout the years, where someone comes up with an encryption scheme, they believe it is unbreakable, they use it for life-and-death applications. And it turns out that it is breakable. And typically when you use something for life-and-death applications and it doesn’t work, it doesn’t bode well for you.

LEVIN: Yeah. Dire consequences.  To speak to that point, the 20th century really was a critical point in cryptography. I mean, there were two world wars where encryption and decryption played a really major role. And at the same time, maybe as a result, the field of cryptography began to become a very serious and important subject, both for intellectual and scientific reasons, but also for survival — for the fate of the world, right?

And we mentioned one of the central figures, like Alan Turing, and his role famously in cracking the German Enigma cipher. What else was really shifting in the significance of cryptography in the 20th century?

BARAK: So, from a cryptography point of view, I think, yes, the Enigma cipher, which was believed to be unbreakable by the Germans, partly because if you were trying to figure out how many combinations were for the secret key of the Enigma, which involved setting wires of several rotors …

LEVIN: It was kind of like a typewriter, almost.

BARAK: Yes, it looked exactly like a typewriter. When I teach at Harvard, I always have to bring up a photo of a typewriter because now these days students don’t know what the typewriter looks like.

But it looked like a typewriter. But when you hit a key, then something else would come out. So you hit the letter A, maybe a letter Z would come out. And it wasn’t a simple substitution cipher in the sense that, say, if you hit the letter A again, then another letter would come out. So the state of the system would be constantly evolving, which made it much harder to break.

And the secret key was actually the setting of the wires of the rotors inside this typewriter. So there were like several rotors, which were wired in a certain way. And the number of possibilities for the secret key was absolutely enormous, was something like 10100, which even with today’s computers, if we were trying to break the Enigma by brute force, by simply trying out all possibilities, the sun would die out and collapse before we were done.

And let alone the computing devices that they had in the 1940s. So it took a lot of mathematical ingenuity that was done by Alan Turing, many other people at Bletchley Park, and even before that, uh, some insights were done by the Polish intelligence services before that, to actually break the Enigma.

And one of the lessons that cryptography took from that is that trying to build security by having a very complicated system like the Enigma is actually not going to succeed. Cryptography transitioned into relying in some sense on simpler systems, but with a more sound mathematical analysis. And a key figure in bringing about the mathematical analysis of cryptography was Claude Shannon, who in the late 1940s wrote some influential papers, starting with a mathematical theory of encryption.

And then in the 1970s, people like [Whitfield] Diffie, [Martin] Hellman and [Ralph] Merkel — these are three separate people — started with the mathematical theory of public key cryptography, which was then built up. And really in the late ’70s and early ’80s we started to have a mathematical theory of cryptography that, rather than being based on obscure problems, like the Enigma, was actually based on very simple problems, like say the problem of finding the prime factors of large integers, that have been around for thousands of years, but which, despite this history, we still don’t know an efficient algorithm for.

LEVIN: Now, it’s interesting that Alan Turing comes up not only in these world changing crises over cracking codes, but also he is well known as the inventor of the modern concept of computation at all. You know, Turing thought about mechanizing thought, and it led him to the notion of a computer that wasn’t a human, which is how the term “computer” had originally been used. Computers were people who computed, and Alan Turing changed that to the idea of a machine that could compute. So you’re talking about these wonderful, theoretical changes. How did cryptography change with the advent of actual machines that we now call computers?

BARAK: So, indeed, I think some of the earliest mechanical computers were built in Bletchley Park exactly for the task of automating some of the analysis in breaking the Enigma and other ciphers. And Alan Turing had a broader vision than that. So specific computing devices have always been around to mechanize computation to some extent.

But Alan Turing had this broader vision of a general-purpose computer. I should say that Charles Babbage had this same vision maybe 70 years earlier, but he had never gotten around to actually building the device.

And Turing had this idea that you could actually build this device that would be general purpose. In some sense, there is a notion of a universal computer, or as we call it today, a universal Turing machine, that is the same piece of hardware that can run arbitrary functionality by basically being supplied with software.

LEVIN: It is quite an amazing evolution. So now here we are, and cryptography plays a part in nearly everything we do — whether we’re fully aware of it or not. I mean, we use encryption to hide private messages, of course, but also to secure information, to compact it and secure it. It shows up in telecommunications, medical records, how photos are stored on our phones. So tell us a little bit about how cryptography is integrated into all of our everyday lives.

BARAK: Yeah. So people don’t realize, for example, the conversations such as the one that you and I are having, and millions of people are having, using Zoom or other telecommunication framework, they often use wireless connections, which basically means that the signals that we are transmitting are going through the air and anyone can pick them up. The reason our conversations are still secure is because they are encrypted.

Now, also, all of us basically carry around a device that both stores all of our private information and has a microphone and a camera that can record, potentially, all of our communication.

And, moreover, this device is a fully programmable computer. All our smartphones are fully programmable computers. And they can get over-the-air updates to completely change their functionality. The reason that, say, some hackers don’t send us over-the-air updates that can convert our smartphones into listening, recording and then surveillance devices is because we use cryptography, and specifically digital signatures so that the device — even if it gets some piece of software update — can verify using digital signatures that the software update actually came from the manufacturer.

LEVIN: So fascinating that all of this is really part of our absolutely ordinary, everyday lives, not just life or death stuff. We’re going to take a little break and be right back after this message.

[Break insertion for ads]

LEVIN: Welcome back to “The Joy of Why.” We’re speaking with Boaz Barak about the art and science of cryptography.

Now, you’ve mentioned some of the ways where today we’re trying to protect information — and why we’re trying to protect information. So, what still makes us vulnerable? I mean, we have these algorithms, we have data that we can encrypt, we have all kinds of rules about passwords and user privacy. But what makes a system vulnerable? And how do they typically break?

BARAK: So that’s a great question. So there are generally two ways in which systems can be broken. So first of all, while we have these great encryption schemes, we actually don’t have a mathematical proof that they are secure. And proving that they are secure is actually related to some of the greatest open questions in computer science and science at large, and specifically the P-versus-NP question.

LEVIN: Can you remind us what P and NP mean?

BARAK: Yes. So the P means polynomial time and NP means non-deterministic polynomial time.

So the P refers to the class of problems that can be solved efficiently by a computing device, whether that computing device is our standard digital computer or any other computing device. And NP refers to the class that can be verified by computing device. So the P-versus-NP question really asks whether every problem whose solution can be efficiently verified can actually be also efficiently found.

Now, intuitively, we think that P should be different than NP, that there are some problems where it’s much easier to verify a solution once someone gave it to you than to find it yourself from scratch. But we actually don’t have a mathematical proof that this is the case, even though it is widely conjectured.

And one example of a problem that is of this type is if someone gave you the secret key that could decrypt all of the communication between two parties, then you could easily verify that the secret key actually works. But finding out the secret key can take time, which, as I said, could potentially be longer than the time that it would take for the sun to die out.

So if P equals NP, then in some sense we could break every possible encryption scheme. But it is widely conjectured that it is not. So we don’t have a proof that the encryption schemes that we use are unbreakable. And once in a while, people do manage to break the underlying cryptography. Although at least the main cryptosystems that we are using basically have been unbroken since the 1970s.

But it’s far more common to go around the cryptography. And that’s how hackers actually break into our systems. So one metaphor that I like to use is that cryptography, when properly implemented, is basically like a hundred-ton steel door, but the systems where we use it are basically like a wooden shack. So if you’re installing like a hundred-ton steel door on a wooden shack, then yes, a thief would not be able to break the door, but they might find a different way around it.

And the sheer complexity of modern systems means that it’s really hard to secure all sides of them. So hackers typically don’t break the cryptography, at least when it’s properly implemented, but go around the cryptography.

LEVIN: Fascinating, because a lot of this also dates back to those very deep concepts in mathematics about what’s provable and unprovable. And in a way, this is kind of the computing manifestation of that. That’s a whole other episode. Very deep stuff.

So before the 1970s, most cryptography was symmetric in the sense that the same key would be used to encrypt and decrypt a message. Is that what you’re referring to, that since the 1970s, cryptography is asymmetric, where there’s some key used for encryption and a private key used for decryption?

BARAK: Yes. So this was one of the major changes that happens in the 1970s. So before the 1970s, indeed, cryptography was basically what we call private key cryptography, where the sender and receiver share a secret key that they use for communication.

And this kind of worked okay for the military applications of cryptography, where you have a spy, and maybe before you send them off to a mission you give them a code book that they would use to communicate with the home base. But it doesn’t really work with the modern economic applications of cryptography.

So I don’t know about you, but, you know, I’m a Gmail user and I rely on encrypted communication between me and the Google servers to look at my email securely. But I’ve never actually paid a visit to Google headquarters to exchange with them a private key. And if every user of Google had to physically exchange a key with the Google service, the modern internet would not exist.

So in public key cryptography, two parties can communicate over an unsecured channel and exchange confidential information by basically having one party, let’s say the receiver, send their public key to the sender. And then the sender can use that public key to encrypt their message, send it over the unsecured channel. And the receiver can use their secret key to decrypt it.

Point being that, yes, people could be listening on this channel and they could all learn the public key — but the public key can only be used for encryption. It cannot be used for decryption.

LEVIN: It does make me wonder, though — all of that’s quite amazing. That’s such tremendous progress. We exchanged Gmails today and I feel pretty confident nobody read our Gmails, not least because they weren’t that interesting, right? “I’ll see you there then,” you know, “I’m running late,” whatever. But are there theoretical limits to cryptography? And can things truly be unconditionally secure?

BARAK: So there are two answers to this question.

First of all, yes, it is known that public key cryptography can never be unconditionally secure in the sense that it could always be broken by basically trying all possible keys. But trying all possible keys is an effort that scales exponentially with the key size. So, at very moderate key sizes, that already requires, say, spending more cycles than there are atoms in the observable universe, or similarly astronomical quantities, which you are probably more familiar than me. So that’s not really a barrier.

So, theoretically, we could have a mathematical theorem that tells us that this cryptosystem cannot be broken by any attacker that would spend less than, say, a number of operations that scales like 2n, where n is the length of the key.

We don’t have a theorem like that. And the reason is that such a theorem would in particular also imply that P is different from NP, which is a major unsolved problem that we haven’t been able to solve. So at the moment, we have to settle for conditional proofs of security that are conditional based on certain conjectures.

LEVIN: Now, there’s also twists on this whole idea. Sometimes I don’t want to completely obscure everything that’s going on. Sometimes I want to let you know I know something. But I don’t necessarily want to reveal all, right? I believe these are known as zero-knowledge proofs. Can you expand on that? Explain to me why sometimes I want you to know I know, I want to prove to you that I know. I don’t want you to just take my word for it without revealing the information I’m protecting.

BARAK: Sure. Actually, let me give you an example in the context of nuclear disarmament. You know, you have these, say Russia and the U.S., both have a huge stockpile of nuclear warheads, far more than necessary to destroy, you know, major parts of the world several times over. It’s very expensive. It’s actually in both countries’ interest to reduce this stockpile — and it’s also in the interest, obviously, of world safety, because the less warheads out there, the less likely that we would have like a completely devastating nuclear war.

But part of the problem is that this is an equilibrium, and it’s hard to agree on reducing the stockpiles. Another part is, how do you verify that the other side really did, say, destroy the warheads? One solution to that is simple. You know, say, for example, the Russians declare we are going to destroy these hundred warheads.

They invite American inspectors to come to the warehouse where the warheads are stored and take a look at them, examine them, and then they go into whatever machine that destroys all of these things. That is great — except that the design of a nuclear warhead is one of the most classified secrets that the country has. And the Russians have no intention of letting American inspectors anywhere near opening up the warhead and examining it.

So then it becomes a question of, say, I have a barrel. Can I prove to you that there is a nuclear warhead inside the barrel without giving you any details of the exact design of this warhead?

And this is the type of question that zero-knowledge proofs are designed to address. So, you want to, say, prove that something satisfies a certain predicate. So, for example, this barrel contains a nuclear warhead, or maybe this number is a composite number, or it’s a composite number where one of the moduli has the last digit of 7.

So, you have a certain object, and you want to prove that it satisfies a certain predicate without giving away the information such as the design of the warhead or the factorization of the number that really proves why the object satisfies this predicate.

LEVIN: Fascinating example, and unfortunately timely. Does this relate to the concept of “obfuscation” that I’ve been reading about?

BARAK: So obfuscation is kind of a vast generalization of a lot of things, including zero-knowledge proofs and others. Basically, the idea is, could you take, say, a computer program and transform it into a way that it will become like a virtual black box, in a sense that you will be able to run it, but you will not be able to examine its internals.

So you could have, say, some computer program that potentially takes as input some of the secret information, but only produces like a 0 or 1 bit — is the secret information satisfies a certain predicate or not? So obfuscation can be used to achieve zero-knowledge proofs. It can be used to achieve a lot of other cryptographic primitives.

And one of them, for example, is the idea of secure multiparty computation, where the idea is, maybe, for example, you have a certain private input. I have a certain private input. Maybe, you know, you are a hospital and you have your own patient records; I am another hospital, we have our own patient records. For reasons of patient confidentiality, we cannot share with each other the patient records. But could we run some computation that at the end of it, we will learn some statistical information about both of the records without revealing any of the secret information? And this falls under secure multiparty computation.

LEVIN: Now, in particular, I’ve read the phrase “indistinguishability obfuscation.” Doesn’t exactly roll off the tongue, but I believe I’ve heard you refer to it as, you know, “the one cryptographic primitive to rule them all.”

BARAK: Yes. So obfuscation in some sense, if you could have it generically, you could basically do anything you want in cryptography. And unfortunately, in 2001, I and some colleagues proved that the most natural notion of obfuscation — virtual black-box obfuscation, which is kind of a mathematical translation of what I said before, that you take a program and you compile it in such a way that it is virtually a black box — so we proved that that is impossible to achieve.

But then we said, there are weaker notions of obfuscation, in particular this notion of indistinguishability obfuscation, which our impossibility proof didn’t apply to. But we had no idea whether that notion of indistinguishability obfuscation is possible to achieve and, if so, whether it would actually be useful for all of the applications.

So then in 2013, there was a breakthrough showing that, yes, indistinguishability obfuscation can be constructed and, in fact, that it can be useful for many applications. And since then there’s been a steady stream of works showing more and more applications of indistinguishability obfuscation, and also works trying to make it not just theoretically possible, but also practically feasible.

The latter is still very much a work in progress. So right now, the overhead is such that we cannot use it. But the theoretical feasibility shows that perhaps in the future, we will be able to improve the efficiency and make it usable.

LEVIN: Now, there’s this beautiful thing on the horizon that keeps looming and receives a lot of discussion. And that’s quantum computers, of which we have no examples yet. But how would these methods fare in a quantum world against quantum technologies?

BARAK: So this is a fascinating question, and actually a very timely one at the time we are recording this interview. So, first of all, quantum computers are still computers. They can be mathematically modeled, and while they appear to give exponential speedups for some very structured computational problems, they are not a magic bullet that can speed up any computation whatsoever. In particular, essentially all of the secret key encryptions that we currently use will remain secure also against quantum computers.

However, maybe the most important and famous problem for which quantum computers can offer an exponential speedup is the integer factoring problem, which lies at the heart of the RSA encryption scheme.

That means that if scalable quantum computers are built, then all the public encryption schemes that are based on these number theoretic objects — such as RSA system, based on integer factoring, Diffie-Hellman, based on the discrete logarithm, and its variant based on elliptic curves — will all be broken.

Unfortunately, it’s very hard to construct a public key encryption, so we don’t have many candidates. This is one major family of candidates, and there is one other major family of candidates for public key encryptions, which is based on problems relating to lattices. So we do have these problems-based lattices that are not known to be broken by quantum computers. So these form the basis for what is sometimes known as post-quantum cryptography, at least in the public encryption setting.

LEVIN: Now, you’ve already mentioned a number of major other techniques used in cryptography, and we don’t really have a chance to pick apart each of these. What does the lattice mean, or the integer approach? But I think we get the impression. They’re rooted deeply in fundamental mathematics, I think, is an important point, which maybe not everyone realizes. And that the tools are somehow kind of fundamental in some way also to how nature encodes math and how math encodes information in a deep way. And that a lot of these complex techniques go back to fundamental mathematics and keep relying on that sort of core discipline to progress.

BARAK: Absolutely. And one of the things I tell students when I lecture on cryptography is that we have moved from a “security through obscurity” to “security through mathematics.”

And it turns out that security through mathematics is much more reliable. So, even though, today, attackers have access to much higher amounts of computational resources that far dwarf the resources that people had in Bletchley Park, we still have cryptographic schemes that nobody has been able to break, and as I said, therefore attackers always go around the cryptography.

And the reason is that rather than trying to build very complicated esoteric systems like the Enigma, we are relying on simpler principles, but applied for mathematical understanding. And that is how we are getting more reliably secure.

LEVIN: Yeah, that’s a big change. So I guess it’s natural for me to ask here — maybe you’ve already implicitly answered that in prompting this question — but where is cryptography headed next?

Barak: So there are maybe four different research strands in cryptography. One is expanding the reach of cryptography. So going beyond, say, secret writing to public key encryption, and then to even fancier things like zero-knowledge proofs, multiparty secure computation, obfuscation.

The second is bringing things from theory to practice. So taking some theoretical constructions that initially are far too much overhead to be used in practice and improving it.

The third is sharpening our understanding of the cryptographic schemes that we currently have by attempting to break them. So cryptoanalysis and attempting to break cryptographic schemes is also important area of research.

And the fourth is really understanding the basic assumptions that we are using in cryptography. Things like integer factoring, lattice-based assumptions, and maybe we can find new assumptions. And trying to understand their validity and whether we can provide rigorous evidence for their correctness, or show that they are incorrect.

LEVIN: It’s a field that’s taken many turns, from the kind of natural instinctive urge to have secret notes to the depths of mathematics to computing to quantum computing. It’s really a fascinating subject. And, at this point, we have a question we like to ask, which is, what about this research brings you joy?

BARAK: When I started as a graduate student in the Weizmann Institute of Science, I didn’t actually intend to study cryptography. I didn’t know much about cryptography, and I thought it was a very technical field just having to do with number theory, which is nice, but not something that I was passionate about.

The thing that kind of blew my mind was when I took a cryptography class with Oded Goldreich, who became my advisor, and I realized that you could actually mathematically define what it means to be secure. And I kind of just found it fascinating that this intuitive notion that I thought that had had no bearing with formal mathematics can actually be captured by mathematics, and then we can actually prove things about it.

And this is the thing that I still find so fascinating about cryptography that it brings math into places where we didn’t really think it would hold.

LEVIN: And it reminds me of these very deep ideas of a hundred years ago that we can prove that there are unknowable facts about math.

BARAK: Yes, some of the techniques are actually sometimes similar.

Maybe another reason why I find, kind of, cryptography fascinating is that I think as human beings and as scientists, we have a long history of being fascinated by impossibility results. So there was, you know, the impossibility of deriving the parallel postulate from the other axioms of geometry, impossibility of trisecting an angle with just a compass and a straight edge, and of course, Gödel’s theorems of impossibilities of proving all true facts about mathematics.

But cryptography is about the practical application of impossibility, which I kind of find really fascinating, that we take what we think of as fundamentally negative results that are just for intellectual curiosity and would have no practical implication whatsoever, and we turn them into something that we actually apply and are using every day to do commerce over the internet.

LEVIN: So compelling. Thank you so much. We’ve been speaking with computer scientist Boaz Barak about cryptography in the modern era. Boaz, thank you for joining us on “The Joy of Why.”

BARAK: Thank you very much.

[Theme plays]

LEVIN: Thanks for listening. If you’re enjoying “The Joy of Why” and you’re not already subscribed, hit the subscribe or follow button where you’re listening. You can also leave a review for the show — it helps people find this podcast.

“The Joy of Why” is a podcast from Quanta Magazine, an editorially independent publication supported by the Simons Foundation. Funding decisions by the Simons Foundation have no influence on the selection of topics, guests or other editorial decisions in this podcast or in Quanta Magazine.

RELATED:
Complexity Theory’s 50-Year Journey to the Limits of Knowledge
Cryptographers Discover a New Foundation for Quantum Secrecy
Mathematicians Seal Back Door to Breaking RSA Encryption
How Claude Shannon Invented the Future
“The Joy of Why” is produced by PRX Productions. The production team is Caitlin Faulds, Livia Brock, Genevieve Sponsler and Merritt Jacob. The executive producer of PRX Productions is Jocelyn Gonzales. Morgan Church and Edwin Ochoa provided additional assistance.

From Quanta Magazine, John Rennie and Thomas Lin provided editorial guidance, with support from Matt Carlstrom, Samuel Velasco, Arleen Santana and Meghan Willcoxon.

Samir Patel is Quanta’s Editor in Chief.

Our theme music is from APM Music. Julian Lin came up with the podcast name. The episode art is by Peter Greenwood and our logo is by Jaki King and Kristina Armitage. Special thanks to the Columbia Journalism School and Bert Odom-Reed at the Cornell Broadcast Studios.

I’m your host, Janna Levin. If you have any questions or comments for us, please email us at quanta@simonsfoundation.org. Thanks for listening.

[Theme

https://www.quantamagazine.org/how-does-math-keep-secrets-20240801/