Chinese have cracked a military-strength encryption using quantum computer

4,482 Views | 38 Replies | Last: 1 yr ago by FatZilla
KingofHazor
How long do you want to ignore this user?
Quote:

In a stunning event that may redefine the battle for dominance in creating impenetrable security networks, Chinese scientists have cracked a military-strength encryption using a quantum computer. This discovery made by the team from Shanghai University spearheaded by Wang Chao, exposed arising concerns that personal and important data in many sectors such as banking, military and crucial infrastructural activities, can be manipulated. The researchers used an optimized quantum computer from D-Wave Systems for hacking of several standard cryptographic algorithms such as Present, Gift-64, and Rectangle. These algorithms constitute the support of the SPN structure applied in AES and regarded by many as one of the most secure encryption technologies at the present.
If this is an accurate report, I'm wondering why the Chinese announced this rather than keeping their capabilities secret as a significant strategic advantage. What is the practical significance of this, both at the national level and to us poor schmucks who are depending on encryption to protect our financial assets and privacy?

Quantum Shadows: The Encryption Crisis - Modern Diplomacy
Who?mikejones!
How long do you want to ignore this user?
Probably to let us know they stole our tech
Sims
How long do you want to ignore this user?
Who benefits most? Probably Fang Fang since she doesn't have to rely on Swalwell as much to get our secrets.
Loren Visser
How long do you want to ignore this user?
Who?mikejones! said:

Probably to let us know they stole our tech
Stole it? Heck, Biden, et al sold it to them. But at least they got a board seat out of it.
aaronag02
How long do you want to ignore this user?
Quantum decrypting hacks like this are all lab demos and smoke and mirrors at this point. Their main value is propaganda and fundraising, with bonus points if you get another lab to brag about outpacing you, at which point you steal from them.
BQ78
How long do you want to ignore this user?
And make us divert funds and expertise to counter it.
No Spin Ag
How long do you want to ignore this user?
aaronag02 said:

Quantum decrypting hacks like this are all lab demos and smoke and mirrors at this point. Their main value is propaganda and fundraising, with bonus points if you get another lab to brag about outpacing you, at which point you steal from them.
I couldn't agree more.

I went down a small rabbit hole on quantum computers, and even the companies that have been working non-stop on this since the 90s all say it's still about a decade or more until they can be ready to go.

Now, what's being said, and what is the greatest concern, is that there will be no encryption code that a quantum computer won't be able to crack, and it won't be done in hours or minutes but in seconds.

I think it was the person from Google who said that a code that would take years to crack today would be done in a few seconds. Now, that is scary.
There are in fact two things, science and opinion; the former begets knowledge, the later ignorance. Hippocrates
Burdizzo
How long do you want to ignore this user?
In other words, keep your cryptocurrency in a mason jar in the back yard
aTmAg
How long do you want to ignore this user?
May have to switch to OTP. One of the few unbreakable algorithms in existence. Luckily storage is cheap.
Who?mikejones!
How long do you want to ignore this user?
If China steals enough cryptocurrency, wouldn't it become less valuable since there'd be no one to trade with?
Dirty Bird
How long do you want to ignore this user?
aTmAg said:

May have to switch to OTP. One of the few unbreakable algorithms in existence. Luckily storage is cheap.
Sorry for my ignorance, but what is OTP?
Not Coach Jimbo
How long do you want to ignore this user?
If they actually achieved something of great strategic significance you can bet sure as **** the last thing they are going to do is brag about it on the world forum.

RED AG 98
How long do you want to ignore this user?
Burdizzo said:

In other words, keep your cryptocurrency in a mason jar in the back yard
You do realize that virtually all your "real" money at banks, brokerages, and the like is protected by the same means correct? Unless your fiat is in a safe at your house it's just as vulnerable... sure you have FDIC but that's not going to matter much if the US is robbed en masse via this type of exploit.
KingofHazor
How long do you want to ignore this user?
CoachtobeNamed$$$ said:

aTmAg said:

May have to switch to OTP. One of the few unbreakable algorithms in existence. Luckily storage is cheap.
Sorry for my ignorance, but what is OTP?
I had the same question, so googled it and it appears to mean "One Time Password".
aTmAg
How long do you want to ignore this user?
CoachtobeNamed$$$ said:

aTmAg said:

May have to switch to OTP. One of the few unbreakable algorithms in existence. Luckily storage is cheap.
Sorry for my ignorance, but what is OTP?
One Time Pad.

You know, the basic algorithm of adding one to each letter to encrypt? Like A becomes B, B becomes C, C becomes D, and so forth? And then subtract each by one to decrypt? Well instead of adding and subtracting by ONE each time, you have a key with N numbers where N is the length of the message. You add each number to each character to encrypt and you subtract the number to each character to decrypt. Both sides have to have the entire key to encrypt and decrypt. And you use the set of numbers (the key) only once. Thus the "one time" part.

It is truly unbreakable since for any given encrypted message, every possible message of that size could be decrypted given the appropriate key. So from the same message, one could decrypt a super duper secret OR the Gettysburg Address depending on what key they use. So code breakers could never know what the REAL message is.

The problem is that you need to store a lot of key data that use used once per message. So like sending gigabytes of data would require both sides to have gigabytes of key data first.
RED AG 98
How long do you want to ignore this user?
The problem is you still have to figure out how to securely exchange and discard the pad values. Maybe this is ok for your personal datastore but it's not particularly viable for many applications.
tremble
How long do you want to ignore this user?
Sounds like Chicom bull****ting
Bearpitbull
How long do you want to ignore this user?
Loren Visser said:

Who?mikejones! said:

Probably to let us know they stole our tech
Stole it? Heck, Biden, et al sold it to them. But at least they got a board seat out of it.


Oh if facts were just a function of what we wanted to believe, winning elections would be so much easier.
samurai_science
How long do you want to ignore this user?
Quantum computing is the string theory of technolgy. Decades on something that is a failure.
eric76
How long do you want to ignore this user?
No Spin Ag said:

aaronag02 said:

Quantum decrypting hacks like this are all lab demos and smoke and mirrors at this point. Their main value is propaganda and fundraising, with bonus points if you get another lab to brag about outpacing you, at which point you steal from them.
I couldn't agree more.

I went down a small rabbit hole on quantum computers, and even the companies that have been working non-stop on this since the 90s all say it's still about a decade or more until they can be ready to go.

Now, what's being said, and what is the greatest concern, is that there will be no encryption code that a quantum computer won't be able to crack, and it won't be done in hours or minutes but in seconds.

I think it was the person from Google who said that a code that would take years to crack today would be done in a few seconds. Now, that is scary.
There has been a competition gong on for some time to find quantum-proof algorithms for encryption. I have read that they have some good candidates but have no idea what the current state of the competition is.
eric76
How long do you want to ignore this user?
aTmAg said:

CoachtobeNamed$$$ said:

aTmAg said:

May have to switch to OTP. One of the few unbreakable algorithms in existence. Luckily storage is cheap.
Sorry for my ignorance, but what is OTP?
One Time Pad.

You know, the basic algorithm of adding one to each letter to encrypt? Like A becomes B, B becomes C, C becomes D, and so forth? And then subtract each by one to decrypt? Well instead of adding and subtracting by ONE each time, you have a key with N numbers where N is the length of the message. You add each number to each character to encrypt and you subtract the number to each character to decrypt. Both sides have to have the entire key to encrypt and decrypt. And you use the set of numbers (the key) only once. Thus the "one time" part.

It is truly unbreakable since for any given encrypted message, every possible message of that size could be decrypted given the appropriate key. So from the same message, one could decrypt a super duper secret OR the Gettysburg Address depending on what key they use. So code breakers could never know what the REAL message is.

The problem is that you need to store a lot of key data that use used once per message. So like sending gigabytes of data would require both sides to have gigabytes of key data first.
Very true (except I would think an xor would be more likely). One time pads have been broken in the past when someone reused the one time pad for multiple messages.
Owlagdad
How long do you want to ignore this user?
Probably developed the idea behind HEB around Holleman and Anderson or McDonalds at Texas and SW Pkwy.
Then drove to Houston and met others on patio of former Rice University President.
eric76
How long do you want to ignore this user?
Jabin said:

CoachtobeNamed$$$ said:

aTmAg said:

May have to switch to OTP. One of the few unbreakable algorithms in existence. Luckily storage is cheap.
Sorry for my ignorance, but what is OTP?
I had the same question, so googled it and it appears to mean "One Time Password".
There is such a thing as a one time password, but they aren't to encrypt data.

It used to be that a system called S/KEY was quite popular. (I still use it on all my servers.)

For example, the following was the list of S/KEY passwords for an account on a server that no longer works and is to be replaced soon. When the server is replaced, a different set of passwords will be generated.

Quote:

1: REAL GAIT DOOM JAY LEG SOOT
2: RIG HAS FEET GULL INCA NON
3: RAM POE SANE GOAL HURT WAIL
4: HAVE ROOF FINK AIM IBIS DANA
5: DOCK KNEE WEAN SEAL SITU ORB
6: BOAR ROOM TAB RIG MAID SCAN
7: THEN LION MOON TUBA NORM SAN
8: SHOE PUP FAN SUNG CRAG MAGI
9: FOR LETS STAY BURL GALE LESK
10: AMEN RUNS SIS MOP WEB FOND
11: WORM LAIN GEAR BOAT BORG HARK
12: WHAM AURA SUD TIC SEEM CURL
13: WEB FAWN BOOT BARN BOOT MALI
14: SUDS BOLT MOVE SUE GLOB CHOW
15: GAY LAWN ARID BEND MAKE ROOT
16: KIT BASE PIT VEDA PAP FAIN
17: LACY PRY DUE HOFF HAAS ROSS
18: HEN FOSS GOSH SEND GUST JESS
19: DEL BUDD NELL ACE ROAM TINT
20: RUNT NORM JERK TRY MEEK BOYD

When logging on with S/KEY, to forbin on colossus from guardian:
Quote:

guardian( forbin ): login
login: forbin:skey
otp-md5 14 colo34429
S/Key Password:SUDS BOLT MOVE SUE GLOB CHOW (password is not displayed)


colossus( forbin ):

For the next logon, it would change 14 to 13 and ask for "otp-md5 13 colo34429"

SKEY was particularly useful when doing a presentation or other times when you might be recorded since the password would never be used again.

richardag
How long do you want to ignore this user?
Loren Visser said:

Who?mikejones! said:

Probably to let us know they stole our tech
Stole it? Heck, Biden, et al sold it to them. But at least they got a board seat out of it.
You are correct.
This article from 2020 documents the crap the Biden criminal syndicate pulled.
Hunter Biden and China: A timeline of his business ties to the Far East
Among the latter, under pretence of governing they have divided their nations into two classes, wolves and sheep.”
Thomas Jefferson, Letter to Edward Carrington, January 16, 1787
eric76
How long do you want to ignore this user?
Something Bruce Schneier said at https://www.schneier.com/blog/archives/2022/02/breaking-245-bit-elliptic-curve-encryption-with-a-quantum-computer.html about breaking elliptic curve cryptography with a quantum computer:
Quote:

Breaking 256-bit Elliptic Curve Encryption with a Quantum Computer

Researchers have calculated the quantum computer size necessary to break 256-bit elliptic curve public-key cryptography:

Finally, we calculate the number of physical qubits required to break the 256-bit elliptic curve encryption of keys in the Bitcoin network within the small available time frame in which it would actually pose a threat to do so. It would require 317 10^6 physical qubits to break the encryption within one hour using the surface code, a code cycle time of 1 s, a reaction time of 10 s, and a physical gate error of 10-3. To instead break the encryption within one day, it would require 13 10^6 physical qubits.

In other words: no time soon. Not even remotely soon. IBM's largest ever superconducting quantum computer is 127 physical qubits.
If true, then with 127 physical qubits, it should take 2,496,062 hours about 284 years to break one 256 bit elliptic curve cryptography key.

That was from 2022. A web search finds that the largest now is 1180 qubits and that IBM intends to have one with 100,000 qubits in ten years.
WestHoustonAg79
How long do you want to ignore this user?
Jabin said:

CoachtobeNamed$$$ said:

aTmAg said:

May have to switch to OTP. One of the few unbreakable algorithms in existence. Luckily storage is cheap.
Sorry for my ignorance, but what is OTP?
I had the same question, so googled it and it appears to mean "One Time Password".
Hate to admit that I do bc I hate them, but you clearly don't work for a publicly traded organization. I have to click 5 buttons damn near every time I have to access anything other than email on my phone. It blows.
NormanElizabeth
How long do you want to ignore this user?
I know 60 minutes is devil worship in these part, but they did the story about encryption standards being obsolete last year.
Oyster DuPree
How long do you want to ignore this user?
gabehcoud said:

I know 60 minutes is devil worship in these part, but they did the story about encryption standards being obsolete last year.

It's called 60 minutes because their average viewer was born 60 minutes before the dinosaurs went extinct. No one saw that story
AtticusMatlock
How long do you want to ignore this user?
There are algorithms already in use which are designed to be highly quantum resistant. Some industries are working on the switch over.

The problem is there's been so many hacks of encrypted data already that it's all simply been stored waiting on the ability to crack it. 5 years? 10 years? It will get decoded at some point.
InfantryAg
How long do you want to ignore this user?
Loren Visser said:

Who?mikejones! said:

Probably to let us know they stole our tech
Stole it? Heck, Biden, et al sold it to them. But at least they got a board seat out of it.
Presidents have allowed this for years now. The biggest culprits (IMO) are American companies who used china to make their profits, knowing that china was stealing all their technology.

None of this matters if china collapses, which it has been on the verge of for years except, like iran, we keep propping it up.
Over_ed
How long do you want to ignore this user?
NASA recently stopped a demo of Quantum Computing due to "unprecedented" computational ability. General thought is that this was to breakthrough in decryption. Everything that is publically available protected by only by length of key etc will be available to anyone with access to this techonolgy. Especially governments.
kb2001
How long do you want to ignore this user?
There are a few post quantum encryption algorithms being considered for standards adoption. Signal started using one about 18 months ago for their messaging encryprion. Apple started using one earlier this year for iMessage.

Post Quantum Encryption means the algorithm being used isn't weak to quantum computing.
doubledog
How long do you want to ignore this user?
Use Din bizaad, worked for the U.S. in WWII.
FrioAg 00
How long do you want to ignore this user?
If this were real (Chinese making technology break through that shifted national power) they LAST thing they would do is tell anyone.

AustinScubaAg
How long do you want to ignore this user?
Jabin said:

Quote:

In a stunning event that may redefine the battle for dominance in creating impenetrable security networks, Chinese scientists have cracked a military-strength encryption using a quantum computer. This discovery made by the team from Shanghai University spearheaded by Wang Chao, exposed arising concerns that personal and important data in many sectors such as banking, military and crucial infrastructural activities, can be manipulated. The researchers used an optimized quantum computer from D-Wave Systems for hacking of several standard cryptographic algorithms such as Present, Gift-64, and Rectangle. These algorithms constitute the support of the SPN structure applied in AES and regarded by many as one of the most secure encryption technologies at the present.
If this is an accurate report, I'm wondering why the Chinese announced this rather than keeping their capabilities secret as a significant strategic advantage. What is the practical significance of this, both at the national level and to us poor schmucks who are depending on encryption to protect our financial assets and privacy?

Quantum Shadows: The Encryption Crisis - Modern Diplomacy
There is nothing new here.
1. The AES key length is what matters when looking a quantum attacks. 64 bit and 128 are not secure but 256 bit and 512 but are considered quantum resistant.

2. AES is a symmetric algorithm so it is not the main attack vector for since the less quatum secure algorithm used for key exchange is easier to attack with quantum computers.

Page 1 of 2
 
×
subscribe Verify your student status
See Subscription Benefits
Trial only available to users who have never subscribed or participated in a previous trial.