Quantum Code Breaking Progress

Chinese researchers have achieved a significant breakthrough in quantum computing, successfully using a D-Wave quantum computer to attack widely used encryption methods, including RSA and Advanced Encryption Standard (AES) algorithms.

This development, led by Wang Chao from Shanghai University, marks a potential turning point in cybersecurity, accelerating concerns about the vulnerability of current encryption systems to quantum attacks.

Quantum Cryptography Breakthrough

The research team, led by Wang Chao from Shanghai University, successfully utilized a D-Wave quantum computer to breach classical encryption algorithms. This groundbreaking achievement marks the first instance of a real quantum computer posing a substantial threat to multiple full-scale encryption algorithms currently in use. 

Key aspects of the breakthrough include:

  • Successfully factoring a 22-bit RSA integer using the D-Wave Advantage quantum computer
  • Attacking Substitution-Permutation Network (SPN) structured algorithms, which form the foundation for widely used encryption standards
  • Targeting specific algorithms such as Present, Rectangle, and the Gift-64 block cipher

The findings were published in the Chinese Journal of Computers under the title “Quantum Annealing Public Key Cryptographic Attack Algorithm Based on D-Wave Advantage”. This development has raised significant concerns about the future of cybersecurity and the urgent need for quantum-resistant encryption methods.

Targeted Encryption Methods

The research team focused their quantum attack on several key encryption methods widely used in critical sectors. RSA encryption, a cornerstone of public-key cryptography, was successfully breached when the team factored a 22-bit RSA integer using the D-Wave Advantage system

Additionally, the attack targeted Substitution-Permutation Network (SPN) structured algorithms, which form the foundation for the Advanced Encryption Standard (AES). 

Specific algorithms successfully attacked include:

  • Present
  • Rectangle
  • Gift-64 block cipher

These breakthroughs demonstrate the potential vulnerability of current military-grade and financial sector encryption standards to quantum computing attacks.

Quantum Annealing Approach

The research team employed two innovative approaches utilizing D-Wave’s quantum annealing systems to optimize problem-solving for cryptographic attacks. The first method relied entirely on D-Wave computers, leveraging the Ising and QUBO models to solve optimization and exponential space search problems

The second approach combined classical computing techniques, such as the Schnorr signature algorithm and Babai rounding technique, with quantum annealing algorithms to achieve capabilities beyond traditional computing methods. 

This quantum annealing technique works analogously to guiding a ball to find the lowest point in a terrain, with the quantum tunneling effect allowing direct access to optimal solutions, significantly outperforming classical algorithms in efficiency.

Cybersecurity Implications

The breakthrough in quantum computing’s ability to crack encryption algorithms has significant implications for global cybersecurity. This development serves as a wake-up call for the cybersecurity community, emphasizing the urgent need to implement quantum-resistant encryption methods.

Key concerns include:

  • Potential vulnerability of sensitive information protected by current encryption standards
  • Accelerated timeline for when quantum computers could pose a real threat to widely used cryptographic systems
  • Need for rapid development and adoption of post-quantum cryptography (PQC) solutions

Experts warn that the early and widespread use of quantum computers could enable advanced cyberattacks that are impossible using classical computers, potentially wreaking havoc on digital security. As a result, organizations and governments must prioritize the transition to quantum-safe encryption technologies to safeguard critical data and infrastructure against future quantum threats.

Source: Perplexity