Breaking Math Podcast cover art

Breaking Math Podcast

Breaking Math Podcast

By: Gabriel Hesch and Autumn Phaneuf
Listen for free

About this listen

Hosted by Gabriel Hesch and Autumn Phaneuf, who have advanced degrees in electrical engineering and industrial engineering/operations research respectively, come together to discuss mathematics as a pure field all in its own as well as how it describes the language of science, engineering, and even creativity.

Breaking Math brings you the absolute best in interdisciplinary science discussions - bringing together experts in varying fields including artificial intelligence, neuroscience, evolutionary biology, physics, chemistry and materials-science, and more - to discuss where humanity is headed.

website: breakingmath.io

linktree: linktree.com/breakingmathmedia

email: breakingmathpodcast@gmail.com

Copyright Breaking Math
Mathematics Science
Episodes
  • Random Shuffle Isn't Random At All
    Jul 8 2025

    In this episode, we explore the intricate mathematics behind Sp0tify's (ok... and other's) shuffle feature, revealing how it is designed to feel random while actually being carefully curated. We discuss the psychological implications of randomness, the Fisher-Yates shuffle algorithm, and how engineers have created a system that respects human perception of randomness. The conversation delves into the philosophical aspects of curated randomness and the broader implications of mathematical principles in technology and human experience.

    Takeaways

    • The shuffle feature is not truly random.
    • Humans struggle to recognize true randomness due to cognitive biases.
    • The Fisher-Yates shuffle algorithm is a standard for randomization.
    • Uses psychological techniques to enhance user satisfaction with shuffle.
    • Dithering is a method used to create a perception of randomness.
    • Shuffle feature analyzes multiple dimensions to optimize song selection.
    • The algorithm incorporates noise to maintain unpredictability.
    • Curated randomness is prevalent in various technologies beyond music.
    • Humans prefer sequences with fewer clusters to feel more random.
    • Mathematics can reveal insights into human behavior and preferences.

    Chapters

    00:00 The Hidden Mathematics of Spotify Shuffle

    05:56 The Art of Psychological Randomness

    07:58 Philosophical Implications of Curated Randomness

    Subscribe to Breaking Math wherever you get your podcasts.

    Become a patron of Breaking Math for as little as a buck a month

    Follow Breaking Math on Twitter, Instagram, LinkedIn, Website, YouTube, TikTok

    Follow Autumn on Twitter and Instagram

    Become a guest here

    email: breakingmathpodcast@gmail.com


    Show More Show Less
    8 mins
  • What is Cryptography?
    Jun 24 2025

    This conversation delves into the intersection of quantum computing and cryptography, focusing on the implications of quantum computers for current encryption methods and the necessity for post-quantum cryptography. Dr. Dustin Moody from NIST discusses the threats posed by quantum computing, particularly through Shor's algorithm, and the ongoing efforts to develop new cryptographic standards that can withstand these threats. The discussion also covers the role of NIST in standardizing post-quantum algorithms, the mathematical challenges involved, and the importance of preparing businesses for the transition to these new systems.

    All opinions are of the individual scientist and do not reflect the opinions of NIST or the federal Government.

    Takeaways

    • Quantum computers harness principles of quantum physics for computation.
    • Shor's algorithm can efficiently factor large numbers, threatening RSA encryption.
    • Post-quantum cryptography aims to develop algorithms resistant to quantum attacks.
    • NIST is leading the effort to standardize post-quantum cryptographic algorithms.
    • Lattice-based algorithms are promising for post-quantum cryptography due to their efficiency.
    • Businesses must be proactive in transitioning to post-quantum cryptography.
    • The Harvest Now, Decrypt Later threat highlights the urgency of transitioning.
    • Quantum key distribution offers theoretically perfect security.
    • Different cryptographic algorithms are needed for various applications and devices.
    • The future of cryptography will rely on new mathematical challenges to ensure security.

    Keywords

    quantum computing, cryptography, post-quantum cryptography, NIST, cybersecurity, Shor's algorithm, digital signatures, lattice-based algorithms, encryption, quantum threats

    Subscribe to Breaking Math wherever you get your podcasts.

    Become a patron of Breaking Math for as little as a buck a month

    Follow Breaking Math on Twitter, Instagram, LinkedIn, Website, YouTube, TikTok

    Follow Autumn on Twitter and Instagram

    Become a guest here

    email: breakingmathpodcast@gmail.com

    Show More Show Less
    41 mins

What listeners say about Breaking Math Podcast

Average Customer Ratings

Reviews - Please select the tabs below to change the source of reviews.

In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.