Disaster Crypto-apocalypse soon? Chinese researchers find a potential quantum attack on classical encryption - With an off-the-shelf D-Wave machine, but only against very short keys


Laura Dobberstein
Mon 14 Oct 2024

Chinese researchers claim they have found a way to use D-Wave's quantum annealing systems to develop a promising attack on classical encryption.

Outlined in a paper [PDF] titled "Quantum Annealing Public Key Cryptographic Attack Algorithm Based on D-Wave Advantage", published in the late September edition of Chinese Journal of Computers, the researchers assert that D-Wave’s machines can optimize problem-solving in ways that make it possible to devise an attack on public key cryptography.

The peer-reviewed paper opens with an English-language abstract but most of the text is in Chinese, so we used machine translation and referred to the South China Morning Post report on the paper – their Mandarin may be better than Google's ability to translate deeply technical text.

Between the Post, the English summary, and Google, The Reg understands the research team, led by Wang Chao from Shanghai University, used a D-Wave machine to attack Substitution-Permutation Network (SPN) structured algorithms that perform a series of mathematical operations to encrypt info. SPN techniques are at the heart of the Advanced Encryption Standard (AES) – one of the most widely used encryption standards.

The tech targeted in the attack include the Present and Rectangle algorithms, and the Gift-64 block cipher, and per the Post produced results that the authors presented as “the first time that a real quantum computer has posed a real and substantial threat to multiple full-scale SPN structured algorithms in use today.”

But the techniques used were applied to a 22-bit key. In the real world, vastly longer keys are the norm - usually 2048 or 4096 bits.

The researchers argue that the approach they developed can be applied to other public-key and symmetric cryptographic systems.

The exact method outlined in the report does remain elusive, and the authors declined to speak with the Post due to the implications of their work.

But the mere fact that an off-the-shelf one quantum system has been used to develop a viable angle of attack on classical encryption will advance debate about the need to revisit the way data is protected.

It’s already widely assumed that quantum computers will one day possess the power to easily decrypt data enciphered with today’s tech, although opinion varies on when it will happen.

Adi Shamir – the cryptographer whose surname is the S in RSA – has predicted such events won’t happen for another 30 years despite researchers, including those from China, periodically making great strides.

Other entities, like Singapore’s central bank have warned that the risk will materialize in the next ten years.

Vendors, meanwhile, are already introducing “quantum safe” encryption that can apparently survive future attacks.

That approach may not be effective if, as alleged, China is stealing data now to decrypt it once quantum computers can do the job.

Or perhaps no nation needs quantum decryption, given Microsoft’s confession that it exposed a golden cryptographic key in a data dump caused by a software crash, leading a Chinese crew to obtain it and put it to work peering into US government emails. ®
 
Why do that when you just install hardware backdoors? All the security in the world doesn't matter when you leave the door unlocked.
Not every system has hardware backdoors, and backdoors aren't always useful. If you encrypt something and send it, or upload an encrypted insurance file somewhere, that's secret until cracked. The NSA is known to store encrypted communications so that they can decrypt them in the future. They have been pursuing a quantum computer for that purpose for over a decade now:
󠁔󠁨󠁩󠁳󠀠󠁩󠁳󠀠󠁡󠀠󠁴󠁥󠁳󠁴󠀮
NSA seeks to build quantum computer that could crack most types of encryption (archive)
According to documents provided by former NSA contractor Edward Snowden, the effort to build “a cryptologically useful quantum computer” — a machine exponentially faster than classical computers — is part of a $79.7 million research program titled “Penetrating Hard Targets.” Much of the work is hosted under classified contracts at a laboratory in College Park, Md.
 
Last edited:
I must know what you mean.
I really enjoyed those heartwarming films featuring that St. Bernard. Every time I'm at a barbecue I think of that one scene. Hah! What a lovable rascal. I'd say they should remake it, but if they did it would probably be like a pitbull with a black family named Thelonious or something. At that point it's not much of a remake, you know? More like a reimagining.
 
Back