How Mathematical Curves Power Cryptography | Quanta Magazine

To avoid errors, you once again add extra information. Here, you send the y-value that corresponds to another predetermined x-coordinate. If the three points do not fall on the same line, there’s an error. And to figure out where the error is, you just send one more value — meaning you’ve sent four numbers total, rather than the six required by the previous method.

The advantage grows with the size of the message. Let’s say you want to send a longer message — 1,000 numbers. The less efficient code would require sending 2,000 numbers to identify an error, and 3,000 to correct it. But if you use the code that involves interpolating a polynomial through given points, you only need 1,001 numbers to find the error, and 1,002 to correct it. (You can add more points to identify and correct more potential errors.) As the length of your message increases, the difference in efficiency between the two codes grows starker.

The more efficient code is called a Reed-Solomon code. Since its introduction in 1960, mathematicians have made further breakthroughs, developing algorithms that can correct more errors with greater efficiency. “It’s very elegant, clean, concrete,” said Swastik Kopparty, a mathematician and computer scientist at the University of Toronto. “It can be taught to a second-year undergraduate in half an hour.”

Reed-Solomon codes have been particularly useful for storing and transmitting information electronically. But the same concept has also been essential in cryptography and distributed computing.

Take secret sharing: Let’s say you want to distribute a secret among several parties such that no one person can access the entire secret, but together they can. (Imagine an encryption key, for instance, or a missile launch code.) You encode the numbers in a polynomial, evaluate that polynomial at a predetermined set of points, and distribute each of the results to a different person.

Most recently, Reed-Solomon codes have been employed in areas like cloud computing and blockchain technology. Say you need to run a computation that’s too complicated for your laptop, so you have a large computational cluster run it — but now you need to verify that the computation you get back is correct. Reed-Solomon codes let you ask for additional information that the cluster likely won’t be able to produce if it hasn’t done the computation correctly. “This works magically,” said Jade Nardi, a research fellow at the Mathematics Institute of Rennes in France. “This process is really wonderful, and the way it relies on [these codes] blows my mind.”

But Reed-Solomon codes also have an important constraint. They’re constructed in such a way that you can only evaluate your polynomial at a fixed (and usually relatively small) set of values. That is, you’re limited to using a certain set of numbers to encode your message. The size of that set, or alphabet, in turn restricts the length of the messages you can send — and the bigger you try to make your alphabet, the more computational power you’ll need to decode those messages.

And so mathematicians sought an even more optimal code.

Future Codes

A more general, more powerful code would allow you to store or send longer messages without needing to increase the size of your alphabet. To do this, mathematicians devised codes that involve interpolating a function — which lives in a special space associated to a more complicated curve — through given points on that curve. These so-called algebraic geometry codes “came out of nowhere, and they’re better than any other code we know how to make [with a smaller alphabet],” Kopparty said. “This beats everything. It was a real shock.”

There’s just one problem. In practice, implementing a Reed-Solomon code is much, much easier than implementing an algebraic geometry code. “This is state-of-the-art, but it’s still under investigation to really turn into something practical,” said the cryptologist Simon Abelard. “It involves quite abstract mathematics, and it’s hard to handle these codes on a computer.”

For now, that’s not worrisome: In real-world applications, Reed-Solomon codes and related forms of error correction are sufficient. But that might not always be the case. For instance, if powerful quantum computers become available in the future, they’ll be able to break today’s cryptography protocols. As a result, researchers have been searching for schemes that can resist quantum attacks. One top contender for such schemes would require something stronger than Reed-Solomon codes. Certain versions of algebraic geometry codes might just work. Other researchers are hopeful about the role algebraic geometry codes might play in cloud computing.

But even in the absence of such potential uses, “in the history of mathematics, sometimes you discover new things that really don’t have applications nowadays,” said Elena Berardini, a researcher at Eindhoven University of Technology in the Netherlands who works on algebraic geometry codes. “But then after 50 years, you find that it might be useful for something completely unexpected” — just like the ancient problem of interpolation itself.

rn // Define dataLayer and the gtag function.rn window.dataLayer = window.dataLayer || [];rn function gtag()dataLayer.push(arguments);rnrn // Default ad_storage to ‘denied’.rn gtag(‘consent’, ‘default’, rn ‘ad_storage’: ‘denied’rn );rnu003c/script>rnu003c!– Google Tag Manager –>rnu003cscript>(function(w,d,s,l,i),”$ROOT_QUERY.options”:”acf”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf”,”typename”:”ThemeOptions”,”__typename”:”Options”,”$ROOT_QUERY.getPostPageArchive(“slug”:”how-mathematical-curves-power-cryptography-20220919″,”type”:””).data.0.acf”:”custom_page_colors”:””,”page_accent_color”:null,”page_text_color”:null,”page_background_color”:null,”header_type”:”default”,”header_gradient_color”:null,”header_gradient_opacity”:null,”header_solid_colors”:””,”header_solid_primary_color”:null,”header_solid_secondary_color”:null,”header_solid_hover_color”:null,”header_transparent_colors”:null,”header_transparent_primary_color”:null,”header_transparent_secondary_color”:null,”header_transparent_hover_color”:null,”__typename”:”ACFFields”,”$ROOT_QUERY.getPostPageArchive(“slug”:”how-mathematical-curves-power-cryptography-20220919″,”type”:””).data.0″:”acf”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.getPostPageArchive(“slug”:”how-mathematical-curves-power-cryptography-20220919″,”type”:””).data.0.acf”,”typename”:”ACFFields”,”__typename”:”Post”,”$ROOT_QUERY.getPostPageArchive(“slug”:”how-mathematical-curves-power-cryptography-20220919″,”type”:””)”:”data”:[“type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.getPostPageArchive(“slug”:”how-mathematical-curves-power-cryptography-20220919″,”type”:””).data.0″,”typename”:”Post”],”__typename”:”PostPageArchive”,”$ROOT_QUERY.getPageMeta(“slug”:”how-mathematical-curves-power-cryptography-20220919″,”type”:””)”:”redirect_path”:null,”meta”:”u003cmeta name=”description” content=”A simple geometric idea has been used to power advances in information theory, cryptography and even blockchain technology.” />nu003cmeta property=”og:image” content=” />nu003cmeta property=”og:image:width” content=”1200″ />nu003cmeta property=”og:image:height” content=”630″ />nu003cmeta property=”og:image:alt” content=”A spacecraft, laptop, QR code and CD” />nu003cmeta property=”og:locale” content=”en_US” />nu003cmeta property=”og:type” content=”article” />nu003cmeta property=”og:title” content=”How Mathematical Curves Power Cryptography ,”$ROOT_QUERY.options.acf.social_media_links.0″:”type”:”facebook”,”label”:”Facebook”,”url”:” Joy of Why”,”slug”:”the-joy-of-why”,”description”:”The mathematician and author Steven Strogatz interviews leading researchers about the great scientific and mathematical questions of our time.”,”featured_image”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.channels.0.featured_image”,”typename”:”Image”,”square_image”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.channels.0.square_image”,”typename”:”Image”,”subscribe_itunes_link”:” Science Podcast”,”slug”:”podcast”,”description”:”Susan Valot narrates in-depth news episodes based on u003ci>Quanta Magazineu003c/i>’s articles about mathematics, physics, biology and computer science. “,”featured_image”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.channels.1.featured_image”,”typename”:”Image”,”square_image”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.channels.1.square_image”,”typename”:”Image”,”subscribe_itunes_link”:” Joy of x”,”slug”:”the-joy-of-x”,”description”:”The acclaimed mathematician and author Steven Strogatz interviews some of the world’s leading scientists about their lives and work.”,”featured_image”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.channels.2.featured_image”,”typename”:”Image”,”square_image”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.channels.2.square_image”,”typename”:”Image”,”subscribe_itunes_link”:” holes”,”label”:”Black Holes”,”__typename”:”PopularSearch”,”$ROOT_QUERY.options.acf.popular_searches.3″:”term”:”evolution”,”label”:”Evolution”,”__typename”:”PopularSearch”,”$ROOT_QUERY.options.acf.search_topics.0″:”type”:”Tag”,”label”:”Podcasts”,”tag”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.search_topics.0.tag”,”typename”:”Term”,”category”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.search_topics.0.category”,”typename”:”Term”,”__typename”:”SearchTopic”,”$ROOT_QUERY.options.acf.search_topics.0.tag”:”name”:”podcast”,”slug”:”podcast”,”term_id”:”552″,”__typename”:”Term”,”$ROOT_QUERY.options.acf.search_topics.0.category”:”name”:null,”slug”:null,”term_id”:null,”__typename”:”Term”,”$ROOT_QUERY.options.acf.search_topics.1″:”type”:”Tag”,”label”:”Columns”,”tag”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.search_topics.1.tag”,”typename”:”Term”,”category”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.search_topics.1.category”,”typename”:”Term”,”__typename”:”SearchTopic”,”$ROOT_QUERY.options.acf.search_topics.1.tag”:”name”:”Quantized Columns”,”slug”:”quantized”,”term_id”:”551″,”__typename”:”Term”,”$ROOT_QUERY.options.acf.search_topics.1.category”:”name”:null,”slug”:null,”term_id”:null,”__typename”:”Term”,”$ROOT_QUERY.options.acf.search_topics.2″:”type”:”Series”,”label”:”Series”,”tag”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.search_topics.2.tag”,”typename”:”Term”,”category”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.search_topics.2.category”,”typename”:”Term”,”__typename”:”SearchTopic”,”$ROOT_QUERY.options.acf.search_topics.2.tag”:”name”:null,”slug”:null,”term_id”:null,”__typename”:”Term”,”$ROOT_QUERY.options.acf.search_topics.2.category”:”name”:null,”slug”:null,”term_id”:null,”__typename”:”Term”,”$ROOT_QUERY.options.acf.search_topics.3″:”type”:”Category”,”label”:”Interviews”,”tag”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.search_topics.3.tag”,”typename”:”Term”,”category”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.search_topics.3.category”,”typename”:”Term”,”__typename”:”SearchTopic”,”$ROOT_QUERY.options.acf.search_topics.3.tag”:”name”:”Q&A”,”slug”:”qa”,”term_id”:”567″,”__typename”:”Term”,”$ROOT_QUERY.options.acf.search_topics.3.category”:”name”:”Q&A”,”slug”:”qa”,”term_id”:”176″,”__typename”:”Term”,”$ROOT_QUERY.options.acf.search_topics.4″:”type”:”Category”,”label”:”Multimedia”,”tag”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.search_topics.4.tag”,”typename”:”Term”,”category”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.search_topics.4.category”,”typename”:”Term”,”__typename”:”SearchTopic”,”$ROOT_QUERY.options.acf.search_topics.4.tag”:”name”:null,”slug”:null,”term_id”:null,”__typename”:”Term”,”$ROOT_QUERY.options.acf.search_topics.4.category”:”name”:”Multimedia”,”slug”:”multimedia”,”term_id”:”43″,”__typename”:”Term”,”$ROOT_QUERY.options.acf.search_topics.5″:”type”:”Category”,”label”:”Puzzles”,”tag”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.search_topics.5.tag”,”typename”:”Term”,”category”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.search_topics.5.category”,”typename”:”Term”,”__typename”:”SearchTopic”,”$ROOT_QUERY.options.acf.search_topics.5.tag”:”name”:”puzzles”,”slug”:”puzzles”,”term_id”:”542″,”__typename”:”Term”,”$ROOT_QUERY.options.acf.search_topics.5.category”:”name”:”Puzzles”,”slug”:”puzzles”,”term_id”:”546″,”__typename”:”Term”,”$ROOT_QUERY.options.acf.search_topics.6″:”type”:”Category”,”label”:”Blog Posts”,”tag”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.search_topics.6.tag”,”typename”:”Term”,”category”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.search_topics.6.category”,”typename”:”Term”,”__typename”:”SearchTopic”,”$ROOT_QUERY.options.acf.search_topics.6.tag”:”name”:null,”slug”:null,”term_id”:null,”__typename”:”Term”,”$ROOT_QUERY.options.acf.search_topics.6.category”:”name”:”Abstractions blog”,”slug”:”abstractions”,”term_id”:”619″,”__typename”:”Term”,”$ROOT_QUERY.options.acf.search_topics.7″:”type”:”news”,”label”:”News Articles”,”tag”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.search_topics.7.tag”,”typename”:”Term”,”category”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.search_topics.7.category”,”typename”:”Term”,”__typename”:”SearchTopic”,”$ROOT_QUERY.options.acf.search_topics.7.tag”:”name”:null,”slug”:null,”term_id”:null,”__typename”:”Term”,”$ROOT_QUERY.options.acf.search_topics.7.category”:”name”:null,”slug”:null,”term_id”:null,”__typename”:”Term”,”$ROOT_QUERY.options.acf.search_topics.8″:”type”:”videos”,”label”:”Videos”,”tag”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.search_topics.8.tag”,”typename”:”Term”,”category”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.options.acf.search_topics.8.category”,”typename”:”Term”,”__typename”:”SearchTopic”,”$ROOT_QUERY.options.acf.search_topics.8.tag”:”name”:null,”slug”:null,”term_id”:null,”__typename”:”Term”,”$ROOT_QUERY.options.acf.search_topics.8.category”:”name”:null,”slug”:null,”term_id”:null,”__typename”:”Term”,”$ROOT_QUERY.options.acf.search_sections.0″:”name”:”Mathematics”,”slug”:”mathematics”,”term_id”:”188″,”__typename”:”Term”,”$ROOT_QUERY.options.acf.search_sections.1″:”name”:”Physics”,”slug”:”physics”,”term_id”:”189″,”__typename”:”Term”,”$ROOT_QUERY.options.acf.search_sections.2″:”name”:”Biology”,”slug”:”biology”,”term_id”:”191″,”__typename”:”Term”,”$ROOT_QUERY.options.acf.search_sections.3″:”name”:”Computer Science”,”slug”:”computer-science”,”term_id”:”190″,”__typename”:”Term”,”AuthorList:38171″:”id”:”38171″,”name”:”Adam Becker”,”__typename”:”AuthorList”,”AuthorList:28087″:”id”:”28087″,”name”:”Adam Mann”,”__typename”:”AuthorList”,”AuthorList:29794″:”id”:”29794″,”name”:”Alex Kontorovich”,”__typename”:”AuthorList”,”AuthorList:39302″:”id”:”39302″,”name”:”Alexander Hellemans”,”__typename”:”AuthorList”,”AuthorList:56″:”id”:”56″,”name”:”Alla Katsnelson”,”__typename”:”AuthorList”,”AuthorList:29458″:”id”:”29458″,”name”:”Allison Whitten”,”__typename”:”AuthorList”,”AuthorList:73″:”id”:”73″,”name”:”Amanda Gefter”,”__typename”:”AuthorList”,”AuthorList:39164″:”id”:”39164″,”name”:”Ana Kova”,”__typename”:”AuthorList”,”AuthorList:59″:”id”:”59″,”name”:”Andreas von Bubnoff”,”__typename”:”AuthorList”,”AuthorList:8728″:”id”:”8728″,”name”:”Anil Ananthaswamy”,”__typename”:”AuthorList”,”AuthorList:11648″:”id”:”11648″,”name”:”Ann Finkbeiner”,”__typename”:”AuthorList”,”AuthorList:42689″:”id”:”42689″,”name”:”Annie Melchor”,”__typename”:”AuthorList”,”AuthorList:95″:”id”:”95″,”name”:”Ariel Bleicher”,”__typename”:”AuthorList”,”AuthorList:15493″:”id”:”15493″,”name”:”Ashley Smart”,”__typename”:”AuthorList”,”AuthorList:450″:”id”:”450″,”name”:”Ashley Yeager”,”__typename”:”AuthorList”,”AuthorList:36490″:”id”:”36490″,”name”:”Ben Brubaker”,”__typename”:”AuthorList”,”AuthorList:16315″:”id”:”16315″,”name”:”Bill Andrews”,”__typename”:”AuthorList”,”AuthorList:2752″:”id”:”2752″,”name”:”Bob Henderson”,”__typename”:”AuthorList”,”AuthorList:15492″:”id”:”15492″,”name”:”Brendan Z. Foster”,”__typename”:”AuthorList”,”AuthorList:68″:”id”:”68″,”name”:”Brooke Borel”,”__typename”:”AuthorList”,”AuthorList:62″:”id”:”62″,”name”:”Carl Zimmer”,”__typename”:”AuthorList”,”AuthorList:13684″:”id”:”13684″,”name”:”Caroline Lee”,”__typename”:”AuthorList”,”AuthorList:13691″:”id”:”13691″,”name”:”Caroline Lee”,”__typename”:”AuthorList”,”AuthorList:50″:”id”:”50″,”name”:”Carrie Arnold”,”__typename”:”AuthorList”,”AuthorList:15142″:”id”:”15142″,”name”:”Chanda Prescod-Weinstein”,”__typename”:”AuthorList”,”AuthorList:8084″:”id”:”8084″,”name”:”Charlie Wood”,”__typename”:”AuthorList”,”AuthorList:742″:”id”:”742″,”name”:”Christie Wilcox”,”__typename”:”AuthorList”,”AuthorList:11543″:”id”:”11543″,”name”:”Claudia Dreifus”,”__typename”:”AuthorList”,”AuthorList:57″:”id”:”57″,”name”:”Courtney Humphries”,”__typename”:”AuthorList”,”AuthorList:7262″:”id”:”7262″,”name”:”Dalmeet Singh Chawla”,”__typename”:”AuthorList”,”AuthorList:70″:”id”:”70″,”name”:”Dan Falk”,”__typename”:”AuthorList”,”AuthorList:19918″:”id”:”19918″,”name”:”Dana Najjar”,”__typename”:”AuthorList”,”AuthorList:13695″:”id”:”13695″,”name”:”Daniel Garisto”,”__typename”:”AuthorList”,”AuthorList:32676″:”id”:”32676″,”name”:”Daniel S. Freed”,”__typename”:”AuthorList”,”AuthorList:13724″:”id”:”13724″,”name”:”David H. Freedman”,”__typename”:”AuthorList”,”AuthorList:26310″:”id”:”26310″,”name”:”David S. Richeson”,”__typename”:”AuthorList”,”AuthorList:30207″:”id”:”30207″,”name”:”David Tse”,”__typename”:”AuthorList”,”AuthorList:19266″:”id”:”19266″,”name”:”Devin Powell”,”__typename”:”AuthorList”,”AuthorList:13251″:”id”:”13251″,”name”:”Diana Kwon”,”__typename”:”AuthorList”,”AuthorList:17000″:”id”:”17000″,”name”:”Elena Renken”,”__typename”:”AuthorList”,”AuthorList:17149″:”id”:”17149″,”name”:”Elizabeth Landau”,”__typename”:”AuthorList”,”AuthorList:5279″:”id”:”5279″,”name”:”Elizabeth Preston”,”__typename”:”AuthorList”,”AuthorList:58″:”id”:”58″,”name”:”Elizabeth Svoboda”,”__typename”:”AuthorList”,”AuthorList:32612″:”id”:”32612″,”name”:”Ellen Horne”,”__typename”:”AuthorList”,”AuthorList:27534″:”id”:”27534″,”name”:”Emily Buder”,”__typename”:”AuthorList”,”AuthorList:25173″:”id”:”25173″,”name”:”Emily Levesque”,”__typename”:”AuthorList”,”AuthorList:64″:”id”:”64″,”name”:”Emily Singer”,”__typename”:”AuthorList”,”AuthorList:47″:”id”:”47″,”name”:”Erica Klarreich”,”__typename”:”AuthorList”,”AuthorList:14784″:”id”:”14784″,”name”:”Erika K. Carlson”,”__typename”:”AuthorList”,”AuthorList:98″:”id”:”98″,”name”:”Esther Landhuis”,”__typename”:”AuthorList”,”AuthorList:5830″:”id”:”5830″,”name”:”Eva Silverstein”,”__typename”:”AuthorList”,”AuthorList:6793″:”id”:”6793″,”name”:”Evelyn Lamb”,”__typename”:”AuthorList”,”AuthorList:75″:”id”:”75″,”name”:”Ferris Jabr”,”__typename”:”AuthorList”,”AuthorList:52″:”id”:”52″,”name”:”Frank Wilczek”,”__typename”:”AuthorList”,”AuthorList:69″:”id”:”69″,”name”:”Gabriel Popkin”,”__typename”:”AuthorList”,”AuthorList:77″:”id”:”77″,”name”:”George Musser”,”__typename”:”AuthorList”,”AuthorList:19092″:”id”:”19092″,”name”:”Grant Sanderson”,”__typename”:”AuthorList”,”AuthorList:20557″:”id”:”20557″,”name”:”Howard Lee”,”__typename”:”AuthorList”,”AuthorList:66″:”id”:”66″,”name”:”Ingrid Daubechies”,”__typename”:”AuthorList”,”AuthorList:46418″:”id”:”46418″,”name”:”Ingrid Wickelgren”,”__typename”:”AuthorList”,”AuthorList:85″:”id”:”85″,”name”:”Ivan Amato”,”__typename”:”AuthorList”,”AuthorList:37141″:”id”:”37141″,”name”:”Jake Buehler”,”__typename”:”AuthorList”,”AuthorList:44758″:”id”:”44758″,”name”:”James Dinneen”,”__typename”:”AuthorList”,”AuthorList:12170″:”id”:”12170″,”name”:”Janna Levin”,”__typename”:”AuthorList”,”AuthorList:32″:”id”:”32″,”name”:”Jeanette Kazmierczak”,”__typename”:”AuthorList”,”AuthorList:51″:”id”:”51″,”name”:”Jennifer Ouellette”,”__typename”:”AuthorList”,”AuthorList:44787″:”id”:”44787″,”name”:”Joanna Thompson”,”__typename”:”AuthorList”,”AuthorList:72″:”id”:”72″,”name”:”John Pavlus”,”__typename”:”AuthorList”,”AuthorList:16475″:”id”:”16475″,”name”:”John Preskill”,”__typename”:”AuthorList”,”AuthorList:91″:”id”:”91″,”name”:”John Rennie”,”__typename”:”AuthorList”,”AuthorList:10351″:”id”:”10351″,”name”:”Jonathan Lambert”,”__typename”:”AuthorList”,”AuthorList:31716″:”id”:”31716″,”name”:”Jonathan O’Callaghan”,”__typename”:”AuthorList”,”AuthorList:1241″:”id”:”1241″,”name”:”Jordana Cepelewicz”,”__typename”:”AuthorList”,”AuthorList:8463″:”id”:”8463″,”name”:”Joshua Roebke”,”__typename”:”AuthorList”,”AuthorList:49″:”id”:”49″,”name”:”Joshua Sokol”,”__typename”:”AuthorList”,”AuthorList:16815″:”id”:”16815″,”name”:”jye”,”__typename”:”AuthorList”,”AuthorList:67″:”id”:”67″,”name”:”K.C. Cole”,”__typename”:”AuthorList”,”AuthorList:37462″:”id”:”37462″,”name”:”Karmela Padavic-Callaghan”,”__typename”:”AuthorList”,”AuthorList:87″:”id”:”87″,”name”:”Kat McGowan”,”__typename”:”AuthorList”,”AuthorList:36139″:”id”:”36139″,”name”:”Katarina Zimmer”,”__typename”:”AuthorList”,”AuthorList:20556″:”id”:”20556″,”name”:”Katherine Harmon Courage”,”__typename”:”AuthorList”,”AuthorList:90″:”id”:”90″,”name”:”Katia Moskvitch”,”__typename”:”AuthorList”,”AuthorList:39551″:”id”:”39551″,”name”:”Katie McCormick”,”__typename”:”AuthorList”,”AuthorList:27374″:”id”:”27374″,”name”:”Kelsey Houston-Edwards”,”__typename”:”AuthorList”,”AuthorList:40″:”id”:”40″,”name”:”Kevin Hartnett”,”__typename”:”AuthorList”,”AuthorList:45758″:”id”:”45758″,”name”:”Kristina Armitage”,”__typename”:”AuthorList”,”AuthorList:38413″:”id”:”38413″,”name”:”Lakshmi Chandrasekaran”,”__typename”:”AuthorList”,”AuthorList:12570″:”id”:”12570″,”name”:”Laura Poppick”,”__typename”:”AuthorList”,”AuthorList:38699″:”id”:”38699″,”name”:”Leila Sloman”,”__typename”:”AuthorList”,”AuthorList:23451″:”id”:”23451″,”name”:”Liam Drew”,”__typename”:”AuthorList”,”AuthorList:79″:”id”:”79″,”name”:”Liz Kruesi”,”__typename”:”AuthorList”,”AuthorList:38″:”id”:”38″,”name”:”Lucy Reading-Ikkanda”,”__typename”:”AuthorList”,”AuthorList:60″:”id”:”60″,”name”:”Maggie McKee”,”__typename”:”AuthorList”,”AuthorList:2333″:”id”:”2333″,”name”:”Mallory Locklear”,”__typename”:”AuthorList”,”AuthorList:3569″:”id”:”3569″,”name”:”Marcus Woo”,”__typename”:”AuthorList”,”AuthorList:414″:”id”:”414″,”name”:”Mark Kim-Mulgrew”,”__typename”:”AuthorList”,”AuthorList:20495″:”id”:”20495″,”name”:”Matt Carlstrom”,”__typename”:”AuthorList”,”AuthorList:17147″:”id”:”17147″,”name”:”Matthew Hutson”,”__typename”:”AuthorList”,”AuthorList:30953″:”id”:”30953″,”name”:”Max G. Levy”,”__typename”:”AuthorList”,”AuthorList:32437″:”id”:”32437″,”name”:”Max Kozlov”,”__typename”:”AuthorList”,”AuthorList:38705″:”id”:”38705″,”name”:”mcho”,”__typename”:”AuthorList”,”AuthorList:40613″:”id”:”40613″,”name”:”Melanie Mitchell”,”__typename”:”AuthorList”,”AuthorList:7186″:”id”:”7186″,”name”:”Melinda Wenner Moyer”,”__typename”:”AuthorList”,”AuthorList:14093″:”id”:”14093″,”name”:”Michael Harris”,”__typename”:”AuthorList”,”AuthorList:34″:”id”:”34″,”name”:”Michael Kranz”,”__typename”:”AuthorList”,”AuthorList:23″:”id”:”23″,”name”:”Michael Moyer”,”__typename”:”AuthorList”,”AuthorList:74″:”id”:”74″,”name”:”Michael Nielsen”,”__typename”:”AuthorList”,”AuthorList:19093″:”id”:”19093″,”name”:”Michele Bannister”,”__typename”:”AuthorList”,”AuthorList:1472″:”id”:”1472″,”name”:”Moira Chas”,”__typename”:”AuthorList”,”AuthorList:6476″:”id”:”6476″,”name”:”Monique Brouillette”,”__typename”:”AuthorList”,”AuthorList:42264″:”id”:”42264″,”name”:”Mordechai Rorvig”,”__typename”:”AuthorList”,”AuthorList:10″:”id”:”10″,”name”:”Natalie Wolchover”,”__typename”:”AuthorList”,”AuthorList:37605″:”id”:”37605″,”name”:”Nick Thieme”,”__typename”:”AuthorList”,”AuthorList:43298″:”id”:”43298″,”name”:”Nicole Yunger Halpern”,”__typename”:”AuthorList”,”AuthorList:37428″:”id”:”37428″,”name”:”Nima Arkani-Hamed”,”__typename”:”AuthorList”,”AuthorList:19962″:”id”:”19962″,”name”:”Nola Taylor Redd”,”__typename”:”AuthorList”,”AuthorList:24″:”id”:”24″,”name”:”Olena Shmahalo”,”__typename”:”AuthorList”,”AuthorList:1816″:”id”:”1816″,”name”:”Patrick Honner”,”__typename”:”AuthorList”,”AuthorList:84″:”id”:”84″,”name”:”Peter Byrne”,”__typename”:”AuthorList”,”AuthorList:55″:”id”:”55″,”name”:”Philip Ball”,”__typename”:”AuthorList”,”AuthorList:31″:”id”:”31″,”name”:”Pradeep Mutalik”,”__typename”:”AuthorList”,”AuthorList:24011″:”id”:”24011″,”name”:”Puja Changoiwala”,”__typename”:”AuthorList”,”AuthorList:100″:”id”:”100″,”name”:”Quanta Magazine”,”__typename”:”AuthorList”,”AuthorList:2784″:”id”:”2784″,”name”:”R. Douglas Fields”,”__typename”:”AuthorList”,”AuthorList:26114″:”id”:”26114″,”name”:”Rachel Crowell”,”__typename”:”AuthorList”,”AuthorList:9412″:”id”:”9412″,”name”:”Raleigh McElvery”,”__typename”:”AuthorList”,”AuthorList:820″:”id”:”820″,”name”:”Ramin Skibba”,”__typename”:”AuthorList”,”AuthorList:1666″:”id”:”1666″,”name”:”Rebecca Boyle”,”__typename”:”AuthorList”,”AuthorList:20950″:”id”:”20950″,”name”:”Richard Masland”,”__typename”:”AuthorList”,”AuthorList:48″:”id”:”48″,”name”:”Robbert Dijkgraaf”,”__typename”:”AuthorList”,”AuthorList:80″:”id”:”80″,”name”:”Roberta Kwok”,”__typename”:”AuthorList”,”AuthorList:15681″:”id”:”15681″,”name”:”Robin George Andrews”,”__typename”:”AuthorList”,”AuthorList:24577″:”id”:”24577″,”name”:”Rodrigo Pérez Ortega”,”__typename”:”AuthorList”,”AuthorList:78″:”id”:”78″,”name”:”Sabine Hossenfelder”,”__typename”:”AuthorList”,”AuthorList:23845″:”id”:”23845″,”name”:”Samuel Velasco”,”__typename”:”AuthorList”,”AuthorList:83″:”id”:”83″,”name”:”Sarah Lewin”,”__typename”:”AuthorList”,”AuthorList:35441″:”id”:”35441″,”name”:”Scott Aaronson”,”__typename”:”AuthorList”,”AuthorList:76″:”id”:”76″,”name”:”Sean B. Carroll”,”__typename”:”AuthorList”,”AuthorList:15680″:”id”:”15680″,”name”:”Sean Carroll”,”__typename”:”AuthorList”,”AuthorList:7239″:”id”:”7239″,”name”:”Shannon Hall”,”__typename”:”AuthorList”,”AuthorList:44197″:”id”:”44197″,”name”:”Sheon Han”,”__typename”:”AuthorList”,”AuthorList:65″:”id”:”65″,”name”:”Siobhan Roberts”,”__typename”:”AuthorList”,”AuthorList:5944″:”id”:”5944″,”name”:”Sophia Chen”,”__typename”:”AuthorList”,”AuthorList:61″:”id”:”61″,”name”:”Steph Yin”,”__typename”:”AuthorList”,”AuthorList:63″:”id”:”63″,”name”:”Stephanie Bucklin”,”__typename”:”AuthorList”,”AuthorList:26311″:”id”:”26311″,”name”:”Stephanie DeMarco”,”__typename”:”AuthorList”,”AuthorList:71″:”id”:”71″,”name”:”Stephen Ornes”,”__typename”:”AuthorList”,”AuthorList:17148″:”id”:”17148″,”name”:”Steve Nadis”,”__typename”:”AuthorList”,”AuthorList:13356″:”id”:”13356″,”name”:”Steven Strogatz”,”__typename”:”AuthorList”,”AuthorList:17150″:”id”:”17150″,”name”:”Susan D’Agostino”,”__typename”:”AuthorList”,”AuthorList:39768″:”id”:”39768″,”name”:”Tamar Lichter Blanks”,”__typename”:”AuthorList”,”AuthorList:2960″:”id”:”2960″,”name”:”Tara C. Smith”,”__typename”:”AuthorList”,”AuthorList:14785″:”id”:”14785″,”name”:”Thomas Lewton”,”__typename”:”AuthorList”,”AuthorList:3″:”id”:”3″,”name”:”Thomas Lin”,”__typename”:”AuthorList”,”AuthorList:54″:”id”:”54″,”name”:”Tim Vernimmen”,”__typename”:”AuthorList”,”AuthorList:88″:”id”:”88″,”name”:”Tom Siegfried”,”__typename”:”AuthorList”,”AuthorList:12964″:”id”:”12964″,”name”:”Vanessa Schipani”,”__typename”:”AuthorList”,”AuthorList:53″:”id”:”53″,”name”:”Veronique Greenwood”,”__typename”:”AuthorList”,”AuthorList:86″:”id”:”86″,”name”:”Virginia Hughes”,”__typename”:”AuthorList”,”AuthorList:3244″:”id”:”3244″,”name”:”Viviane Callier”,”__typename”:”AuthorList”,”AuthorList:89″:”id”:”89″,”name”:”Wynne Parry”,”__typename”:”AuthorList”,”AuthorList:15913″:”id”:”15913″,”name”:”XiaoZhi Lim”,”__typename”:”AuthorList”,”AuthorList:42263″:”id”:”42263″,”name”:”Yasemin Saplakoglu”,”__typename”:”AuthorList”,”AuthorList:45757″:”id”:”45757″,”name”:”Zack Savitsky”,”__typename”:”AuthorList”,”$ROOT_QUERY.menu(“slug”:”main-menu”).items.0″:”title”:”Physics”,”url”:” Science”,”url”:”https://www.quantamagazine.org/computer-science/”,”order”:4,”__typename”:”MenuItem”,”$ROOT_QUERY.menu(“slug”:”main-menu”).items.4″:”title”:”Topics”,”url”:”https://news.google.com/topics”,”order”:5,”__typename”:”MenuItem”,”$ROOT_QUERY.menu(“slug”:”main-menu”).items.5″:”title”:”Archive”,”url”:”https://www.quantamagazine.org/archive/”,”order”:6,”__typename”:”MenuItem”,”$ROOT_QUERY.menu(“slug”:”main-menu”)”:”items”:[“type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.menu(“slug”:”main-menu”).items.0″,”typename”:”MenuItem”,”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.menu(“slug”:”main-menu”).items.1″,”typename”:”MenuItem”,”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.menu(“slug”:”main-menu”).items.2″,”typename”:”MenuItem”,”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.menu(“slug”:”main-menu”).items.3″,”typename”:”MenuItem”,”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.menu(“slug”:”main-menu”).items.4″,”typename”:”MenuItem”,”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.menu(“slug”:”main-menu”).items.5″,”typename”:”MenuItem”],”__typename”:”Menu”,”$ROOT_QUERY.menu(“slug”:”secondary-menu”).items.0″:”title”:”Blog”,”url”:”https://www.quantamagazine.org/abstractions/”,”order”:1,”__typename”:”MenuItem”,”$ROOT_QUERY.menu(“slug”:”secondary-menu”).items.1″:”title”:”Q&A”,”url”:”https://www.quantamagazine.org/qa/”,”order”:2,”__typename”:”MenuItem”,”$ROOT_QUERY.menu(“slug”:”secondary-menu”).items.2″:”title”:”Columns”,”url”:”/tag/quantized”,”order”:3,”__typename”:”MenuItem”,”$ROOT_QUERY.menu(“slug”:”secondary-menu”).items.3″:”title”:”Puzzles”,”url”:”https://www.quantamagazine.org/puzzles/”,”order”:4,”__typename”:”MenuItem”,”$ROOT_QUERY.menu(“slug”:”secondary-menu”).items.4″:”title”:”Podcasts”,”url”:”/podcasts/”,”order”:5,”__typename”:”MenuItem”,”$ROOT_QUERY.menu(“slug”:”secondary-menu”).items.5″:”title”:”Videos”,”url”:”/videos”,”order”:6,”__typename”:”MenuItem”,”$ROOT_QUERY.menu(“slug”:”secondary-menu”).items.6″:”title”:”Multimedia”,”url”:”https://www.quantamagazine.org/multimedia/”,”order”:7,”__typename”:”MenuItem”,”$ROOT_QUERY.menu(“slug”:”secondary-menu”).items.7″:”title”:”About Quanta”,”url”:”https://www.quantamagazine.org/about/”,”order”:8,”__typename”:”MenuItem”,”$ROOT_QUERY.menu(“slug”:”secondary-menu”)”:”items”:[“type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.menu(“slug”:”secondary-menu”).items.0″,”typename”:”MenuItem”,”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.menu(“slug”:”secondary-menu”).items.1″,”typename”:”MenuItem”,”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.menu(“slug”:”secondary-menu”).items.2″,”typename”:”MenuItem”,”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.menu(“slug”:”secondary-menu”).items.3″,”typename”:”MenuItem”,”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.menu(“slug”:”secondary-menu”).items.4″,”typename”:”MenuItem”,”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.menu(“slug”:”secondary-menu”).items.5″,”typename”:”MenuItem”,”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.menu(“slug”:”secondary-menu”).items.6″,”typename”:”MenuItem”,”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.menu(“slug”:”secondary-menu”).items.7″,”typename”:”MenuItem”],”__typename”:”Menu”,”$ROOT_QUERY.menu(“slug”:”footer”).items.0″:”title”:”About Quanta”,”url”:” Us”,”url”:” & Conditions”,”url”:” Policy”,”url”:” Foundation”,”url”:”http://www.simonsfoundation.org”,”order”:6,”__typename”:”MenuItem”,”$ROOT_QUERY.menu(“slug”:”footer”)”:”items”:[“type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.menu(“slug”:”footer”).items.0″,”typename”:”MenuItem”,”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.menu(“slug”:”footer”).items.1″,”typename”:”MenuItem”,”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.menu(“slug”:”footer”).items.2″,”typename”:”MenuItem”,”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.menu(“slug”:”footer”).items.3″,”typename”:”MenuItem”,”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.menu(“slug”:”footer”).items.4″,”typename”:”MenuItem”,”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.menu(“slug”:”footer”).items.5″,”typename”:”MenuItem”],”__typename”:”Menu”,”$ROOT_QUERY.getPostPageArchive(“slug”:”how-mathematical-curves-power-cryptography-20220919″)”:”type”:”post”,”meta”:”type”:”id”,”generated”:true,”id”:”$ROOT_QUERY.getPostPageArchive(“slug”:”how-mathematical-curves-power-cryptography-20220919″).meta”,”typename”:”PageData”,”data”:[“type”:”id”,”generated”:false,”id”:”Post:118880″,”typename”:”Post”],”__typename”:”PostPageArchive”,”$ROOT_QUERY.getPostPageArchive(“slug”:”how-mathematical-curves-power-cryptography-20220919″).meta”: Quanta Magazine”,”max_num_pages”:0,”found_posts”:0,”extra_term”:””,”author”:”type”:”id”,”generated”:false,”id”:”Author:null”,”typename”:”Author”,”tag”:”type”:”id”,”generated”:false,”id”:”Term:null”,”typename”:”Term”,”category”:”type”:”id”,”generated”:false,”id”:”Term:null”,”typename”:”Term”,”__typename”:”PageData”,”Author:null”:”id”:null,”name”:null,”link”:null,”description”:null,”url”:null,”public_email”:null,”facebook”:null,”twitter”:null,”instagram”:null,”acf”:null,”__typename”:”Author”,”Term:null”:”id”:null,”slug”:null,”name”:null,”link”:null,”description”:null,”image”:””,”__typename”:”Term”,”Post:118880″:”id”:”118880″,”title”:”How Mathematical Curves Enable Advanced Communication”,”excerpt”:”u003cp>A simple geometric idea has been used to power advances in information theory, cryptography and even blockchain technology.u003c/p>n”,”link”:” https://www.quantamagazine.org/?p=118880″,”date”:”2022-09-19T10:44:33″,”featured_media_image”:null,”authors”:[“type”:”id”,”generated”:true,”id”:”Post:118880.authors.0″,”typename”:”Author”],”tags”:[“type”:”id”,”generated”:true,”id”:”Post:118880.tags.0″,”typename”:”Term”,”type”:”id”,”generated”:true,”id”:”Post:118880.tags.1″,”typename”:”Term”,”type”:”id”,”generated”:true,”id”:”Post:118880.tags.2″,”typename”:”Term”,”type”:”id”,”generated”:true,”id”:”Post:118880.tags.3″,”typename”:”Term”,”type”:”id”,”generated”:true,”id”:”Post:118880.tags.4″,”typename”:”Term”,”type”:”id”,”generated”:true,”id”:”Post:118880.tags.5″,”typename”:”Term”,”type”:”id”,”generated”:true,”id”:”Post:118880.tags.6″,”typename”:”Term”],”podcast”:null,”acf”:”type”:”id”,”generated”:true,”id”:”$Post:118880.acf”,”typename”:”ACFFields”,”__typename”:”Post”,”status”:”publish”,”content”:””,”categories”:[“type”:”id”,”generated”:false,”id”:”Term:619″,”typename”:”Term”,”type”:”id”,”generated”:false,”id”:”Term:188″,”typename”:”Term”],”attachments”:null,”series_prev”:null,”series_next”:null,”next”:”type”:”id”,”generated”:true,”id”:”$Post:118880.next”,”typename”:”PostPageArchive”,”Post:118880.authors.0″:”name”:”Jordana Cepelewicz”,”link”:” blog”,”link”:” geometry”,”link”:” science”,”link”:” theory”,”link”:”https://www.quantamagazine.org/tag/information-theory/”,”Post:118880.tags.6″:”slug”:”mathematics”,”__typename”:”Term”,”name”:”mathematics”,”link”:”https://www.quantamagazine.org/tag/mathematics/”,”$Post:118880.acf”:”featured_block_title”:””,”kicker”:”type”:”id”,”generated”:true,”id”:”$Post:118880.acf.kicker”,”typename”:”Term”,”featured_image_default”:”type”:”id”,”generated”:true,”id”:”$Post:118880.acf.featured_image_default”,”typename”:”Image”,”featured_image_square”:”type”:”id”,”generated”:true,”id”:”$Post:118880.acf.featured_image_square”,”typename”:”Image”,”featured_image_full_width”:”type”:”id”,”generated”:true,”id”:”$Post:118880.acf.featured_image_full_width”,”typename”:”Image”,”featured_image_gif”:false,”featured_video”:”false”,”full_page_interactive”:false,”podcast_publish_date”:””,”__typename”:”ACFFields”,”interactive_type”:null,”iframe_url”:null,”return_cursor”:null,”exclude_blurb”:null,”interactive_html”:null,”interactive_css”:null,”interactive_js”:null,”interactive_blurb”:null,”related_article”:null,”modules”:[“type”:”id”,”generated”:true,”id”:”$Post:118880.acf.modules.0″,”typename”:”ACFImageComponent”,”type”:”id”,”generated”:true,”id”:”$Post:118880.acf.modules.1″,”typename”:”ACFContent”,”type”:”id”,”generated”:true,”id”:”$Post:118880.acf.modules.2″,”typename”:”ACFImageComponent”,”type”:”id”,”generated”:true,”id”:”$Post:118880.acf.modules.3″,”typename”:”ACFContent”],”template”:”article”,”subtitle”:”A simple geometric idea has been used to power advances in information theory, cryptography and even blockchain technology.”,”title_layout”:”default”,”title_background_type”:null,”title_background_image”:null,”title_background_video”:null,”title_background_attribution”:null,”title_background_image_gif”:null,”title_overlay_enable”:null,”title_overlay_color”:null,”title_overlay_opacity”:null,”title_text_color”:null,”featured_image_attribution”:”u003cp>Kristina Armitage/Quanta Magazineu003c/p>n”,”featured_overlay_enable”:”false”,”featured_overlay_color”:null,”featured_overlay_opacity”:null,”series”:”type”:”id”,”generated”:true,”id”:”$Post:118880.acf.series”,”typename”:”Term”,”intro_content”:null,”make_image_full_width”:null,”hide_ad_on_post”:false,”$Post:118880.acf.kicker”:”name”:”information theory”,”link”:” spacecraft, laptop, QR code and CD”,”caption”:””,”url”:” spacecraft, laptop, QR code and CD”,”caption”:””,”url”:” spacecraft, laptop, QR code and CD”,”caption”:””,”url”:” blog”,”slug”:”abstractions”,”link”:” Writer”,”avatar”:”type”:”id”,”generated”:true,”id”:”$Post:118880.authors.0.acf.avatar”,”typename”:”Image”,”__typename”:”AuthorACF”,”$Post:118880.authors.0.acf.avatar”:”alt”:””,”caption”:””,”url”:” Armitage/Quanta Magazineu003c/p>n”,”caption”:”u003cp>Reed-Solomon codes help power an enormous number of information technologies.u003c/p>n”,”mobile_comp_caption”:””,”mobile_comp_attribution”:””,”sets”:[“type”:”id”,”generated”:true,”id”:”$Post:118880.acf.modules.0.sets.0″,”typename”:”ImageSet”],”__typename”:”ACFImageComponent”,”$Post:118880.acf.modules.0.sets.0″:”settings”:””,”image”:”type”:”id”,”generated”:true,”id”:”$Post:118880.acf.modules.0.sets.0.image”,”typename”:”Image”,”mobile_image”:”type”:”id”,”generated”:true,”id”:”$Post:118880.acf.modules.0.sets.0.mobile_image”,”typename”:”Image”,”mobile_side_margins”:false,”mobile_width_constraint”:””,”mobile_caption”:””,”mobile_attribution”:””,”zoom_image”:”type”:”id”,”generated”:true,”id”:”$Post:118880.acf.modules.0.sets.0.zoom_image”,”typename”:”Image”,”zoom_caption”:””,”zoom_attribution”:””,”mobile_zoom_image”:”type”:”id”,”generated”:true,”id”:”$Post:118880.acf.modules.0.sets.0.mobile_zoom_image”,”typename”:”Image”,”mobile_zoom_caption”:””,”mobile_zoom_attribution”:””,”external_link”:””,”__typename”:”ImageSet”,”$Post:118880.acf.modules.0.sets.0.image”:”alt”:”A spacecraft, laptop, QR code and CD”,”caption”:””,”url”:” a collection of points in space, can you find a certain type of curve that passes through all of them? This question — a version of what’s called the interpolation problem — has interested mathematicians since antiquity. Earlier this year, the mathematicians u003ca href=” Larsonu003c/a> and u003ca href=” Vogtu003c/a> u003ca href=” it completelyu003c/a>.u003c/p>nu003cp>But while the work has generated a lot of excitement among pure mathematicians, interpolation has practical consequences that extend far beyond the realm of geometry. Interpolation is central to storing and communicating electronic data, constructing cryptographic schemes, and more. It’s why you can scratch a CD and still hear music, or get a QR code dirty and still scan it. It’s why space missions like the Voyager program could send clear digital images back to Earth. It’s why a cluster of computers can perform a complex computation even if one of those computers malfunctions.u003c/p>nu003cp>These applications all rely on a strikingly beautiful and conceptually straightforward use of interpolation: so-called Reed-Solomon codes, and the codes that build on them.u003c/p>nu003ch2>u003cstrong>Point by Pointu003c/strong>u003c/h2>nu003cp>Say you want to send a message consisting of two numbers: 2 and 7. It’s possible that some of the data you’re transmitting will get lost or corrupted — the 2 might flip to a −2, for instance. So instead of simply sending the data, you can add extra information to help the recipient identify and fix errors that might arise. This is what’s called an error-correcting code.u003c/p>nu003cp>The simplest example of such a code involves transmitting the same message multiple times. To allow the recipient to identify whether an error occurred, send the same message twice: 2, 7, 2, 7. If the numbers in corresponding positions don’t match (say, if the transmission instead reads 2, 7, −2, 7), the recipient will know one of them is wrong — but not which one. To let them figure that out and correct the error, send the same message three times: 2, 7, 2, 7, 2, 7. The recipient simply needs to take the majority vote to figure out your intended message.u003c/p>nu003cp>But this means of correcting errors is wildly inefficient. Here’s a smarter approach: Encode the message as a curve, and send just enough information to allow the recipient to reconstruct that curve.u003c/p>nu003cp>In our simple case of transmitting 2 and 7, the curve would be the line u003cem>yu003c/em> = 2u003cem>xu003c/em> + 7. Evaluate this curve at two predetermined values of u003cem>xu003c/em>, and transmit the resulting u003cem>yu003c/em>-values. The recipient now has two points, and because the interpolation problem tells us that two points determine a unique line, the recipient simply has to find the line that passes through the points they received. The coefficients of the line reveal the intended message.u003c/p>n”,”fadein”:false,”__typename”:”ACFContent”,”$Post:118880.acf.modules.2″:”hide_this_component”:null,”acf_fc_layout”:”image_component”,”layout”:”medium”,”settings”:””,”attribution”:”u003cp>Merrill Sherman/Quanta Magazineu003c/p>n”,”caption”:””,”mobile_comp_caption”:””,”mobile_comp_attribution”:””,”sets”:[“type”:”id”,”generated”:true,”id”:”$Post:118880.acf.modules.2.sets.0″,”typename”:”ImageSet”],”__typename”:”ACFImageComponent”,”$Post:118880.acf.modules.2.sets.0″:”settings”:””,”image”:”type”:”id”,”generated”:true,”id”:”$Post:118880.acf.modules.2.sets.0.image”,”typename”:”Image”,”mobile_image”:”type”:”id”,”generated”:true,”id”:”$Post:118880.acf.modules.2.sets.0.mobile_image”,”typename”:”Image”,”mobile_side_margins”:false,”mobile_width_constraint”:””,”mobile_caption”:””,”mobile_attribution”:”u003cp>Merrill Sherman/Quanta Magazineu003c/p>n”,”zoom_image”:”type”:”id”,”generated”:true,”id”:”$Post:118880.acf.modules.2.sets.0.zoom_image”,”typename”:”Image”,”zoom_caption”:””,”zoom_attribution”:””,”mobile_zoom_image”:”type”:”id”,”generated”:true,”id”:”$Post:118880.acf.modules.2.sets.0.mobile_zoom_image”,”typename”:”Image”,”mobile_zoom_caption”:””,”mobile_zoom_attribution”:””,”external_link”:””,”__typename”:”ImageSet”,”$Post:118880.acf.modules.2.sets.0.image”:{“alt”:””,”caption”:””,”url”:” avoid errors, you once again add extra information. Here, you send the u003cem>yu003c/em>-value that corresponds to another predetermined u003cem>xu003c/em>-coordinate. If the three points do not fall on the same line, there’s an error. And to figure out where the error is, you just send one more value — meaning you’ve sent four numbers total, rather than the six required by the previous method.u003c/p>nu003cp>The advantage grows with the size of the message. Let’s say you want to send a longer message — 1,000 numbers. The less efficient code would require sending 2,000 numbers to identify an error, and 3,000 to correct it. But if you use the code that involves interpolating a polynomial through given points, you only need 1,001 numbers to find the error, and 1,002 to correct it. (You can add more points to identify and correct more potential errors.) As the length of your message increases, the difference in efficiency between the two codes grows starker.u003c/p>nu003cdiv id=’component-632912049993d’ class=””>u003cscript type=”text/template”>”type”:”CategoryDetails”,”id”:”component-632912049993d”,”data”:”type”:”category”,”id”:619,”title”:”Abstractions blog”,”description”:”u003cem>Abstractionsu003c\/em> navigates promising ideas in science and mathematics. Journey with us and join the conversation.”,”link”:”https:\/\/www.quantamagazine.org\/abstractions\/”,”image”:”ID”:41194,”id”:41194,”title”:”Abstractions”,”filename”:”Abstractions.png”,”filesize”:17245,”url”:”https:\/\/d2r55xnwy6nx47.cloudfront.net\/uploads\/2017\/04\/Abstractions.png”,”link”:”https:\/\/www.quantamagazine.org\/new-algorithm-solves-cake-cutting-problem-20161006\/abstractions\/”,”alt”:”Abstractions logo”,”author”:”24″,”description”:””,”caption”:”Abstractions\u200b navigates promising ideas in science and mathematics. Journey with us and join the conversation.”,”name”:”abstractions”,”status”:”inherit”,”uploaded_to”:30685,”date”:”2017-04-19 21:19:01″,”modified”:”2017-04-28 15:40:02″,”menu_order”:0,”mime_type”:”image\/png”,”type”:”image”,”subtype”:”png”,”icon”:”https:\/\/api.quantamagazine.org\/wp-includes\/images\/media\/default.png”,”width”:600,”height”:520,”sizes”:”thumbnail”:”https:\/\/d2r55xnwy6nx47.cloudfront.net\/uploads\/2017\/04\/Abstractions-520×451.png”,”thumbnail-width”:520,”thumbnail-height”:451,”medium”:”https:\/\/d2r55xnwy6nx47.cloudfront.net\/uploads\/2017\/04\/Abstractions.png”,”medium-width”:600,”medium-height”:520,”medium_large”:”https:\/\/d2r55xnwy6nx47.cloudfront.net\/uploads\/2017\/04\/Abstractions.png”,”medium_large-width”:600,”medium_large-height”:520,”large”:”https:\/\/d2r55xnwy6nx47.cloudfront.net\/uploads\/2017\/04\/Abstractions.png”,”large-width”:600,”large-height”:520,”1536×1536″:”https:\/\/d2r55xnwy6nx47.cloudfront.net\/uploads\/2017\/04\/Abstractions.png”,”1536×1536-width”:600,”1536×1536-height”:520,”2048×2048″:”https:\/\/d2r55xnwy6nx47.cloudfront.net\/uploads\/2017\/04\/Abstractions.png”,”2048×2048-width”:600,”2048×2048-height”:520,”square_small”:”https:\/\/d2r55xnwy6nx47.cloudfront.net\/uploads\/2017\/04\/Abstractions-160×160.png”,”square_small-width”:160,”square_small-height”:160,”square_large”:”https:\/\/d2r55xnwy6nx47.cloudfront.net\/uploads\/2017\/04\/Abstractions-520×520.png”,”square_large-width”:520,”square_large-height”:520u003c/script>u003c/div>nu003cp>The more efficient code is called a Reed-Solomon code. Since its introduction in 1960, mathematicians have made further breakthroughs, developing algorithms that can correct more errors with greater efficiency. “It’s very elegant, clean, concrete,” said u003ca href=” Koppartyu003c/a>, a mathematician and computer scientist at the University of Toronto. “It can be taught to a second-year undergraduate in half an hour.”u003c/p>nu003cp>Reed-Solomon codes have been particularly useful for storing and transmitting information electronically. But the same concept has also been essential in cryptography and distributed computing.u003c/p>nu003cp>Take secret sharing: Let’s say you want to distribute a secret among several parties such that no one person can access the entire secret, but together they can. (Imagine an encryption key, for instance, or a missile launch code.) You encode the numbers in a polynomial, evaluate that polynomial at a predetermined set of points, and distribute each of the results to a different person.u003c/p>nu003cp>Most recently, Reed-Solomon codes have been employed in areas like cloud computing and blockchain technology. Say you need to run a computation that’s too complicated for your laptop, so you have a large computational cluster run it — but now you need to verify that the computation you get back is correct. Reed-Solomon codes let you ask for additional information that the cluster likely won’t be able to produce if it hasn’t done the computation correctly. “This works magically,” said u003ca href=” Nardiu003c/a>, a research fellow at the Mathematics Institute of Rennes in France. “This process is really wonderful, and the way it relies on [these codes] blows my mind.”u003c/p>nu003cdiv id=’component-632912049f4ac’ class=””>u003cscript type=”text/template”>”type”:”Image”,”id”:”component-632912049f4ac”,”data”:”id”:118916,”src”:”https:\/\/d2r55xnwy6nx47.cloudfront.net\/uploads\/2022\/09\/Mona-Lisa.jpg”,”alt”:””,”class”:””,”width”:900,”height”:603,”mobileSrc”:false,”zoomSrc”:false,”mobileZoomSrc”:false,”align”:”align=\”inline\””,”wrapper_width”:””,”caption”:”u003cp>In a proof-of-concept test, NASA scientists encoded the Mona Lisa onto a laser beam and sent it from Earth\u2019s surface to a lunar spacecraft. Reed-Solomon codes were used to correct transmission errors introduced by Earth\u2019s atmosphere.u003c\/p>\n”,”attribution”:”u003cp>Courtesy of Xiaoli Sun, NASA Goddardu003c\/p>\n”,”variant”:”shortcode”,”size”:”wide”,”disableZoom”:false,”disableMobileZoom”:false,”srcImage”:”ID”:118916,”id”:118916,”title”:”Mona-Lisa”,”filename”:”Mona-Lisa.jpg”,”filesize”:130337,”url”:”https:\/\/d2r55xnwy6nx47.cloudfront.net\/uploads\/2022\/09\/Mona-Lisa.jpg”,”link”:”https:\/\/www.quantamagazine.org\/how-mathematical-curves-power-cryptography-20220919\/mona-lisa\/”,”alt”:””,”author”:”42689″,”description”:””,”caption”:””,”name”:”mona-lisa”,”status”:”inherit”,”uploaded_to”:118880,”date”:”2022-09-19 14:14:29″,”modified”:”2022-09-19 14:14:29″,”menu_order”:0,”mime_type”:”image\/jpeg”,”type”:”image”,”subtype”:”jpeg”,”icon”:”https:\/\/api.quantamagazine.org\/wp-includes\/images\/media\/default.png”,”width”:900,”height”:603,”sizes”:”thumbnail”:”https:\/\/d2r55xnwy6nx47.cloudfront.net\/uploads\/2022\/09\/Mona-Lisa-520×348.jpg”,”thumbnail-width”:520,”thumbnail-height”:348,”medium”:”https:\/\/d2r55xnwy6nx47.cloudfront.net\/uploads\/2022\/09\/Mona-Lisa.jpg”,”medium-width”:900,”medium-height”:603,”medium_large”:”https:\/\/d2r55xnwy6nx47.cloudfront.net\/uploads\/2022\/09\/Mona-Lisa-768×515.jpg”,”medium_large-width”:768,”medium_large-height”:515,”large”:”https:\/\/d2r55xnwy6nx47.cloudfront.net\/uploads\/2022\/09\/Mona-Lisa.jpg”,”large-width”:900,”large-height”:603,”1536×1536″:”https:\/\/d2r55xnwy6nx47.cloudfront.net\/uploads\/2022\/09\/Mona-Lisa.jpg”,”1536×1536-width”:900,”1536×1536-height”:603,”2048×2048″:”https:\/\/d2r55xnwy6nx47.cloudfront.net\/uploads\/2022\/09\/Mona-Lisa.jpg”,”2048×2048-width”:900,”2048×2048-height”:603,”square_small”:”https:\/\/d2r55xnwy6nx47.cloudfront.net\/uploads\/2022\/09\/Mona-Lisa-160×160.jpg”,”square_small-width”:160,”square_small-height”:160,”square_large”:”https:\/\/d2r55xnwy6nx47.cloudfront.net\/uploads\/2022\/09\/Mona-Lisa-520×520.jpg”,”square_large-width”:520,”square_large-height”:520,”largeForPrint”:true,”externalLink”:””,”original_resolution”:falseu003c/script>u003c/div>nu003cp>But Reed-Solomon codes also have an important constraint. They’re constructed in such a way that you can only evaluate your polynomial at a fixed (and usually relatively small) set of values. That is, you’re limited to using a certain set of numbers to encode your message. The size of that set, or alphabet, in turn restricts the length of the messages you can send — and the bigger you try to make your alphabet, the more computational power you’ll need to decode those messages.u003c/p>nu003cp>And so mathematicians sought an even more optimal code.u003c/p>nu003ch2>u003cstrong>Future Codesu003c/strong>u003c/h2>nu003cp>A more general, more powerful code would allow you to store or send longer messages without needing to increase the size of your alphabet. To do this, mathematicians devised codes that involve interpolating a function — which lives in a special space associated to a more complicated curve — through given points on that curve. These so-called algebraic geometry codes “came out of nowhere, and they’re better than any other code we know how to make [with a smaller alphabet],” Kopparty said. “This beats everything. It was a real shock.”u003c/p>nu003cdiv id=’component-632912049fd6d’ class=”related-list”>u003cscript type=”text/template”>”type”:”LinkList”,”id”:”component-632912049fd6d”,”data”:”title”:”Related:”,”class”:”related-list”,”links”:[“type”:”internal”,”link”:”https:\/\/www.quantamagazine.org\/old-problem-about-algebraic-curves-falls-to-young-mathematicians-20220825\/”,”title”:”Old Problem About Mathematical Curves Falls to Young Couple”,”type”:”internal”,”link”:”https:\/\/www.quantamagazine.org\/how-claude-shannons-concept-of-entropy-quantifies-information-20220906\/”,”title”:”How Shannon Entropy Imposes Fundamental Limits on Communication”,”type”:”internal”,”link”:”https:\/\/www.quantamagazine.org\/post-quantum-cryptography-scheme-is-cracked-on-a-laptop-20220824\/”,”title”:”\u2018Post-Quantum\u2019 Cryptography Scheme Is Cracked on a Laptop”]u003c/script>u003c/div>nu003cp>There’s just one problem. In practice, implementing a Reed-Solomon code is much, much easier than implementing an algebraic geometry code. “This is state-of-the-art, but it’s still under investigation to really turn into something practical,” said the cryptologist u003ca href=” Abelardu003c/a>. “It involves quite abstract mathematics, and it’s hard to handle these codes on a computer.”u003c/p>nu003cp>For now, that’s not worrisome: In real-world applications, Reed-Solomon codes and related forms of error correction are sufficient. But that might not always be the case. For instance, if powerful quantum computers become available in the future, they’ll be able to u003ca href=” today’s cryptography protocolsu003c/a>. As a result, researchers have been searching for schemes that can resist quantum attacks. One top contender for such schemes would require something stronger than Reed-Solomon codes. Certain versions of algebraic geometry codes might just work. Other researchers are hopeful about the role algebraic geometry codes might play in cloud computing.u003c/p>nu003cp>But even in the absence of such potential uses, “in the history of mathematics, sometimes you discover new things that really don’t have applications nowadays,” said u003ca href=” Berardiniu003c/a>, a researcher at Eindhoven University of Technology in the Netherlands who works on algebraic geometry codes. “But then after 50 years, you find that it might be useful for something completely unexpected” — just like the ancient problem of interpolation itself.u003c/p>n”,”fadein”:false,”__typename”:”ACFContent”},”$Post:118880.acf.series”:”name”:null,”link”:null,”__typename”:”Term”,”$Post:118880.next.data.0″:”title”:”Chaos Researchers Can Now Predict Perilous Points of No Return”,”link”:”https://www.quantamagazine.org/ai-algorithm-foresees-chaotic-tipping-points-20220915/”,”categories”:[“type”:”id”,”generated”:true,”id”:”$Post:118880.next.data.0.categories.0″,”typename”:”Term”,”type”:”id”,”generated”:true,”id”:”$Post:118880.next.data.0.categories.1″,”typename”:”Term”,”type”:”id”,”generated”:true,”id”:”$Post:118880.next.data.0.categories.2″,”typename”:”Term”],”featured_media_image”:null,”acf”:”type”:”id”,”generated”:true,”id”:”$Post:118880.next.data.0.acf”,”typename”:”ACFFields”,”__typename”:”Post”,”$Post:118880.next.data.0.categories.0″:”slug”:”abstractions”,”__typename”:”Term”,”$Post:118880.next.data.0.categories.1″:”slug”:”computer-science”,”__typename”:”Term”,”$Post:118880.next.data.0.categories.2″:”slug”:”physics”,”__typename”:”Term”,”$Post:118880.next.data.0.acf”:”template”:”article”,”featured_block_title”:””,”featured_image_gif”:false,”featured_image_default”:”type”:”id”,”generated”:true,”id”:”$Post:118880.next.data.0.acf.featured_image_default”,”typename”:”Image”,”featured_image_full_width”:”type”:”id”,”generated”:true,”id”:”$Post:118880.next.data.0.acf.featured_image_full_width”,”typename”:”Image”,”__typename”:”ACFFields”,”$Post:118880.next.data.0.acf.featured_image_default”:”alt”:”A video of a large chunk of ice breaking off of a glacier and crashing into the ocean.]”,”caption”:””,”url”:” video of a large chunk of ice breaking off of a glacier and crashing into the ocean.]”,”caption”:””,”url”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/09/Predicting-Tipping-Points_2880x1220_HP-scaled.jpg”,”width”:2560,”height”:1084,”sizes”:”type”:”id”,”generated”:true,”id”:”$Post:118880.next.data.0.acf.featured_image_full_width.sizes”,”typename”:”ImageSizes”,”__typename”:”Image”,”$Post:118880.next.data.0.acf.featured_image_full_width.sizes”:”thumbnail”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/09/Predicting-Tipping-Points_2880x1220_HP-520×220.jpg”,”square_small”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/09/Predicting-Tipping-Points_2880x1220_HP-160×160.jpg”,”square_large”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/09/Predicting-Tipping-Points_2880x1220_HP-520×520.jpg”,”medium”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/09/Predicting-Tipping-Points_2880x1220_HP-1720×729.jpg”,”medium_large”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/09/Predicting-Tipping-Points_2880x1220_HP-768×325.jpg”,”large”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/09/Predicting-Tipping-Points_2880x1220_HP-scaled.jpg”,”__typename”:”ImageSizes”,”$Post:118880.next”:”data”:[“type”:”id”,”generated”:true,”id”:”$Post:118880.next.data.0″,”typename”:”Post”],”__typename”:”PostPageArchive”}n”,”settings”:{“socialLinks”:[“type”:”facebook”,”label”:”Facebook”,”url”:”https://www.facebook.com/QuantaNews”,”__typename”:”SocialMediaLink”,”type”:”twitter”,”label”:”Twitter”,”url”:”https://twitter.com/QuantaMagazine”,”__typename”:”SocialMediaLink”,”type”:”youtube”,”label”:”YouTube”,”url”:”https://www.youtube.com/c/QuantaScienceChannel”,”__typename”:”SocialMediaLink”,”type”:”instagram”,”label”:”Instagram”,”url”:”https://instagram.com/quantamag”,”__typename”:”SocialMediaLink”,”type”:”rss”,”label”:”RSS”,”url”:”https://api.quantamagazine.org/feed/”,”__typename”:”SocialMediaLink”],”newsletterAction”:”https://quantamagazine.us1.list-manage.com/subscribe/post?u=0d6ddf7dc1a0b7297c8e06618&id=f0cb61321c”,”newsletterUrl”:”http://us1.campaign-archive2.com/home/?u=0d6ddf7dc1a0b7297c8e06618&id=f0cb61321c”,”sfNotice”:”An editorially independent publication supported by the Simons Foundation.”,”commentsHeader”:”

n”,”channels”:[{“title”:”The Joy of Why”,”slug”:”the-joy-of-why”,”description”:”The mathematician and author Steven Strogatz interviews leading researchers about the great scientific and mathematical questions of our time.”,”featured_image”:”alt”:””,”caption”:””,”url”:” Science Podcast”,”slug”:”podcast”,”description”:”Susan Valot narrates in-depth news episodes based on Quanta Magazine‘s articles about mathematics, physics, biology and computer science. “,”featured_image”:”alt”:””,”caption”:””,”url”:” Joy of x”,”slug”:”the-joy-of-x”,”description”:”The acclaimed mathematician and author Steven Strogatz interviews some of the world’s leading scientists about their lives and work.”,”featured_image”:”alt”:””,”caption”:””,”url”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/03/JoX_Spheres_1920x1080-1.jpg”,”width”:1920,”height”:1080,”sizes”:”thumbnail”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/03/JoX_Spheres_1920x1080-1-520×293.jpg”,”square_small”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/03/JoX_Spheres_1920x1080-1-160×160.jpg”,”square_large”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/03/JoX_Spheres_1920x1080-1-520×520.jpg”,”medium”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/03/JoX_Spheres_1920x1080-1-1720×968.jpg”,”medium_large”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/03/JoX_Spheres_1920x1080-1-768×432.jpg”,”large”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/03/JoX_Spheres_1920x1080-1.jpg”,”__typename”:”ImageSizes”,”__typename”:”Image”,”square_image”:”alt”:””,”caption”:””,”url”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/03/JofX_podcast_logo-NEW-600.jpg”,”width”:600,”height”:600,”sizes”:”thumbnail”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/03/JofX_podcast_logo-NEW-600-520×520.jpg”,”square_small”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/03/JofX_podcast_logo-NEW-600-160×160.jpg”,”square_large”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/03/JofX_podcast_logo-NEW-600-520×520.jpg”,”medium”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/03/JofX_podcast_logo-NEW-600.jpg”,”medium_large”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/03/JofX_podcast_logo-NEW-600.jpg”,”large”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/03/JofX_podcast_logo-NEW-600.jpg”,”__typename”:”ImageSizes”,”__typename”:”Image”,”subscribe_itunes_link”:”https://podcasts.apple.com/us/podcast/the-joy-of-x/id1495067186″,”subscribe_spotify_link”:”https://open.spotify.com/show/5HcCtKPH5gnOjRiMtTdC07?si=lFzCzat9QfuPU3hWuYibxQ”,”subscribe_android_link”:”https://podcasts.google.com/feed/aHR0cHM6Ly9hcGkucXVhbnRhbWFnYXppbmUub3JnL2ZlZWQvdGhlLWpveS1vZi14Lw”,”subscribe_stitcher_link”:”https://www.stitcher.com/podcast/the-joy-of-x”,”__typename”:”Channel”],”popularSearches”:[“term”:”math”,”label”:”Mathematics”,”__typename”:”PopularSearch”,”term”:”physics”,”label”:”Physics”,”__typename”:”PopularSearch”,”term”:”black holes”,”label”:”Black Holes”,”__typename”:”PopularSearch”,”term”:”evolution”,”label”:”Evolution”,”__typename”:”PopularSearch”],”searchTopics”:[“type”:”Tag”,”label”:”Podcasts”,”tag”:”name”:”podcast”,”slug”:”podcast”,”term_id”:”552″,”__typename”:”Term”,”category”:”name”:null,”slug”:null,”term_id”:null,”__typename”:”Term”,”__typename”:”SearchTopic”,”type”:”Tag”,”label”:”Columns”,”tag”:”name”:”Quantized Columns”,”slug”:”quantized”,”term_id”:”551″,”__typename”:”Term”,”category”:”name”:null,”slug”:null,”term_id”:null,”__typename”:”Term”,”__typename”:”SearchTopic”,”type”:”Series”,”label”:”Series”,”tag”:”name”:null,”slug”:null,”term_id”:null,”__typename”:”Term”,”category”:”name”:null,”slug”:null,”term_id”:null,”__typename”:”Term”,”__typename”:”SearchTopic”,”type”:”Category”,”label”:”Interviews”,”tag”:”name”:”Q&A”,”slug”:”qa”,”term_id”:”567″,”__typename”:”Term”,”category”:”name”:”Q&A”,”slug”:”qa”,”term_id”:”176″,”__typename”:”Term”,”__typename”:”SearchTopic”,”type”:”Category”,”label”:”Multimedia”,”tag”:”name”:null,”slug”:null,”term_id”:null,”__typename”:”Term”,”category”:”name”:”Multimedia”,”slug”:”multimedia”,”term_id”:”43″,”__typename”:”Term”,”__typename”:”SearchTopic”,”type”:”Category”,”label”:”Puzzles”,”tag”:”name”:”puzzles”,”slug”:”puzzles”,”term_id”:”542″,”__typename”:”Term”,”category”:”name”:”Puzzles”,”slug”:”puzzles”,”term_id”:”546″,”__typename”:”Term”,”__typename”:”SearchTopic”,”type”:”Category”,”label”:”Blog Posts”,”tag”:”name”:null,”slug”:null,”term_id”:null,”__typename”:”Term”,”category”:”name”:”Abstractions blog”,”slug”:”abstractions”,”term_id”:”619″,”__typename”:”Term”,”__typename”:”SearchTopic”,”type”:”news”,”label”:”News Articles”,”tag”:”name”:null,”slug”:null,”term_id”:null,”__typename”:”Term”,”category”:”name”:null,”slug”:null,”term_id”:null,”__typename”:”Term”,”__typename”:”SearchTopic”,”type”:”videos”,”label”:”Videos”,”tag”:”name”:null,”slug”:null,”term_id”:null,”__typename”:”Term”,”category”:”name”:null,”slug”:null,”term_id”:null,”__typename”:”Term”,”__typename”:”SearchTopic”],”searchSections”:[“name”:”Mathematics”,”slug”:”mathematics”,”term_id”:”188″,”__typename”:”Term”,”name”:”Physics”,”slug”:”physics”,”term_id”:”189″,”__typename”:”Term”,”name”:”Biology”,”slug”:”biology”,”term_id”:”191″,”__typename”:”Term”,”name”:”Computer Science”,”slug”:”computer-science”,”term_id”:”190″,”__typename”:”Term”],”searchAuthors”:[“id”:”38171″,”name”:”Adam Becker”,”__typename”:”AuthorList”,”id”:”28087″,”name”:”Adam Mann”,”__typename”:”AuthorList”,”id”:”29794″,”name”:”Alex Kontorovich”,”__typename”:”AuthorList”,”id”:”39302″,”name”:”Alexander Hellemans”,”__typename”:”AuthorList”,”id”:”56″,”name”:”Alla Katsnelson”,”__typename”:”AuthorList”,”id”:”29458″,”name”:”Allison Whitten”,”__typename”:”AuthorList”,”id”:”73″,”name”:”Amanda Gefter”,”__typename”:”AuthorList”,”id”:”39164″,”name”:”Ana Kova”,”__typename”:”AuthorList”,”id”:”59″,”name”:”Andreas von Bubnoff”,”__typename”:”AuthorList”,”id”:”8728″,”name”:”Anil Ananthaswamy”,”__typename”:”AuthorList”,”id”:”11648″,”name”:”Ann Finkbeiner”,”__typename”:”AuthorList”,”id”:”42689″,”name”:”Annie Melchor”,”__typename”:”AuthorList”,”id”:”95″,”name”:”Ariel Bleicher”,”__typename”:”AuthorList”,”id”:”15493″,”name”:”Ashley Smart”,”__typename”:”AuthorList”,”id”:”450″,”name”:”Ashley Yeager”,”__typename”:”AuthorList”,”id”:”36490″,”name”:”Ben Brubaker”,”__typename”:”AuthorList”,”id”:”16315″,”name”:”Bill Andrews”,”__typename”:”AuthorList”,”id”:”2752″,”name”:”Bob Henderson”,”__typename”:”AuthorList”,”id”:”15492″,”name”:”Brendan Z. Foster”,”__typename”:”AuthorList”,”id”:”68″,”name”:”Brooke Borel”,”__typename”:”AuthorList”,”id”:”62″,”name”:”Carl Zimmer”,”__typename”:”AuthorList”,”id”:”13684″,”name”:”Caroline Lee”,”__typename”:”AuthorList”,”id”:”13691″,”name”:”Caroline Lee”,”__typename”:”AuthorList”,”id”:”50″,”name”:”Carrie Arnold”,”__typename”:”AuthorList”,”id”:”15142″,”name”:”Chanda Prescod-Weinstein”,”__typename”:”AuthorList”,”id”:”8084″,”name”:”Charlie Wood”,”__typename”:”AuthorList”,”id”:”742″,”name”:”Christie Wilcox”,”__typename”:”AuthorList”,”id”:”11543″,”name”:”Claudia Dreifus”,”__typename”:”AuthorList”,”id”:”57″,”name”:”Courtney Humphries”,”__typename”:”AuthorList”,”id”:”7262″,”name”:”Dalmeet Singh Chawla”,”__typename”:”AuthorList”,”id”:”70″,”name”:”Dan Falk”,”__typename”:”AuthorList”,”id”:”19918″,”name”:”Dana Najjar”,”__typename”:”AuthorList”,”id”:”13695″,”name”:”Daniel Garisto”,”__typename”:”AuthorList”,”id”:”32676″,”name”:”Daniel S. Freed”,”__typename”:”AuthorList”,”id”:”13724″,”name”:”David H. Freedman”,”__typename”:”AuthorList”,”id”:”26310″,”name”:”David S. Richeson”,”__typename”:”AuthorList”,”id”:”30207″,”name”:”David Tse”,”__typename”:”AuthorList”,”id”:”19266″,”name”:”Devin Powell”,”__typename”:”AuthorList”,”id”:”13251″,”name”:”Diana Kwon”,”__typename”:”AuthorList”,”id”:”17000″,”name”:”Elena Renken”,”__typename”:”AuthorList”,”id”:”17149″,”name”:”Elizabeth Landau”,”__typename”:”AuthorList”,”id”:”5279″,”name”:”Elizabeth Preston”,”__typename”:”AuthorList”,”id”:”58″,”name”:”Elizabeth Svoboda”,”__typename”:”AuthorList”,”id”:”32612″,”name”:”Ellen Horne”,”__typename”:”AuthorList”,”id”:”27534″,”name”:”Emily Buder”,”__typename”:”AuthorList”,”id”:”25173″,”name”:”Emily Levesque”,”__typename”:”AuthorList”,”id”:”64″,”name”:”Emily Singer”,”__typename”:”AuthorList”,”id”:”47″,”name”:”Erica Klarreich”,”__typename”:”AuthorList”,”id”:”14784″,”name”:”Erika K. Carlson”,”__typename”:”AuthorList”,”id”:”98″,”name”:”Esther Landhuis”,”__typename”:”AuthorList”,”id”:”5830″,”name”:”Eva Silverstein”,”__typename”:”AuthorList”,”id”:”6793″,”name”:”Evelyn Lamb”,”__typename”:”AuthorList”,”id”:”75″,”name”:”Ferris Jabr”,”__typename”:”AuthorList”,”id”:”52″,”name”:”Frank Wilczek”,”__typename”:”AuthorList”,”id”:”69″,”name”:”Gabriel Popkin”,”__typename”:”AuthorList”,”id”:”77″,”name”:”George Musser”,”__typename”:”AuthorList”,”id”:”19092″,”name”:”Grant Sanderson”,”__typename”:”AuthorList”,”id”:”20557″,”name”:”Howard Lee”,”__typename”:”AuthorList”,”id”:”66″,”name”:”Ingrid Daubechies”,”__typename”:”AuthorList”,”id”:”46418″,”name”:”Ingrid Wickelgren”,”__typename”:”AuthorList”,”id”:”85″,”name”:”Ivan Amato”,”__typename”:”AuthorList”,”id”:”37141″,”name”:”Jake Buehler”,”__typename”:”AuthorList”,”id”:”44758″,”name”:”James Dinneen”,”__typename”:”AuthorList”,”id”:”12170″,”name”:”Janna Levin”,”__typename”:”AuthorList”,”id”:”32″,”name”:”Jeanette Kazmierczak”,”__typename”:”AuthorList”,”id”:”51″,”name”:”Jennifer Ouellette”,”__typename”:”AuthorList”,”id”:”44787″,”name”:”Joanna Thompson”,”__typename”:”AuthorList”,”id”:”72″,”name”:”John Pavlus”,”__typename”:”AuthorList”,”id”:”16475″,”name”:”John Preskill”,”__typename”:”AuthorList”,”id”:”91″,”name”:”John Rennie”,”__typename”:”AuthorList”,”id”:”10351″,”name”:”Jonathan Lambert”,”__typename”:”AuthorList”,”id”:”31716″,”name”:”Jonathan O’Callaghan”,”__typename”:”AuthorList”,”id”:”1241″,”name”:”Jordana Cepelewicz”,”__typename”:”AuthorList”,”id”:”8463″,”name”:”Joshua Roebke”,”__typename”:”AuthorList”,”id”:”49″,”name”:”Joshua Sokol”,”__typename”:”AuthorList”,”id”:”16815″,”name”:”jye”,”__typename”:”AuthorList”,”id”:”67″,”name”:”K.C. Cole”,”__typename”:”AuthorList”,”id”:”37462″,”name”:”Karmela Padavic-Callaghan”,”__typename”:”AuthorList”,”id”:”87″,”name”:”Kat McGowan”,”__typename”:”AuthorList”,”id”:”36139″,”name”:”Katarina Zimmer”,”__typename”:”AuthorList”,”id”:”20556″,”name”:”Katherine Harmon Courage”,”__typename”:”AuthorList”,”id”:”90″,”name”:”Katia Moskvitch”,”__typename”:”AuthorList”,”id”:”39551″,”name”:”Katie McCormick”,”__typename”:”AuthorList”,”id”:”27374″,”name”:”Kelsey Houston-Edwards”,”__typename”:”AuthorList”,”id”:”40″,”name”:”Kevin Hartnett”,”__typename”:”AuthorList”,”id”:”45758″,”name”:”Kristina Armitage”,”__typename”:”AuthorList”,”id”:”38413″,”name”:”Lakshmi Chandrasekaran”,”__typename”:”AuthorList”,”id”:”12570″,”name”:”Laura Poppick”,”__typename”:”AuthorList”,”id”:”38699″,”name”:”Leila Sloman”,”__typename”:”AuthorList”,”id”:”23451″,”name”:”Liam Drew”,”__typename”:”AuthorList”,”id”:”79″,”name”:”Liz Kruesi”,”__typename”:”AuthorList”,”id”:”38″,”name”:”Lucy Reading-Ikkanda”,”__typename”:”AuthorList”,”id”:”60″,”name”:”Maggie McKee”,”__typename”:”AuthorList”,”id”:”2333″,”name”:”Mallory Locklear”,”__typename”:”AuthorList”,”id”:”3569″,”name”:”Marcus Woo”,”__typename”:”AuthorList”,”id”:”414″,”name”:”Mark Kim-Mulgrew”,”__typename”:”AuthorList”,”id”:”20495″,”name”:”Matt Carlstrom”,”__typename”:”AuthorList”,”id”:”17147″,”name”:”Matthew Hutson”,”__typename”:”AuthorList”,”id”:”30953″,”name”:”Max G. Levy”,”__typename”:”AuthorList”,”id”:”32437″,”name”:”Max Kozlov”,”__typename”:”AuthorList”,”id”:”38705″,”name”:”mcho”,”__typename”:”AuthorList”,”id”:”40613″,”name”:”Melanie Mitchell”,”__typename”:”AuthorList”,”id”:”7186″,”name”:”Melinda Wenner Moyer”,”__typename”:”AuthorList”,”id”:”14093″,”name”:”Michael Harris”,”__typename”:”AuthorList”,”id”:”34″,”name”:”Michael Kranz”,”__typename”:”AuthorList”,”id”:”23″,”name”:”Michael Moyer”,”__typename”:”AuthorList”,”id”:”74″,”name”:”Michael Nielsen”,”__typename”:”AuthorList”,”id”:”19093″,”name”:”Michele Bannister”,”__typename”:”AuthorList”,”id”:”1472″,”name”:”Moira Chas”,”__typename”:”AuthorList”,”id”:”6476″,”name”:”Monique Brouillette”,”__typename”:”AuthorList”,”id”:”42264″,”name”:”Mordechai Rorvig”,”__typename”:”AuthorList”,”id”:”10″,”name”:”Natalie Wolchover”,”__typename”:”AuthorList”,”id”:”37605″,”name”:”Nick Thieme”,”__typename”:”AuthorList”,”id”:”43298″,”name”:”Nicole Yunger Halpern”,”__typename”:”AuthorList”,”id”:”37428″,”name”:”Nima Arkani-Hamed”,”__typename”:”AuthorList”,”id”:”19962″,”name”:”Nola Taylor Redd”,”__typename”:”AuthorList”,”id”:”24″,”name”:”Olena Shmahalo”,”__typename”:”AuthorList”,”id”:”1816″,”name”:”Patrick Honner”,”__typename”:”AuthorList”,”id”:”84″,”name”:”Peter Byrne”,”__typename”:”AuthorList”,”id”:”55″,”name”:”Philip Ball”,”__typename”:”AuthorList”,”id”:”31″,”name”:”Pradeep Mutalik”,”__typename”:”AuthorList”,”id”:”24011″,”name”:”Puja Changoiwala”,”__typename”:”AuthorList”,”id”:”100″,”name”:”Quanta Magazine”,”__typename”:”AuthorList”,”id”:”2784″,”name”:”R. Douglas Fields”,”__typename”:”AuthorList”,”id”:”26114″,”name”:”Rachel Crowell”,”__typename”:”AuthorList”,”id”:”9412″,”name”:”Raleigh McElvery”,”__typename”:”AuthorList”,”id”:”820″,”name”:”Ramin Skibba”,”__typename”:”AuthorList”,”id”:”1666″,”name”:”Rebecca Boyle”,”__typename”:”AuthorList”,”id”:”20950″,”name”:”Richard Masland”,”__typename”:”AuthorList”,”id”:”48″,”name”:”Robbert Dijkgraaf”,”__typename”:”AuthorList”,”id”:”80″,”name”:”Roberta Kwok”,”__typename”:”AuthorList”,”id”:”15681″,”name”:”Robin George Andrews”,”__typename”:”AuthorList”,”id”:”24577″,”name”:”Rodrigo Pérez Ortega”,”__typename”:”AuthorList”,”id”:”78″,”name”:”Sabine Hossenfelder”,”__typename”:”AuthorList”,”id”:”23845″,”name”:”Samuel Velasco”,”__typename”:”AuthorList”,”id”:”83″,”name”:”Sarah Lewin”,”__typename”:”AuthorList”,”id”:”35441″,”name”:”Scott Aaronson”,”__typename”:”AuthorList”,”id”:”76″,”name”:”Sean B. Carroll”,”__typename”:”AuthorList”,”id”:”15680″,”name”:”Sean Carroll”,”__typename”:”AuthorList”,”id”:”7239″,”name”:”Shannon Hall”,”__typename”:”AuthorList”,”id”:”44197″,”name”:”Sheon Han”,”__typename”:”AuthorList”,”id”:”65″,”name”:”Siobhan Roberts”,”__typename”:”AuthorList”,”id”:”5944″,”name”:”Sophia Chen”,”__typename”:”AuthorList”,”id”:”61″,”name”:”Steph Yin”,”__typename”:”AuthorList”,”id”:”63″,”name”:”Stephanie Bucklin”,”__typename”:”AuthorList”,”id”:”26311″,”name”:”Stephanie DeMarco”,”__typename”:”AuthorList”,”id”:”71″,”name”:”Stephen Ornes”,”__typename”:”AuthorList”,”id”:”17148″,”name”:”Steve Nadis”,”__typename”:”AuthorList”,”id”:”13356″,”name”:”Steven Strogatz”,”__typename”:”AuthorList”,”id”:”17150″,”name”:”Susan D’Agostino”,”__typename”:”AuthorList”,”id”:”39768″,”name”:”Tamar Lichter Blanks”,”__typename”:”AuthorList”,”id”:”2960″,”name”:”Tara C. Smith”,”__typename”:”AuthorList”,”id”:”14785″,”name”:”Thomas Lewton”,”__typename”:”AuthorList”,”id”:”3″,”name”:”Thomas Lin”,”__typename”:”AuthorList”,”id”:”54″,”name”:”Tim Vernimmen”,”__typename”:”AuthorList”,”id”:”88″,”name”:”Tom Siegfried”,”__typename”:”AuthorList”,”id”:”12964″,”name”:”Vanessa Schipani”,”__typename”:”AuthorList”,”id”:”53″,”name”:”Veronique Greenwood”,”__typename”:”AuthorList”,”id”:”86″,”name”:”Virginia Hughes”,”__typename”:”AuthorList”,”id”:”3244″,”name”:”Viviane Callier”,”__typename”:”AuthorList”,”id”:”89″,”name”:”Wynne Parry”,”__typename”:”AuthorList”,”id”:”15913″,”name”:”XiaoZhi Lim”,”__typename”:”AuthorList”,”id”:”42263″,”name”:”Yasemin Saplakoglu”,”__typename”:”AuthorList”,”id”:”45757″,”name”:”Zack Savitsky”,”__typename”:”AuthorList”],”adBehavior”:”everywhere”,”adUrl”:” and Learn “,”adImageHome”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/02/Youtube_Web-Default_260.jpg”,”adImageArticle”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/02/Youtube_Article_160.jpg”,”adImageTablet”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/02/Youtube_Tablet_890.jpg”,”adImageMobile”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2022/02/Youtube_Web-Default_260.jpg”,”trackingScripts”:”rnrnrnrnrnrnrnrn”,”theme”:”page”:”accent”:”#ff8600″,”text”:”#1a1a1a”,”background”:”white”,”header”:”type”:”default”,”gradient”:”color”:”white”,”solid”:”primary”:”#1a1a1a”,”secondary”:”#999999″,”hover”:”#ff8600″,”transparent”:”primary”:”white”,”secondary”:”white”,”hover”:”#ff8600″,”redirect”:null,”fallbackImage”:”alt”:””,”caption”:””,”url”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2017/04/default.gif”,”width”:1200,”height”:600,”sizes”:”thumbnail”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2017/04/default-520×260.gif”,”square_small”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2017/04/default-160×160.gif”,”square_large”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2017/04/default-520×520.gif”,”medium”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2017/04/default.gif”,”medium_large”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2017/04/default-768×384.gif”,”large”:”https://d2r55xnwy6nx47.cloudfront.net/uploads/2017/04/default.gif”,”__typename”:”ImageSizes”,”__typename”:”Image”},”modals”:”loginModal”:false,”signUpModal”:false,”forgotPasswordModal”:false,”resetPasswordModal”:false,”lightboxModal”:false,”callback”:null,”props”:null,”podcast”:”id”:null,”playing”:false,”duration”:0,”currentTime”:0,”user”:”loggedIn”:false,”savedArticleIDs”:[],”userEmail”:””,”editor”:false,”comments”:”open”:false,”cookies”:”acceptedCookie”:false},
env:
APP_URL: ‘
NODE_ENV: ‘production’,
WP_URL: ‘
HAS_GOOGLE_ID: true,
HAS_FACEBOOK_ID: true,
,
}

We would love to say thanks to the author of this article for this remarkable web content

How Mathematical Curves Power Cryptography | Quanta Magazine

You can view our social media profiles here , as well as other pages related to them here.https://paw6.info/related-pages/