Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Quantum Research Could Threaten Encryption Schemes

New quantum computers implement algorithm capable of cracking most current encryption codes

Two groups of scientists have separately implemented computing schemes that threaten the assumptions made in modern encryption technology.

Now, we don't pretend to understand the quantum mechanics outlined in the papers filed by researchers at the University of Queensland and by Chao-Yang Lu at China's University of Science and Technology. But here's what we could get out of them:

Many current encryption technologies, such as RSA, rely on the difficulty of computing the prime factors in very large numbers. When cryptologists want to increase the difficulty of encryption, they simply increase the size of the numbers involved, making it harder for any computer to find the solution.

Using an experimental computer based on photonics, the researchers in Australia and China have independently been able to do a full-scale implementation of something called Shor's Algorithm, a non-linear method of factoring composite numbers. Shor's Algorithm breaks many of the rules of linear computing and therefore has no trouble finding the prime factors in any number, no matter how large.

The research shakes the foundation of all types of currently available encryption methods. If the quantum computer can factor any number of any size with equal ease, then, theoretically, no algorithm based on linear computing is safe.

For the moment, enterprise computers seem pretty secure, since you'd have to be a quantum physicist to crack today's codes. However, the findings could force cryptographers and vendors to rethink their current assumptions about the capabilities of computers -- and therefore radically change future generations of encryption technology.

"The full realization of Shor's algorithm will have a large impact on modern cryptography," the University of Queensland researchers say.

After attempting to read both of these papers, we'll have to take their word for it.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • Computer Security Institute (CSI)

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 11/19/2020
    New Proposed DNS Security Features Released
    Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
    How to Identify Cobalt Strike on Your Network
    Zohar Buber, Security Analyst,  11/18/2020
    Register for Dark Reading Newsletters
    White Papers
    Cartoon Contest
    Write a Caption, Win an Amazon Gift Card! Click Here
    Latest Comment: A GONG is as good as a cyber attack.
    Current Issue
    2021 Top Enterprise IT Trends
    We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
    Flash Poll
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2020-11-24
    An unauthenticated client can trigger denial of service by issuing specially crafted wire protocol messages, which cause the message decompressor to incorrectly allocate memory. This issue affects: MongoDB Inc. MongoDB Server v4.2 versions prior to 4.2.1; v4.0 versions prior to 4.0.13; v3.6 versions...
    PUBLISHED: 2020-11-24
    Cross-site request forgery (CSRF) vulnerability in GS108Ev3 firmware version 2.06.10 and earlier allows remote attackers to hijack the authentication of administrators and the product's settings may be changed without the user's intention or consent via unspecified vectors.
    PUBLISHED: 2020-11-24
    Untrusted search path vulnerability in the installers of multiple SEIKO EPSON products allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
    PUBLISHED: 2020-11-24
    includes/CologneBlueTemplate.php in the CologneBlue skin for MediaWiki through 1.35 allows XSS via a qbfind message supplied by an administrator.
    PUBLISHED: 2020-11-24
    The PollNY extension for MediaWiki through 1.35 allows XSS via an answer option for a poll question, entered during Special:CreatePoll or Special:UpdatePoll.