- cross-posted to:
- technology@lemmy.world
- cybersecurity@sh.itjust.works
- cross-posted to:
- technology@lemmy.world
- cybersecurity@sh.itjust.works
cross-posted from: https://lemmy.zip/post/24515831
The research team, led by Wang Chao from Shanghai University, found that D-Wave’s quantum computers can optimize problem-solving in a way that makes it possible to attack encryption methods such as RSA.
Paper: http://cjc.ict.ac.cn/online/onlinepaper/wc-202458160402.pdf
Follow up to https://lemmy.ca/post/30853830
If its true it is a big “achivement”, but it still did not broke RSA.
Speak for yourself. I’m going to migrate all of my 22-bit RSA keys to a longer key length. And not 24 bits, either, given that they’re probably working on a bigger quantum computer already. I gotta go so long that no computer can ever crack it.
64-bit RSA will surely be secure for the foreseeable future, cost be damned.
honestly while I agree that slightly longer keys wont be safe for long , but tbh I’m gonna sit a bit more on my 23-bit RSA keys before migrating
… How about going for a EC key?? Staying with RSA is stupid at this point.
I’m sure he is joking. For example the lowest key size openssl supports is 512 bits and this is really small. Anything below 1024 bits has been considered insecure for a while now. Typical RSA key length is 2048. For a 22 bit RSA key you don’t need a quantum computer, this is so small a laptop CPU can break this in a short time. As with EC crypto: this won’t save you from quantum computer attacks, in fact a typical 256 bit EC key needs less qbits to be broken (1500) then 2048 bit RSA(4096).
…I admit I didn’t do the math with the amount of bits they stated xD. Still, it’s like 10 times the amount of bits, you can get a stronger EC key with 5 times less bits compared to RSA.
It means that if quantum technology improves, the same technique can break higher bit integers. So it’s in fact broken, we just don’t have the future hardware to execute it on yet.