Chinese scientists report that they have harnessed a quantum computer to potentially crack widely-used encryption methods, raising concerns about the future of data security. This achievement focuses on decrypting RSA and AES encryption, commonly utilized in safeguarding web browsers, VPNs, and digital communications. If validated, this development could signal a leap in quantum computing capabilities and prompt an urgent need for improved security strategies.
What’s Happening & Why This Matters
Chinese researchers from Shanghai University, using a D-Wave Advantage quantum computer, claim to have broken down a 50-bit RSA encryption key. This accomplishment, achieved through a combination of quantum and classical algorithms, shows the machine’s capability to target encryption methods that protect sensitive information worldwide. RSA encryption underpins much of our digital communication, from emails to bank transactions, while AES has been a US government encryption standard since 2001.
The D-Wave Advantage, the computer employed in this study, is a Canadian machine that operates through quantum annealing. This type of computing differs from traditional binary-based systems, relying on qubits—quantum bits—which can process information at unprecedented rates by occupying multiple states simultaneously. Researchers combined pure quantum and hybrid quantum-classical algorithms to conduct the encryption attack. Access to a D-Wave quantum computer requires a significant financial investment, with the machine itself valued at around $15 million and available on a rental basis through a cloud service at $2,000 per hour .
This recent finding contrasts with prior skepticism regarding quantum computing’s practical applications. While some experts once deemed quantum technology “useless” for real-world encryption, the Global Risk Institute has warned that quantum computers may breach widely-used RSA encryption (RSA-2048) in as little as 24 hours, potentially within the next few decades. In response, technology companies like Apple have begun strengthening their encryption protocols, as demonstrated by Apple’s introduction of PQ3 security for iMessage to defend against “Harvest Now, Decrypt Later” scenarios, where attackers could store encrypted data today for decryption in the future .
In 2022, Chinese researchers proposed a theoretical method for breaking RSA-2048 encryption, although they noted that executing it would require millions of qubits, which far exceeds current technological capabilities. In contrast, the D-Wave Advantage quantum computer used in this study possesses over 5,000 qubits, a notable advancement but still short of the millions previously speculated to be necessary .
TF Summary: What’s Next?
This development hypothesizes the potential quantum computing threat to current encryption standards. It suggests an immediate need for crypto-agility, a strategy that emphasizes adaptability in cryptographic methods to withstand future threats. Researchers, governments, and companies worldwide may now prioritize exploring quantum-resistant encryption algorithms to prevent potential vulnerabilities. As quantum technology improves, the world must prepare for a new era in cybersecurity, where the focus shifts from current encryption standards to future-proof solutions.
— Text-to-Speech (TTS) provided by gspeech