{"id":724,"date":"2024-10-14T12:05:10","date_gmt":"2024-10-14T12:05:10","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=724"},"modified":"2024-10-14T12:05:10","modified_gmt":"2024-10-14T12:05:10","slug":"chinese-researchers-break-rsa-encryption-with-a-quantum-computer","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=724","title":{"rendered":"Chinese researchers break RSA encryption with a quantum computer"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>In a potentially alarming development for global cybersecurity, Chinese researchers have unveiled a method using D-Wave\u2019s quantum annealing systems to crack classic encryption, potentially accelerating the timeline for when quantum computers could pose a real threat to widely used cryptographic systems.<\/p>\n<p>Published in the Chinese Journal of Computers under the title \u201cQuantum Annealing Public Key Cryptographic Attack Algorithm Based on D-Wave Advantage,\u201d <a href=\"http:\/\/cjc.ict.ac.cn\/online\/onlinepaper\/wc-202458160402.pdf\">the paper outlined<\/a> how D-Wave\u2019s machines were used to break <a href=\"https:\/\/www.csoonline.com\/article\/574717\/can-a-quantum-algorithm-crack-rsa-cryptography-not-yet.html\">RSA encryption<\/a> and attack symmetric encryption systems, raising serious questions about the future of cybersecurity.<\/p>\n<p>The research team, led by Wang Chao from Shanghai University, found that <a href=\"https:\/\/www.computerworld.com\/article\/3478764\/d-wave-launches-new-quantum-roadmap-geared-to-ai-ml.html\">D-Wave\u2019s quantum computers<\/a> can optimize problem-solving in a way that makes it possible to attack encryption methods such as RSA.<\/p>\n<p>\u00a0\u201cUsing the D-Wave Advantage, we successfully factored a 22-bit RSA integer, demonstrating the potential for quantum machines to tackle cryptographic problems,\u201d the researchers wrote in the paper.<\/p>\n<p>The study highlights how quantum annealing can turn cryptographic attacks into combinatorial optimization problems, making them easier to solve.<\/p>\n<p>\u201cThis is the first time that a real quantum computer has posed a substantial threat to multiple full-scale SPN structured algorithms in use today,\u201d the researchers noted, referring to widely used encryption methods based on the Substitution-Permutation Network (SPN) structure.<\/p>\n<p><strong>[ Related: <a href=\"https:\/\/www.csoonline.com\/article\/3552701\/the-cisos-guide-to-establishing-quantum-resilience.html\">The CISO\u2019s guide to establishing quantum resilience<\/a> ]<\/strong><\/p>\n<p>The researchers didn\u2019t just stop at RSA. They also attacked algorithms crucial to the Advanced Encryption Standard (AES), including Present, Rectangle, and the Gift-64 block cipher.<\/p>\n<p>\u201cOur findings show that D-Wave\u2019s quantum technology can efficiently target encryption systems that protect sensitive information globally,\u201d they stated in their paper.<\/p>\n<p>\u201cMany cryptographic algorithms that enterprises rely on today, such as RSA and ECC, are based on mathematical problems that are computationally difficult for classical computers to solve efficiently,\u201d said Prabhjyot Kaur, senior analyst at Everest Group. \u201cHowever, the advent of quantum computing threatens the security of these algorithms. The need for robust quantum-safe or post-quantum cryptographic solutions becomes increasingly evident as quantum computing advances.\u201d<\/p>\n<h2 class=\"wp-block-heading\">What does this mean for cybersecurity?<\/h2>\n<p>The implications of this research are significant. Experts have long believed that quantum computers could eventually break today\u2019s encryption, but this study suggests that the timeline for such threats may be much shorter than expected.<\/p>\n<p>\u201cThe advancement of quantum computers can seriously threaten data security and privacy for various enterprises, affecting fundamental principles such as confidentiality, integrity, and authentication,\u201d Kaur added. \u201cThis makes it essential to reassess the security of these cryptographic methods.\u201d<\/p>\n<p>The team pointed out that data being encrypted today could be at risk if adversaries are stealing it with the intention of decrypting it in the future when quantum technology advances. \u201cOrganizations need to reconsider how they secure their data as quantum attacks become a real possibility,\u201d they warned.<\/p>\n<h2 class=\"wp-block-heading\">The need for quantum-safe encryption<\/h2>\n<p>Many companies are already working on \u201cquantum-safe\u201d encryption methods to protect against future quantum attacks. However, the Chinese research emphasizes that such measures may need to be implemented urgently to safeguard sensitive information.<\/p>\n<p>The research from Wang Chao\u2019s team serves as a wake-up call for the cybersecurity community. With the power of quantum computing evolving rapidly, the time to rethink encryption strategies is now.<\/p>\n<p><strong>[ Related: <a href=\"https:\/\/www.csoonline.com\/article\/654887\/11-notable-post-quantum-cryptography-initiatives-launched-in-2023.html\">Notable post-quantum cryptography initiatives paving the way toward Q-Day<\/a> ]<\/strong><\/p>\n<p>\u201cThe growing threat from quantum computers requires immediate attention to ensure the security of our digital future,\u201d the researchers warned in the paper.<\/p>\n<p>\u201cThe early and widespread use of quantum computers could wreak havoc, enabling new advanced cyberattacks that are impossible using classical computers,\u201d Kaur said. \u201cPost-quantum cryptography (PQC) is the solution to this problem.\u201d<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>In a potentially alarming development for global cybersecurity, Chinese researchers have unveiled a method using D-Wave\u2019s quantum annealing systems to crack classic encryption, potentially accelerating the timeline for when quantum computers could pose a real threat to widely used cryptographic systems. Published in the Chinese Journal of Computers under the title \u201cQuantum Annealing Public Key [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":720,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-724","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/724"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=724"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/724\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/720"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=724"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=724"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=724"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}