Man
Professional
- Messages
- 3,077
- Reaction score
- 614
- Points
- 113
Progress is unstoppable, but there are still unanswered questions.
Recent media reports that Chinese scientists have broken "military encryption" using quantum computers have sparked widespread speculation about the future of cybersecurity. However, a detailed analysis showed that such claims are greatly exaggerated.
The research cited in the publications is not about military encryption, but about RSA algorithms, one of the most common systems for data protection, using the complexity of decomposing large numbers into prime factors. A study by Chinese scientists describes advances in factoring numbers up to 50 bits using a hybrid approach that combines quantum and classical computing.
Classiq's director of technical marketing, Eric Garcell, noted that "factoring a 50-bit number is far from breaking military encryption". He also added that such exaggerated claims could damage the reputation of quantum research.
While the work of Chinese researchers does represent progress, it does not mean a threat to modern cryptography. The main RSA algorithms use keys of at least 2048 bits, and hacking such systems remains technologically unachievable at the current stage of quantum computer development.
The quantum anniler that the Chinese scientists used is optimized for solving combinatorial optimization problems, but is not capable of running algorithms such as Shor's algorithm designed to factorize large numbers. However, even current advances in this area are important for the development of quantum technologies and can contribute to the improvement of cryptography methods.
John Soroko, a senior expert at Sectigo, noted that "algorithms that are resistant to quantum attacks are already being developed and standardized". He stressed that work on the creation of such algorithms continues under the auspices of the US National Institute of Standards and Technology (NIST).
Meanwhile, the international community of scientists continues to work on the creation of so-called post-quantum cryptography, which will be able to withstand attacks from both classical and quantum computers. The development of quantum computers capable of breaking real ciphers is still far from practical implementation.
Thus, while the achievements of Chinese scientists are noteworthy, they do not pose an immediate threat to the security of modern cryptographic systems. Global efforts to develop algorithms that are resistant to quantum attacks continue, ensuring reliable data protection in the future.
Source
Recent media reports that Chinese scientists have broken "military encryption" using quantum computers have sparked widespread speculation about the future of cybersecurity. However, a detailed analysis showed that such claims are greatly exaggerated.
The research cited in the publications is not about military encryption, but about RSA algorithms, one of the most common systems for data protection, using the complexity of decomposing large numbers into prime factors. A study by Chinese scientists describes advances in factoring numbers up to 50 bits using a hybrid approach that combines quantum and classical computing.
Classiq's director of technical marketing, Eric Garcell, noted that "factoring a 50-bit number is far from breaking military encryption". He also added that such exaggerated claims could damage the reputation of quantum research.
While the work of Chinese researchers does represent progress, it does not mean a threat to modern cryptography. The main RSA algorithms use keys of at least 2048 bits, and hacking such systems remains technologically unachievable at the current stage of quantum computer development.
The quantum anniler that the Chinese scientists used is optimized for solving combinatorial optimization problems, but is not capable of running algorithms such as Shor's algorithm designed to factorize large numbers. However, even current advances in this area are important for the development of quantum technologies and can contribute to the improvement of cryptography methods.
John Soroko, a senior expert at Sectigo, noted that "algorithms that are resistant to quantum attacks are already being developed and standardized". He stressed that work on the creation of such algorithms continues under the auspices of the US National Institute of Standards and Technology (NIST).
Meanwhile, the international community of scientists continues to work on the creation of so-called post-quantum cryptography, which will be able to withstand attacks from both classical and quantum computers. The development of quantum computers capable of breaking real ciphers is still far from practical implementation.
Thus, while the achievements of Chinese scientists are noteworthy, they do not pose an immediate threat to the security of modern cryptographic systems. Global efforts to develop algorithms that are resistant to quantum attacks continue, ensuring reliable data protection in the future.
Source