October 15th, 2024

Chinese Break RSA

Chinese researchers demonstrated a quantum attack on RSA and AES encryption using a D-Wave quantum computer, threatening military-grade encryption and prompting NIST to develop post-quantum cryptographic algorithms.

Read original articleLink Icon
Chinese Break RSA

Chinese researchers have reportedly demonstrated a significant threat to classical cryptography, particularly the widely used RSA and AES encryption algorithms, by successfully executing a quantum attack using a D-Wave quantum computer. This breakthrough, detailed in a research paper titled "Quantum Annealing Public Key Cryptographic Attack Algorithm Based on D-Wave Advantage," outlines two primary methods for attacking the substitution-permutation network (SPN) structure of these cryptographic standards. The first method relies solely on D-Wave's quantum capabilities, while the second combines classical cryptographic techniques with quantum annealing algorithms. The researchers, led by Wang Chao from Shanghai University, claim that their techniques could potentially compromise military-grade encryption, raising concerns about the security of sensitive data in banking and defense sectors. Despite the alarming implications, further details were withheld due to the sensitive nature of the research. In response to these developments, organizations like the National Institute of Standards and Technology (NIST) are actively working on post-quantum cryptographic algorithms to safeguard against future quantum computing threats.

- Chinese researchers have successfully executed a quantum attack on RSA and AES encryption.

- The attack utilized a D-Wave quantum computer and involved two distinct methods.

- The findings pose a significant threat to military-grade encryption and sensitive data security.

- NIST is developing post-quantum cryptographic algorithms to counter potential vulnerabilities.

- The research highlights the urgent need for advancements in encryption technology in light of quantum computing capabilities.

Link Icon 4 comments
By @i2km - 6 months
A quick rule-of-thumb: if 'military-grade encryption' is mentioned, the author likely has no domain knowledge.

Further the article claims that SPNs are used in RSA... which is completely wrong and indicates no domain knowledge.

The article has completely mis-interpreted the paper. The paper is written in Chinese but with an English abstract - the article seems to have just pulled keywords out.

I wonder whether a LLM hallucination is at play somewhere???

The article does not mention AES

By @alex_duf - 6 months
Anyone has any other link on the topic? I realise this is fresh but it feels significant enough that coverage should be broad pretty quickly.
By @more_corn - 6 months
No they didn’t