{"id":17734,"date":"2024-10-14T10:39:29","date_gmt":"2024-10-14T07:39:29","guid":{"rendered":"https:\/\/forklog.com\/en\/chinese-scientists-use-quantum-computer-to-breach-cryptographic-algorithms\/"},"modified":"2024-10-14T10:39:29","modified_gmt":"2024-10-14T07:39:29","slug":"chinese-scientists-use-quantum-computer-to-breach-cryptographic-algorithms","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/chinese-scientists-use-quantum-computer-to-breach-cryptographic-algorithms\/","title":{"rendered":"Chinese Scientists Use Quantum Computer to Breach Cryptographic Algorithms"},"content":{"rendered":"<p>Chinese scientists have conducted the &#8220;world&#8217;s first effective attack&#8221; on a widely used encryption algorithm using a quantum computer, according to <a href=\"https:\/\/www.scmp.com\/news\/china\/science\/article\/3282051\/chinese-scientists-hack-military-grade-encryption-quantum-computer-paper\">SCMP<\/a>.<\/p>\n<p>The breakthrough poses a &#8220;real and substantial threat&#8221; to the long-standing password protection mechanism employed in critical sectors such as banking and the military, researchers claim.<\/p>\n<p>A team led by Wang Chao from Shanghai University utilized a quantum computer from the Canadian company D-Wave Systems. With it, they managed to breach the Present, Gift-64, and Rectangle algorithms. These algorithms represent a <span data-descr=\"Substitution-Permutation Network \u2014 a type of symmetric cryptographic algorithm where data encryption occurs through multiple stages of substitutions and permutations to achieve a high level of security.\" class=\"old_tooltip\">SPN<\/span> structure, which forms the basis of the Advanced Encryption Standard <span data-descr=\"Advanced Encryption Standard \u2014 a modern standard of symmetric block encryption widely used for data protection.\" class=\"old_tooltip\">AES<\/span>, employed in military and financial sectors as well as in crypto wallets.<\/p>\n<p>Wang&#8217;s article <a href=\"https:\/\/cointelegraph.com\/news\/scientists-breach-crypto-algorithms-quantum-computer-report\">discusses<\/a> the use of <span data-descr=\"a method for solving complex optimization problems using quantum computing. It is based on the principles of quantum mechanics and uses the phenomenon of tunneling to find optimal solutions for problems that are difficult or impossible to solve efficiently on classical computers.\" class=\"old_tooltip\">quantum annealing<\/span> technology as an analogue of an artificial intelligence algorithm capable of optimizing solutions on a global scale.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;This is the first instance where a quantum computer has posed a real and substantial threat to several full-scale structured SPN algorithms in use today,&#8221; Wang&#8217;s team stated.<\/p>\n<\/blockquote>\n<p>Existing factors such as environmental conditions, hardware limitations, and the complexity of developing a unified attack algorithm will hinder full-scale quantum hacking, the researchers note.<\/p>\n<p>In the test, the scientists did not obtain specific passwords, but they &#8220;achieved more success than before.&#8221;<\/p>\n<p>They noted that further developments could lead to more robust quantum attacks and uncover new vulnerabilities in existing cryptographic systems.<\/p>\n<p>Back in March, Vitalik Buterin <a href=\"https:\/\/u1f987.com\/en\/news\/vitalik-buterin-proposes-quantum-resistant-strategy-for-ethereum\">proposed a method<\/a> to protect Ethereum from quantum computers.<\/p>\n<p>In August, experts <a href=\"https:\/\/u1f987.com\/en\/news\/cybersecurity-roundup-bitcoin-stealing-ai-translator-post-quantum-encryption-and-more\">introduced encryption standards<\/a> to counter high-tech hacking methods.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chinese scientists have conducted the &#8220;world&#8217;s first effective attack&#8221; on a widely used encryption algorithm using a quantum computer, according to SCMP. The breakthrough poses a &#8220;real and substantial threat&#8221; to the long-standing password protection mechanism employed in critical sectors such as banking and the military, researchers claim. A team led by Wang Chao from [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":17733,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[575,1360],"class_list":["post-17734","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-quantum-computers","tag-quantum-computing"],"aioseo_notices":[],"amp_enabled":true,"views":"24","promo_type":"","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/17734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=17734"}],"version-history":[{"count":0,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/17734\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/17733"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=17734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=17734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=17734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}