Slashdot: How Many Qubits Will It Take to Break Secure Public Key Cryptography Algorithms?

Source URL: https://it.slashdot.org/story/25/05/24/0530234/how-many-qubits-will-it-take-to-break-secure-public-key-cryptography-algorithms
Source: Slashdot
Title: How Many Qubits Will It Take to Break Secure Public Key Cryptography Algorithms?

Feedly Summary:

AI Summary and Description: Yes

Summary: Google security researchers have demonstrated a significant reduction in qubit requirements for breaking 2048-bit RSA encryption using quantum computing. This emphasizes the need for timely migration to post-quantum cryptography standards, particularly as outlined by NIST to protect against future quantum threats.

Detailed Description:
The recent findings by Google’s security team illustrate critical advancements in quantum computing that pose potential risks to current encryption standards. The specifics of their research highlight:

– **Reduced Qubit Count:** The researchers have found that 2048-bit RSA encryption could be compromised with a quantum computer utilizing only 1 million noisy qubits over a week, a notable improvement from the previous estimate of 20 million qubits made in 2019.

– **Source of Improvement:**
– **Better Algorithms:** A new algorithm has reduced the operational complexity needed for breaking RSA from 1000 times more to just twice the previous requirement.
– **Error Correction Enhancements:** Tripling the storage density of idle logical qubits through a second layer of error correction allows for better management of qubit errors.

– **Current Quantum Capabilities:** Currently, quantum computers possess about 100 to 1000 qubits with the relevant error rates, indicating we are still not at the point of realizing these theoretical vulnerabilities but moving closer.

– **NIST Standards Alignment:** The National Institute of Standards and Technology (NIST) has proposed post-quantum cryptography standards expected to withstand such quantum attacks. The recommendations stress deprecation of vulnerable systems by 2030 and complete discontinuation by 2035.

– **Industry Adoption:** Google’s proactive approach to integrating standardized post-quantum cryptography (ML-KEM) for internal uses and in products like Chrome underscores the immediate need for organizations to adapt to evolving security standards.

This research serves as a vital signpost for cybersecurity professionals, signaling an urgent necessity to reassess existing encryption practices and transition towards more resilient systems in light of impending quantum advancements. The implications for organizations regarding the security of sensitive data under potential quantum threats are profound, and adherence to NIST’s timelines for migration can be crucial in maintaining organizational security posture.