Unable to load image
Reported by:

Crypto-apocalypse soon? Chinese researchers find a potential quantum attack on classical encryption - With an off-the-shelf D-Wave machine, but only against very short keys

https://www.theregister.com/2024/10/14/china_quantum_attack/

Chinese researchers claim they have found a way to use D-Wave's quantum annealing systems to develop a promising attack on classical encryption.

Outlined in a paper [PDF] titled "Quantum Annealing Public Key Cryptographic Attack Algorithm Based on D-Wave Advantage", published in the late September edition of Chinese Journal of Computers, the researchers assert that D-Wave's machines can optimize problem-solving in ways that make it possible to devise an attack on public key cryptography.

The peer-reviewed paper opens with an English-language abstract but most of the text is in Chinese, so we used machine translation and referred to the South China Morning Post report on the paper – their Mandarin may be better than Google's ability to translate deeply technical text.

Between the Post, the English summary, and Google, The Reg understands the research team, led by Wang Chao from Shanghai University, used a D-Wave machine to attack Substitution-Permutation Network (SPN) structured algorithms that perform a series of mathematical operations to encrypt info. SPN techniques are at the heart of the Advanced Encryption Standard (AES) – one of the most widely used encryption standards.

The tech targeted in the attack include the Present and Rectangle algorithms, and the Gift-64 block cipher, and per the Post produced results that the authors presented as "the first time that a real quantum computer has posed a real and substantial threat to multiple full-scale SPN structured algorithms in use today."

But the techniques used were applied to a 22-bit key. In the real world, vastly longer keys are the norm - usually 2048 or 4096 bits.

The researchers argue that the approach they developed can be applied to other public-key and symmetric cryptographic systems.

The exact method outlined in the report does remain elusive, and the authors declined to speak with the Post due to the implications of their work.

But the mere fact that an off-the-shelf one quantum system has been used to develop a viable angle of attack on classical encryption will advance debate about the need to revisit the way data is protected.

It's already widely assumed that quantum computers will one day possess the power to easily decrypt data enciphered with today's tech, although opinion varies on when it will happen.

Adi Shamir – the cryptographer whose surname is the S in RSA – has predicted such events won't happen for another 30 years despite researchers, including those from China, periodically making great strides.

Other entities, like Singapore's central bank have warned that the risk will materialize in the next ten years.

Vendors, meanwhile, are already introducing "quantum safe" encryption that can apparently survive future attacks.

That approach may not be effective if, as alleged, China is stealing data now to decrypt it once quantum computers can do the job.

Or perhaps no nation needs quantum decryption, given Microsoft's confession that it exposed a golden cryptographic key in a data dump caused by a software crash, leading a Chinese crew to obtain it and put it to work peering into US government emails. ®

The mysterious and enigmatic backdoor in any system turned out to be the power supply itself. :marseymindblown:

!1337

36
Jump in the discussion.

No email address required.

Chinese researchers claim

:#marseysurejan:

Jump in the discussion.

No email address required.

I don't understand what any of this means :marseysad:

Jump in the discussion.

No email address required.

Quantum computer broke a 22bit key

So it managed to figure out the right key from about four million possibilities

Something your phone could do within a few minutes maybe

The thing is that every additional bit doubles the time requirement, in the real world you'll have at least 128 bits to deal with at which point we're talking lifetimes of processing

Presumably this new method is faster somehow but it's totally useless on such a short key

Jump in the discussion.

No email address required.

Thanks :marseyjam:

Jump in the discussion.

No email address required.

The Chinese are in your computer

Jump in the discussion.

No email address required.

:#marseysal:

Jump in the discussion.

No email address required.

The mysterious and enigmatic backdoor in any system turned out to be the power supply itself.

If you have nothing to hide then you shouldn't mind a backdoor if your stu...wait, what? The chinks got into our secret stuff? Oh, crap.

:brainletchest#talking:

Jump in the discussion.

No email address required.

https://media.tenor.com/TSH8ZbRh4CoAAAAx/nail-biting-spongebob.webp

Jump in the discussion.

No email address required.

I DONT SPEAK CHING CHONG ARE MY COSBY COINS SAFE OR WHAT?

https://media.tenor.com/3U1fuHfRWdgAAAAx/bill-cosby.webp

Jump in the discussion.

No email address required.

:#marseyitsover: :#marseysal:

Jump in the discussion.

No email address required.

well if it's only doing 22 bit keys that does kinda seem in line with the fact the "d-wave" thing isn't anywhere near powerful enough to do anything serious, which we already knew

:#marseyshrug:

Jump in the discussion.

No email address required.

China literally never does anything

Jump in the discussion.

No email address required.

quantum computer shown too do do what we already proved quantum computers can do: prime factorization.

quantum computer still not big enough too operate on large keys

there is no moore's law for quantum computing, hopefully it ain't the opposite

we are none the wiser


fuck black lives matter

Jump in the discussion.

No email address required.

quantum computing is fake so no

Jump in the discussion.

No email address required.

https://i.rdrama.net/images/17289630538260868.webp

Jump in the discussion.

No email address required.

Just recently I was talking about the consequences of Quantum computing and what will happen to cryptography, same with internet protocols such as HTTPS. There are going to be solutions made for such problems but many old files will finally be cracked once quantum computing becomes a thing

Jump in the discussion.

No email address required.

Advanced Encryption Standard (AES) – one of the most widely used encryption standards

In current year?

:#taywhat:

Jump in the discussion.

No email address required.

don't china men have to report literally any exploits they find immediately to their dictators so they can use them government to maintain security. So that would mean this is either useless or a publicity stunt. or prob both

Jump in the discussion.

No email address required.

It has always been possible. Literally right now I can guess an of your password and I have a chance of guessing it right.

Jump in the discussion.

No email address required.

Link copied to clipboard
Action successful!
Error, please refresh the page and try again.