China Cancels Encryption

Chinese scientists claim they have devised an algorithm that could crack a very hard encryption nut, i.e. 2048-bit RSA, using a 372-qubit quantum computer. Their algorithm goes beyond one first authored in the 1990’s, which is the theoretical basis of quantum computing’s decryption capability, by using still another algorithm developed by German mathematician Claus-Peter Schnorr.

In 2022, Schnorr said it was possible to factor large numbers more efficiently than the previous algorithm and that these could be so efficient that you could break the RSA code, even with a classical computer.

Now, Chinese scientists have published a paper apparently explaining how a combination of classical and quantum computing techniques, plus a powerful enough quantum computer, could shred modern-day encryption. 
This potential break-through would threaten not only much US military and intelligence-community communication but also financial transactions and even your own text messages. 

One quantum technology expert said simply “If it's true, it's pretty disastrous.” However this potential break-through may not be all it’s cracked up to be.  The Chinese paper “Factoring integers with sublinear resources on a super conducting quantum processor,” is currently under peer review. It claims to have found a way to use a 372-qubit quantum computer to factor the 2,048-bit numbers of in the RSA encryption system used by institutions from militaries to banks to communication app makers. 

One reason that is important is is because quantum experts believed that it would require a far larger quantum computer to break RSA encryption, particularly as IBM already has a 433-qubit quantum processor.

The Chinese researchers claim to have achieved this feat by using a quantum computer to scale up a classical factoring algorithm developed by Claus Peter Schnoor. “We estimate that a quantum circuit with 372 physical qubits and a depth of thousands is necessary to challenge RSA-2048 using our algorithm. Our study shows great promise in expediting the application of current noisy quantum computers, and paves the way to factor large integers of realistic cryptographic significance,” they wrote.

However, Lawrence Gasman, founder and president of Inside Quantum Technology says he’s  sceptical of these claims, but  that  “It's enormously important that some people in the West come to some real conclusions on this because if it's true, it's pretty disastrous.” 

Gasman says that the paper’s most alarming aspect is the idea that it might be possible to break key encryption protocols not with a hypothetical future quantum computer but a relatively simple one that could already exist, or exist soon. “If you look at the roadmaps that the major quantum computer companies are putting out there, talking about getting to a machine of the power that the Chinese are talking about, frankly, I don't know. 
“But you know, this year, next year, very soon. And having said that, I tend to be a believer that there's going to happen soon.”

Andersen Chengwho is CEO of next-generation encryption firm Post-Quantum, commented: “The general consensus is that ... these claims cannot be proven to work there is no definitive evidence that the Chinese algorithm cannot be successfully scaled up either.... Even if this algorithm doesn’t work, a sufficiently powerful quantum computer... will one day be designed, it is purely an issue of engineering and scaling the current generation of quantum computers.”

The US government has become increasingly concerned about how quickly key encryption standards could become obsolete in the face of a real quantum breakthrough. Last May, the White House told federal agencies to move quickly toward quantum-safe encryption in their operations. 

Whether or not these doubts are justified, it seems only a matter of time until the first Cryptographically Relevant Quantum Computer with sufficiently power will be created - presenting "a silent but seismic shift"  - according to Andersen.

In anticipation of this event,  companies and institutions need to accelerate adoption of quantum-safe solutions, to safeguard the long-term integrity of their data and network security.

Shijie Wei/ Tsinghua University:     The White House:      Forbes:    DefenseOne:   Medium:    Inside Quantum:

Post-Quantum:     Reuters:      Basic Mathematics:      Image: Unsplash

You Might Also Read

Quantum Computing  - Its Background & Future:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« CSPM: Trends & Predictions For 2024
Might AI Influence Big Elections In 2024? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Zentek Digital Investigations

Zentek Digital Investigations

Zentek has been providing digital forensics services to the public and private sector for computers and mobile devices since 2004.

BackBox Software

BackBox Software

BackBox is a leading provider of solutions for automated backup and recovery software for security and network devices.

IoT European Research Cluster (IERC)

IoT European Research Cluster (IERC)

IERC brings together EU-funded projects with the aim of defining a common vision for IoT technology and development research challenges.

Precise Biometrics

Precise Biometrics

Precise Biometrics develop and sell fingerprint software for convenient and secure authentication of people’s identity in mobile devices, smart cards and other products with fingerprint sensors.

ATIS Systems

ATIS Systems

ATIS Systems offers first-class complete solutions for legal interception, mediation, data retention, and IT forensics.

SaltStack

SaltStack

SaltStack develops award-winning intelligent IT automation software. We help businesses more efficiently secure and manage all aspects of their digital infrastructure.

EMnify

EMnify

EMnify is a Software-as-a-Service (SaaS) company, revolutionizing cellular Internet of Things (IoT).

Casque SNR

Casque SNR

CASQUE SNR is the next generation of Identity Assurance that has potential to supersede existing solutions. It provides Identity Assurance for both people and things.

MassMutual Ventures

MassMutual Ventures

Mass Mutual ventures backs companies building category-defining businesses in markets including enterprise software, digital health, cybersecurity, and fintech.

Gridware

Gridware

Gridware is a specialised cybersecurity consultancy firm and an emerging global player in the cybersecurity intelligence and advisory field.

CrossCountry Consulting

CrossCountry Consulting

CrossCountry Consulting is a trusted business advisory firm that provides customized finance, accounting, human capital management, risk, operations and technology consulting services.

Insight Enterprises

Insight Enterprises

Insight is a leading solutions integrator, helping you navigate today’s ever-changing business environment with teams of technical experts and decades of industry experience.

Focus on Security

Focus on Security

Focus on Security are Cyber Security recruitment specialists. We’re dedicated to connecting you with the top Cyber Security talent across the globe. We focus on partnerships and results.

Vertek

Vertek

Vertek is a leading provider of operations consulting, end-to-end business process outsourcing, business intelligence, software applications and managed cybersecurity solutions.

Softsource vBridge

Softsource vBridge

Softsource vBridge are an ICT systems integrator providing specialist technology solutions, professional services, technical expertise and data centre services.

Graphiant

Graphiant

Graphiant’s Data Assurance service gives businesses end-to-end control and visibility into how data travels throughout the entire business network.