China Cancels Encryption

Chinese scientists claim they have devised an algorithm that could crack a very hard encryption nut, i.e. 2048-bit RSA, using a 372-qubit quantum computer. Their algorithm goes beyond one first authored in the 1990’s, which is the theoretical basis of quantum computing’s decryption capability, by using still another algorithm developed by German mathematician Claus-Peter Schnorr.

In 2022, Schnorr said it was possible to factor large numbers more efficiently than the previous algorithm and that these could be so efficient that you could break the RSA code, even with a classical computer.

Now, Chinese scientists have published a paper apparently explaining how a combination of classical and quantum computing techniques, plus a powerful enough quantum computer, could shred modern-day encryption. 
This potential break-through would threaten not only much US military and intelligence-community communication but also financial transactions and even your own text messages. 

One quantum technology expert said simply “If it's true, it's pretty disastrous.” However this potential break-through may not be all it’s cracked up to be.  The Chinese paper “Factoring integers with sublinear resources on a super conducting quantum processor,” is currently under peer review. It claims to have found a way to use a 372-qubit quantum computer to factor the 2,048-bit numbers of in the RSA encryption system used by institutions from militaries to banks to communication app makers. 

One reason that is important is is because quantum experts believed that it would require a far larger quantum computer to break RSA encryption, particularly as IBM already has a 433-qubit quantum processor.

The Chinese researchers claim to have achieved this feat by using a quantum computer to scale up a classical factoring algorithm developed by Claus Peter Schnoor. “We estimate that a quantum circuit with 372 physical qubits and a depth of thousands is necessary to challenge RSA-2048 using our algorithm. Our study shows great promise in expediting the application of current noisy quantum computers, and paves the way to factor large integers of realistic cryptographic significance,” they wrote.

However, Lawrence Gasman, founder and president of Inside Quantum Technology says he’s  sceptical of these claims, but  that  “It's enormously important that some people in the West come to some real conclusions on this because if it's true, it's pretty disastrous.” 

Gasman says that the paper’s most alarming aspect is the idea that it might be possible to break key encryption protocols not with a hypothetical future quantum computer but a relatively simple one that could already exist, or exist soon. “If you look at the roadmaps that the major quantum computer companies are putting out there, talking about getting to a machine of the power that the Chinese are talking about, frankly, I don't know. 
“But you know, this year, next year, very soon. And having said that, I tend to be a believer that there's going to happen soon.”

Andersen Chengwho is CEO of next-generation encryption firm Post-Quantum, commented: “The general consensus is that ... these claims cannot be proven to work there is no definitive evidence that the Chinese algorithm cannot be successfully scaled up either.... Even if this algorithm doesn’t work, a sufficiently powerful quantum computer... will one day be designed, it is purely an issue of engineering and scaling the current generation of quantum computers.”

The US government has become increasingly concerned about how quickly key encryption standards could become obsolete in the face of a real quantum breakthrough. Last May, the White House told federal agencies to move quickly toward quantum-safe encryption in their operations. 

Whether or not these doubts are justified, it seems only a matter of time until the first Cryptographically Relevant Quantum Computer with sufficiently power will be created - presenting "a silent but seismic shift"  - according to Andersen.

In anticipation of this event,  companies and institutions need to accelerate adoption of quantum-safe solutions, to safeguard the long-term integrity of their data and network security.

Shijie Wei/ Tsinghua University:     The White House:      Forbes:    DefenseOne:   Medium:    Inside Quantum:

Post-Quantum:     Reuters:      Basic Mathematics:      Image: Unsplash

You Might Also Read

Quantum Computing  - Its Background & Future:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« CSPM: Trends & Predictions For 2024
Might AI Influence Big Elections In 2024? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Guardtime

Guardtime

Guardtime's Black Lantern platform provides real-time cybersecurity and data-centric asset protection.

Australian Cyber Security Growth Network (AustCyber)

Australian Cyber Security Growth Network (AustCyber)

AustCyber brings together businesses and researchers to develop the next generation of cyber security products and services.

Be Cyber Aware At Sea

Be Cyber Aware At Sea

Be Cyber Aware At Sea is a global maritime and offshore industry initiative to raise awareness and educate crew members and the offshore workforce.

inBay Technologies

inBay Technologies

inBay Technologies' idQ Trust as a Service (TaaS) is a unique and innovative SaaS that eliminates the need for user names and passwords.

ReversingLabs

ReversingLabs

ReversingLabs develops cyber threat detection and mitigation tools that address the the latest directed attacks, advanced persistent threats and polymorphic malware.

bwtech@UMBC

bwtech@UMBC

The bwtech@UMBC Cyber Incubator is an innovative business incubation program that delivers business and technical support to start-up and early-stage cybersecurity/IT products and services companies.

ExpressVPN

ExpressVPN

ExpressVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

SenseOn

SenseOn

SenseOn’s multiple threat-detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps that single point solutions create.

Quest Software

Quest Software

Simple IT management for a complex world. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

Global Lifecycle Solutions EMEA (Global EMEA)

Global Lifecycle Solutions EMEA (Global EMEA)

Global EMEA provides full lifecycle services to corporate Clients covering procurement, configuration, support, maintenance and end-of-life asset management.

Intrinium

Intrinium

Intrinium is an Information Technology and Security Solutions company, providing comprehensive consulting and managed services to businesses of all sizes.

HancomWITH

HancomWITH

Hancomwith is an information security company. We provide optimized blockchain solutions in areas including next-generation authentication, security and digital asset transaction.

Campus cyber

Campus cyber

A project initiated by the President of the Republic, the Cyber Campus is the totem site of cybersecurity that brings together the main national and international players in the field.

CloudWave

CloudWave

CloudWave, the expert in healthcare data security, provides cloud, cybersecurity, and managed services to healthcare organizations.

InnovateHer

InnovateHer

At InnovateHer, our vision is to make the tech sector more equitable, by increasing diversity across the spectrum and creating more inclusive workplaces.

LEPHISH

LEPHISH

LePhish is a French cybersecurity solution specializing in automated phishing campaigns.