English
0

Chinese researchers have developed a new and dangerous quantum algorithm for breaking encryption

Chinese researchers have developed a new and dangerous quantum algorithm for breaking encryption

A big claim, some cryptographers find the claim misleading, while others see it as a possible warning sign. researchers Tsinghua University China believes it has discovered a quantum algorithm that can crack today’s most sophisticated encryption standards. The team claims that this algorithm can also be implemented using existing quantum technologies. If this claim is indeed true, the lifespan of today’s encryption could be drastically reduced in a matter of years.

Chinese researchers claim to break RSA encryption with an existing quantum computer

Algorithm based on Schnorr class calculations

Tsinghua University professor Long Guiley and his team claim to have developed a new qubit-saving factorization algorithm that could pose a challenge to cryptographic security standards in the not-too-distant future. In fact, they claim that this algorithm, called Sublinear Source Quantum Integer Factorization (SQIF), optimizes the quantum computing process by reducing the number of qubits needed to perform code-breaking calculations. This work is based on an algorithm developed in 2013 by German researcher Klaus Schnauer.

1673916637 869 Chinese researchers have developed a new and dangerous quantum algorithm Chinese researchers have developed a new and dangerous quantum algorithm for breaking encryption 2
Klaus Schnorr

Well, if you, like me, don’t know much about what’s going on behind the scenes of quantum computing, in short, if successful, this algorithm could have a chance of breaking today’s strongest encryption using existing quantum technologies much sooner than initially expected. was going to reduce

Chinese researchers have developed a new and dangerous quantum algorithm Chinese researchers have developed a new and dangerous quantum algorithm for breaking encryption 4

Turning the cryptographic hash function into a worthless tool with quantum computing

Developed by the National Security Agency (NSA) in 2001, SHA-256 is a cryptographic hash function that converts data into an encrypted string of 256 characters. Its encrypted output cannot be read unless the recipient has the appropriate key to decrypt the message.

These decryption keys also consist of complex mathematical strings associated with the SHA-256 hash, making it extremely difficult to decrypt an encrypted message without the proper keys. For example, the time to break an RSA-2048 bit encryption key using today’s most powerful traditional computing resources is estimated to be around 300 trillion years!

300 trillion seems like a good and safe number that no one should worry about. That is, at least until quantum computers enter the equation. According to cryptography and quantum experts, a decent-sized quantum computer could complete the same algorithm-breaking operation in less than eight hours. This is where Guiley’s equation sounds the alarm.

On the other hand, if the SQIF algorithm scales and effectively reduces the quantum computing resources required to perform computations, the wait for the growth of quantum technology to perform computations could be reduced from decades to years.

1673916637 454 Chinese researchers have developed a new and dangerous quantum algorithm Chinese researchers have developed a new and dangerous quantum algorithm for breaking encryption 6

IBM’s Osprey It currently holds the title of the world’s largest quantum processor, weighing 433 qubits. The company’s quantum roadmap shows plans to pursue processors larger than 1,100 qubits in 2023 to more than 4,100 qubits in 2025. In comparison, the SQIF algorithm claims to reduce the practical scale required for a quantum computer to 372 qubits.

Currently, the Tsinghua team has not yet proven the ability to break the 2048-bit encryption barrier. However, they successfully demonstrated the feasibility of SQIF by cracking a 48-bit encryption key with a tiny 10-qubit superconducting quantum computer. While this development may not be something to worry about yet, it is definitely a major and inevitable development that security and crypto experts will continue to monitor.

Related posts:

  • Unveiling the trial version of Google Client side encryption in the web version of Gmail
  • Google Message end-to-end encryption for group messages has begun
  • Enable end-to-end encryption for iCloud backups
  • Twitter is again working on end-to-end encryption for direct messages

More Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.
You need to agree with the terms to proceed

Most Viewed Posts
Menu