Debunking Hype: China Hasn't Broken Military Encryption with Quantum (forbes.com) 43
An anonymous reader shared this report from Forbes:
Recent headlines have proclaimed that Chinese scientists have hacked "military-grade encryption" using quantum computers, sparking concern and speculation about the future of cybersecurity. The claims, largely stemming from a recent South China Morning Post article about a Chinese academic paper published in May, was picked up by many more serious publications.
However, a closer examination reveals that while Chinese researchers have made incremental advances in quantum computing, the news reports are a huge overstatement. "Factoring a 50-bit number using a hybrid quantum-classical approach is a far cry from breaking 'military-grade encryption'," said Dr. Erik Garcell, Head of Technical Marketing at Classiq, a quantum algorithm design company. While advancements have indeed been made, the progress represents incremental steps rather than a paradigm-shifting breakthrough that renders current cryptographic systems obsolete. "This kind of overstatement does more harm than good," Dr. Garcell said. "Misrepresenting current capabilities as 'breaking military-grade encryption' is not just inaccurate — it's potentially damaging to the field's credibility...."
In fact, the Chinese paper in question, titled Quantum Annealing Public Key Cryptographic Attack Algorithm Based on D-Wave Advantage, does not mention military-grade encryption, which typically involves algorithms like the Advanced Encryption Standard (AES). Instead, the paper is about attacking RSA encryption (RSA stands for Rivest-Shamir-Adleman, named after its creators)... While factoring a 50-bit integer is an impressive technical achievement, it's important to note that RSA encryption commonly uses key sizes of 2048 bits or higher. The difficulty of factoring increases exponentially with the size of the number, meaning that the gap between 50-bit and 2048-bit integers is astronomically large.
Moreover, the methods used involve a hybrid approach that combines quantum annealing with classical computation. This means that the quantum annealer handles part of the problem, but significant processing is still performed by classical algorithms. The advances do not equate to a scalable method for breaking RSA encryption as it is used in practical applications today.
Duncan Jones, Head of Cybersecurity at Quantinuum, tells Forbes that if China had actually broken AES — they'd be keeping it secret (rather than publicizing it in newspapers).
However, a closer examination reveals that while Chinese researchers have made incremental advances in quantum computing, the news reports are a huge overstatement. "Factoring a 50-bit number using a hybrid quantum-classical approach is a far cry from breaking 'military-grade encryption'," said Dr. Erik Garcell, Head of Technical Marketing at Classiq, a quantum algorithm design company. While advancements have indeed been made, the progress represents incremental steps rather than a paradigm-shifting breakthrough that renders current cryptographic systems obsolete. "This kind of overstatement does more harm than good," Dr. Garcell said. "Misrepresenting current capabilities as 'breaking military-grade encryption' is not just inaccurate — it's potentially damaging to the field's credibility...."
In fact, the Chinese paper in question, titled Quantum Annealing Public Key Cryptographic Attack Algorithm Based on D-Wave Advantage, does not mention military-grade encryption, which typically involves algorithms like the Advanced Encryption Standard (AES). Instead, the paper is about attacking RSA encryption (RSA stands for Rivest-Shamir-Adleman, named after its creators)... While factoring a 50-bit integer is an impressive technical achievement, it's important to note that RSA encryption commonly uses key sizes of 2048 bits or higher. The difficulty of factoring increases exponentially with the size of the number, meaning that the gap between 50-bit and 2048-bit integers is astronomically large.
Moreover, the methods used involve a hybrid approach that combines quantum annealing with classical computation. This means that the quantum annealer handles part of the problem, but significant processing is still performed by classical algorithms. The advances do not equate to a scalable method for breaking RSA encryption as it is used in practical applications today.
Duncan Jones, Head of Cybersecurity at Quantinuum, tells Forbes that if China had actually broken AES — they'd be keeping it secret (rather than publicizing it in newspapers).
Duh (Score:3)
I said pretty much the same thing a few days ago. Because it was frigging _obvious_.
Re: (Score:3)
First I've heard of this at all, but the first thought in my mind while reading it was "50-bits of ... symmetric? assymetric? if the latter, ecc, rsa?"
I'm not even an expert at cryptography or anything remotely approaching it, so if I'm asking that, then why aren't journalists? At least Forbes had the sense to ask somebody who is an expert in this case.
Need a tag +IN_10_YEARS+ (Score:2)
News media stylebooks should require an "+IN_TEN_YEARS+" tag to these stories because they are always going to promise the solution will be cheap, available, helping citizens everywhere, cooling the planet just enough, feeding marginalized women and children, proving ever cleaner water, sending every child to college, and curing cancer in ten years.
Re: (Score:2)
Guess you should've submitted your comments to Forbes... might've made a few bucks!
Re: (Score:2)
Well, maybe then they would not have made demented claims about factoring 50 bits being impressive. But you know what, I do not care about Forbes one bit and I care less and less about trying to enlighten the prevalent human idiot.
Re: (Score:3)
Re: Duh (Score:2)
Re: (Score:2)
Corporate execs everywhere: "But me not need brain, why AI need brain?"
Re: (Score:2)
But company executives don't seem to know the difference. They expect more from LLM than it could ever do without reasoning.
That is an ongoing topic with AI: People and even researchers (who really should know better) expecting or predicting a lot more than is reasonably possible or likely. There have now been several "AI winters" were people stopped listening for years after yet another AI hype collapsed. This time, it will probably be more an "AI Ice-Age". Which really is a shame, because AI has its uses. The field should just get rid of half its proponents and researchers to become respectable again.
That said, the "loud type"
I knew this was bullshit (Score:5, Insightful)
Re: (Score:2)
What's AES got to do with the internet?
Re: (Score:1)
What's AES got to do with the internet?
Really?
AES encryption is commonly used in a lot of ways, including wireless security, processor security, file encryption, and SSL/TLS.
Re: (Score:2)
Obviously I'm missing something. The asymmetric encryption used for SSL/TLS is not AES, right? It seems like if you haven't broken that, then you wouldn't be able to grab the symmetric encryption key, so you'd have to just keep brute-forcing all of the (post handshake) traffic... which seems impractical for general use.
Re: I knew this was bullshit (Score:1)
Re: I knew this was bullshit (Score:1)
Re: (Score:2)
My, limited, understanding of quantum annealing makes me think replicating the s-boxes of AES could very well be technically impossible.
Re: (Score:1)
Obviously I'm missing something. The asymmetric encryption used for SSL/TLS is not AES, right? It seems like if you haven't broken that, then you wouldn't be able to grab the symmetric encryption key, so you'd have to just keep brute-forcing all of the (post handshake) traffic... which seems impractical for general use.
In SSL (Secure Sockets Layer), the most commonly used symmetric encryption algorithm is AES (Advanced Encryption Standard), which utilizes a single shared secret key to encrypt and decrypt data during a secure session between a client and server; essentially, both parties use the same key to encode and decode information.
The most common asymmetric encryption algorithm used in SSL is RSA (Rivest-Shamir-Adleman).
SSL 2 uses RSA only. SSL 3.0 supports RSA key exchange when certificates are used, as well a
Re: (Score:2)
Re: (Score:1)
If they broke AES, they either would A. Not say shit and save it for something big or more likely B. We'd wake up to a broken internet because the attack had been deployed at scale to wreck the internet. A and B are two points on one timeline.
Uh, about that plan B. Don’t you think if the fuck shit up theory were a primary goal, China would have just launched nukes long ago?
If you actually worked hard to obtain a “master” decryption key, “wreck the internet” be destroying the entire fucking point of that effort. US intelligence, wouldn’t say shit. For years. I mean, how else do you get a speculative execution vulnerability affecting decades of American processor families..
"Here's your winnings, sir!" (Score:4, Insightful)
It's only a rumor that the Military Industrial Complex spreads rumors about enemy super-weapons when they crave cash.
Re: (Score:3)
Actually its the media that spreads rumors like this because they make better clickbait. As a local politician once said "rumor has it" and someone asked where he heard that rumor the said "I just started it." It was an interesting rumor and widely reported and, not coincidentally, served the interests of the local politician and the people who spread it including the people in the room where the rumor started.
and off topic. It will no doubt be used to train AI. I have wondered how "intelligence" can be t
Re: (Score:1)
Now it's, "Many people are saying..."
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Actually its the media that spreads rumors like this because they make better clickbait.
How is it not obvious to you that it is both things?
Re: (Score:2)
Smells really bad in here (Score:2)
Re: (Score:2)
I'm not a cryptographer
That is obvious. MD5 is a _hash_, AES is a block-cipher. Apples and oranges.
I knew it was nonsense... (Score:2)
...when I saw the headline
Unfortunately, there is a LOT of nonsense floating around as wannabe influencers fish for eyeballs and clicks
SCMP is no longer a reliable source so no surprise (Score:3)
quantum safe (Score:1)
rot18(rot47(rot13("quantum safe")))
Rebunking Hype (Score:1)
Re: (Score:2)
Re: Rebunking Hype (Score:1)
Re: Rebunking Hype (Score:2)
If they do, you won't be hearing about that in the press.
Reporters required to be annoying and misinformed (Score:2)
While QC has been solved from engineering- and mathematical-perspectives, they cannot be manufactured in configurations of a threatening size because physics.
More likely, malicious domestic intelligence agencies will use "military-grade" FUD to manipulate engineering standards groups to adopt backdoored and/or under-vetted "post-quantum" algorithms.
It might have some merit (Score:2)
Or not. Factoring a 50-bit number is something that's easily achievable using classical means. If the presence of D-Wave quantum things made the factoring faster than if using only the classical parts of the combo, it would be interesting as one of the few examples where D-Wave demonstrates doing something useful. It would be VERY interesting if the factoring was done using the Shor's algorithm... but not likely, because D-Wave quantum things can't really run the Shor's algorithm.
I keep referring to D-Wave
Not even 50... (Score:2)
Read the paper. They broke a 22-bit key on commercial hardware.
They cited being able to do a 50-bit key but didn't discuss it (in the English portion anyway)