So, while I'm a layman, this smells fishy on a number of levels. From my recollection:
- There isn't any quantum advantage for most symmetric algorithms, including AES. - D-Wave quantum computers are still adiabatic, which (IIRC) means that they can't be used for grover's or shor's algorithm -- and therefore, they're not useful for cracking public key algorithms. - Finally, if I'm wrong about the above two points, if RSA can be attacked, then so can elliptic curves. We'd need to move to lattice based cryptography or isogeny curves. something like ML-KEM (formerly known as Khyber). or NewHope. Reading the SCMP article, it sounds like they managed to attack some simple s-box like algorithms, but not AES. I'm not sure what this has to do with RSA. I'll have to dig up the paper later, but I think this is probably not an imminent threat. Quoth Isaac (.ike) Levy <i...@blackskyresearch.net>: > Noteworthy, this making the rounds, > > https://www.tomshardware.com/tech-industry/quantum-computing/chinese-scientists-use-quantum-computers-to-crack-military-grade-encryption-quantum-attack-poses-a-real-and-substantial-threat-to-rsa-and-aes > > paywalled, > https://www.scmp.com/news/china/science/article/3282051/chinese-scientists-hack-military-grade-encryption-quantum-computer-paper > > About time to go hard with eliptic curves? > > Regardless of how real or not, at the very least it's a good real kick in the > pants toward EC, but the confusion and stigma about compromised, backdoored, > or naively flawed EC implementation needs to be broadly clarified... > > Thoughts? > > Rocket- > .ike > > > _______________________________________________ > talk mailing list > talk@lists.nycbug.org > https://lists.nycbug.org:8443/mailman/listinfo/talk > _______________________________________________ talk mailing list talk@lists.nycbug.org https://lists.nycbug.org:8443/mailman/listinfo/talk