Quantum Computing Breakthrough: Military-Grade Encryption Hacked

Saturday, 12 October 2024, 04:32

Quantum computing breakthrough leads to military-grade encryption being cracked by Chinese researchers. Utilizing a D-Wave quantum computer, they successfully targeted SPN algorithms, indicating potential threats to cryptographic security. This significant achievement showcases the power of quantum algorithms in overcoming traditional encryption barriers.
Newsbytesapp
Quantum Computing Breakthrough: Military-Grade Encryption Hacked

Quantum Computing Breakthrough in Cryptography

In a stunning achievement, Chinese researchers have cracked military-grade encryption using a D-Wave quantum computer. This breakthrough marks the first successful quantum attack on widely utilized encryption algorithms, specifically the Substitution-Permutation Network (SPN) structures. While specific passcodes remain unbroken, this advancement is an early-stage threat to cryptographic security.

Exploring D-Wave's Quantum Tunneling Effect

The researchers highlighted the unique quantum tunneling effect of D-Wave's special quantum computers, which allows them to bypass local extremes that traditional algorithms struggle to overcome. This capability positions quantum annealing as a form of artificial intelligence (AI) with a focus on global optimization.

Technical Approaches for RSA Cryptography Attacks

  • The first approach transforms the cryptographic attack into a combinatorial optimization problem, solvable via Ising model or QUBO model.
  • The second approach synergizes quantum annealing with classical cryptographic attack methods, optimizing strikes on cryptographic components.

The use of the classical lattice reduction algorithm along with the Schnorr algorithm enhances their approach, while modifications to the Babai algorithm ensure accurate vector determination through quantum tunneling:

  1. Leveraging exponential acceleration capabilities of quantum computing allows computations to yield two rounded direction solutions on each bit of an N-dimensional lattice.
  2. This method effectively searches an exponential solution space that remained inaccessible to traditional computing.

This article was prepared using information from open sources in accordance with the principles of Ethical Policy. The editorial team is not responsible for absolute accuracy, as it relies on data from the sources referenced.


Related posts


Newsletter

Subscribe to our newsletter for the most reliable and up-to-date tech news. Stay informed and elevate your tech expertise effortlessly.

Subscribe