https://www.theregister.com/2024/10/14/china_quantum_attack/
Chinese researchers claim they have found a way to use D-Wave's quantum annealing systems to develop a promising attack on classical encryption.
Outlined in a paper [PDF] titled "Quantum Annealing Public Key Cryptographic Attack Algorithm Based on D-Wave Advantage", published in the late September edition of Chinese Journal of Computers, the researchers assert that D-Wave's machines can optimize problem-solving in ways that make it possible to devise an attack on public key cryptography.
The peer-reviewed paper opens with an English-language abstract but most of the text is in Chinese, so we used machine translation and referred to the South China Morning Post report on the paper – their Mandarin may be better than Google's ability to translate deeply technical text.
Between the Post, the English summary, and Google, The Reg understands the research team, led by Wang Chao from Shanghai University, used a D-Wave machine to attack Substitution-Permutation Network (SPN) structured algorithms that perform a series of mathematical operations to encrypt info. SPN techniques are at the heart of the Advanced Encryption Standard (AES) – one of the most widely used encryption standards.
The tech targeted in the attack include the Present and Rectangle algorithms, and the Gift-64 block cipher, and per the Post produced results that the authors presented as "the first time that a real quantum computer has posed a real and substantial threat to multiple full-scale SPN structured algorithms in use today."
But the techniques used were applied to a 22-bit key. In the real world, vastly longer keys are the norm - usually 2048 or 4096 bits.
The researchers argue that the approach they developed can be applied to other public-key and symmetric cryptographic systems.
The exact method outlined in the report does remain elusive, and the authors declined to speak with the Post due to the implications of their work.
But the mere fact that an off-the-shelf one quantum system has been used to develop a viable angle of attack on classical encryption will advance debate about the need to revisit the way data is protected.
It's already widely assumed that quantum computers will one day possess the power to easily decrypt data enciphered with today's tech, although opinion varies on when it will happen.
Adi Shamir – the cryptographer whose surname is the S in RSA – has predicted such events won't happen for another 30 years despite researchers, including those from China, periodically making great strides.
Other entities, like Singapore's central bank have warned that the risk will materialize in the next ten years.
Vendors, meanwhile, are already introducing "quantum safe" encryption that can apparently survive future attacks.
That approach may not be effective if, as alleged, China is stealing data now to decrypt it once quantum computers can do the job.
Or perhaps no nation needs quantum decryption, given Microsoft's confession that it exposed a golden cryptographic key in a data dump caused by a software crash, leading a Chinese crew to obtain it and put it to work peering into US government emails. ®
The mysterious and enigmatic backdoor in any system turned out to be the power supply itself.
Jump in the discussion.
No email address required.
Jump in the discussion.
No email address required.
More options
Context
I don't understand what any of this means
Jump in the discussion.
No email address required.
Quantum computer broke a 22bit key
So it managed to figure out the right key from about four million possibilities
Something your phone could do within a few minutes maybe
The thing is that every additional bit doubles the time requirement, in the real world you'll have at least 128 bits to deal with at which point we're talking lifetimes of processing
Presumably this new method is faster somehow but it's totally useless on such a short key
Jump in the discussion.
No email address required.
Thanks
Jump in the discussion.
No email address required.
More options
Context
More options
Context
The Chinese are in your computer
Jump in the discussion.
No email address required.
More options
Context
Jump in the discussion.
No email address required.
More options
Context
More options
Context
If you have nothing to hide then you shouldn't mind a backdoor if your stu...wait, what? The chinks got into our secret stuff? Oh, crap.
Jump in the discussion.
No email address required.
More options
Context
Jump in the discussion.
No email address required.
More options
Context
I DONT SPEAK CHING CHONG ARE MY COSBY COINS SAFE OR WHAT?
Jump in the discussion.
No email address required.
Jump in the discussion.
No email address required.
More options
Context
More options
Context
well if it's only doing 22 bit keys that does kinda seem in line with the fact the "d-wave" thing isn't anywhere near powerful enough to do anything serious, which we already knew
Jump in the discussion.
No email address required.
More options
Context
China literally never does anything
Jump in the discussion.
No email address required.
More options
Context
quantum computer shown too do do what we already proved quantum computers can do: prime factorization.
quantum computer still not big enough too operate on large keys
there is no moore's law for quantum computing, hopefully it ain't the opposite
we are none the wiser
fuck black lives matter
Jump in the discussion.
No email address required.
More options
Context
quantum computing is fake so no
Jump in the discussion.
No email address required.
More options
Context
Jump in the discussion.
No email address required.
Jump in the discussion.
No email address required.
More options
Context
More options
Context
Just recently I was talking about the consequences of Quantum computing and what will happen to cryptography, same with internet protocols such as HTTPS. There are going to be solutions made for such problems but many old files will finally be cracked once quantum computing becomes a thing
Jump in the discussion.
No email address required.
More options
Context
In current year?
Jump in the discussion.
No email address required.
More options
Context
don't china men have to report literally any exploits they find immediately to their
dictators so they can use themgovernment to maintain security. So that would mean this is either useless or a publicity stunt. or prob bothJump in the discussion.
No email address required.
More options
Context
Snapshots:
https://www.theregister.com/2024/10/14/china_quantum_attack/:
ghostarchive.org
archive.org
archive.ph (click to archive)
paper:
ghostarchive.org
archive.org
archive.ph (click to archive)
South China Morning Post:
ghostarchive.org
archive.org
archive.ph (click to archive)
predicted:
ghostarchive.org
archive.org
archive.ph (click to archive)
great strides:
ghostarchive.org
archive.org
archive.ph (click to archive)
Singapore's central bank:
ghostarchive.org
archive.org
archive.ph (click to archive)
introducing:
ghostarchive.org
archive.org
archive.ph (click to archive)
alleged:
ghostarchive.org
archive.org
archive.ph (click to archive)
confession:
ghostarchive.org
archive.org
archive.ph (click to archive)
Jump in the discussion.
No email address required.
More options
Context
It has always been possible. Literally right now I can guess an of your password and I have a chance of guessing it right.
Jump in the discussion.
No email address required.
More options
Context