China announces that it has cracked the main encryption algorithm

Chinese researchers announce that they have cracked RSA: the main encryption algorithm, used by banks, data storage systems, couriers or even cryptocurrency blockchains. This is potentially a cybersecurity disaster, but some experts doubt that claim…

L’quantum computing offers a lot of promise, but also poses a serious threat to cybersecurity. Since the appearance of this technology, many experts fear that quantum computers will be able to outsmart encryption algorithms used at present.

As a reminder, encryption protects data and information even if intercepted by hackers or other third parties. Consult our complete file on encryption at this address.

Quantum computers are able to perform operations on data at significantly faster than conventional computers. They are much more powerful than a PC, and will therefore make it possible to create new, more robust encryption systems. The other side of the coin: they might be exploited to circumvent current encryption systems.

From then on, all currently encrypted messages, passwords and other files might be decrypted. Therefore, Quantum Computing might sign the end of data privacy

Encryption is also at the heart of blockchains like the bitcoin network and most cryptocurrencies. In the event of breaking the algorithms used by these decentralized systems, hackers would be able to plunder crypto wallets.

And unfortunately, there was no need to wait for this new form of computing to become democratized for the disaster to occur. While scientists thought this problem would only arise in a few years, Chinese researchers have just announced that they have succeeded to crack the main encryption algorithm thanks to quantum.

In a published study in December 2022, a group of Chinese researchers claim to have used quantum computers to crack the standard RSA algorithm used by many industries including banking, mobile telephony or data storage

These researchers used their own algorithm to factor a number with 48 bits on a 10-Qubit quantum computer. They haven’t tried to extend the experiment to a larger system yet.

Technical prowess, or geopolitical “flex”?

This announcement is very worrying for global cybersecurity, but many experts believe that this feat is simply impossible at the moment. According to the CEO of Global Quantum Intelligence, it’s regarding ” biggest hoax in 25 years ».

According to this specialist, this study does not announce anything really new “. He believes that this paper aims to create buzz by surfing on the hype around Quantum Computing, and that it is not a variant of existing approaches and methods. He also lacks a proof of concept » which would demonstrate the breaking of current encryption standards.

According to him, it will take probably wait ten years for quantum computing to allow a major breakthrough. Either way, it confirms that data storage providers need to start worrying now…

Likewise, while Bitcoin has never been successfully hacked, many fear that a brute force attack carried out using quantum computers one day make it happen. Such an attack consists of using many combinations until guessing the decryption keys by chance, but can take several decades to succeed with current computers. A quantum computer might theoretically achieve this in hours.

According to the COO of blockchain security firm Halborn, this would spell disaster for the cryptocurrency market. However, he is convinced that the hackers will first decipher the mountains of data stolen over the yearsstill encrypted and unusable.

He, too, does not believe that the Chinese researchers have truly accomplished this feat, as he is convinced that they would not say anything regarding it if they were actually able to crack the cipher. According to him, they would directly exploit this flaw without saying a word regarding it

Share:

Facebook
Twitter
Pinterest
LinkedIn

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Recent Articles:

Table of Contents