Slashdot

Debunking Hype: China Hasn't Broken Military Encryption with Quantum

Recent headlines claimed that Chinese scientists had hacked military-grade encryption using quantum computers, sparking concern about the future of cybersecurity. However, a closer examination reveals that these claims are a huge overstatement. Chinese researchers have made incremental advances in quantum computing, but these advancements do not represent a paradigm-shifting breakthrough that renders current cryptographic systems obsolete. The claims largely stem from a Chinese academic paper published in May, which was picked up by many serious publications. The paper, titled Quantum Annealing Public Key Cryptographic Attack Algorithm Based on D-Wave Advantage, does not mention military-grade encryption, which typically involves algorithms like the Advanced Encryption Standard. Instead, the paper is about attacking RSA encryption, and while factoring a 50-bit integer is an impressive technical achievement, RSA encryption commonly uses key sizes of 2048 bits or higher. The difficulty of factoring increases exponentially with the size of the number, making the gap between 50-bit and 2048-bit integers astronomically large. The methods used involve a hybrid approach that combines quantum annealing with classical computation, and the advances do not equate to a scalable method for breaking RSA encryption as it is used in practical applications today. Experts argue that if China had actually broken AES, they would be keeping it secret rather than publicizing it in newspapers. The overstatement of the Chinese researchers' achievements does more harm than good and is potentially damaging to the field's credibility.
favicon
it.slashdot.org
it.slashdot.org