https://www.theregister.com/2024/10/14/china_quantum_attack/
Chinese researchers claim they have found a way to use D-Wave's quantum annealing systems to develop a promising attack on classical encryption.
Outlined in a paper [PDF] titled "Quantum Annealing Public Key Cryptographic Attack Algorithm Based on D-Wave Advantage", published in the late September edition of Chinese Journal of Computers, the researchers assert that D-Wave's machines can optimize problem-solving in ways that make it possible to devise an attack on public key cryptography.
The peer-reviewed paper opens with an English-language abstract but most of the text is in Chinese, so we used machine translation and referred to the South China Morning Post report on the paper – their Mandarin may be better than Google's ability to translate deeply technical text.
Between the Post, the English summary, and Google, The Reg understands the research team, led by Wang Chao from Shanghai University, used a D-Wave machine to attack Substitution-Permutation Network (SPN) structured algorithms that perform a series of mathematical operations to encrypt info. SPN techniques are at the heart of the Advanced Encryption Standard (AES) – one of the most widely used encryption standards.
The tech targeted in the attack include the Present and Rectangle algorithms, and the Gift-64 block cipher, and per the Post produced results that the authors presented as "the first time that a real quantum computer has posed a real and substantial threat to multiple full-scale SPN structured algorithms in use today."
But the techniques used were applied to a 22-bit key. In the real world, vastly longer keys are the norm - usually 2048 or 4096 bits.
The researchers argue that the approach they developed can be applied to other public-key and symmetric cryptographic systems.
The exact method outlined in the report does remain elusive, and the authors declined to speak with the Post due to the implications of their work.
But the mere fact that an off-the-shelf one quantum system has been used to develop a viable angle of attack on classical encryption will advance debate about the need to revisit the way data is protected.
It's already widely assumed that quantum computers will one day possess the power to easily decrypt data enciphered with today's tech, although opinion varies on when it will happen.
Adi Shamir – the cryptographer whose surname is the S in RSA – has predicted such events won't happen for another 30 years despite researchers, including those from China, periodically making great strides.
Other entities, like Singapore's central bank have warned that the risk will materialize in the next ten years.
Vendors, meanwhile, are already introducing "quantum safe" encryption that can apparently survive future attacks.
That approach may not be effective if, as alleged, China is stealing data now to decrypt it once quantum computers can do the job.
Or perhaps no nation needs quantum decryption, given Microsoft's confession that it exposed a golden cryptographic key in a data dump caused by a software crash, leading a Chinese crew to obtain it and put it to work peering into US government emails. ®
The mysterious and enigmatic backdoor in any system turned out to be the power supply itself.
Jump in the discussion.
No email address required.
It has always been possible. Literally right now I can guess an of your password and I have a chance of guessing it right.
Jump in the discussion.
No email address required.
More options
Context