cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Caute_cautim
Community Champion

Has RSA-2048 bit encryption been broken by Quantum Computing?

Hi All

 

A statement has been made by https://www.linkedin.com/in/edgerck/

 

"Today, we could announce it. Quantum computing (QC) has become a reality. We broke the RSA -2048 key. Ron Rivest is a dear friend, but that was needed to advance.

The QC version used here has simultaneous multiple-states logic (following ‘all states at once’), with more than a googol of possible states."

 

A googol is 100 zeros:

 

A googol is 10 to the 100th power, which is 1 followed by 100 zeros. While this is an unimaginably large number, there's still an infinite quantity of larger numbers.


"We show that the equivalence of QC techniques (with IBM, Google and others compared with our version of QC) has been hidden for about 2,500 years – since Pythagoras.

All our QC computations were done in a commercial cellphone, or a commercial Linux desktop, as our QC devices -- opening the user market to many industries. No cryogenics or special materials were used.

A post-quantum, HIPAA compliant, end-to-end, patent-free, export-free, secure online solution, is being created, based on ZSentry as used from 2004 to 2014, to replace RSA. One needs a quantum-resistant algorithm, because all existing public-key encryption can be broken.

The U.S. NIST needs to deprecate RSA today! Otherwise, SNDL continues.

 

Is it true, apparently he will be making an official announcement or is this just a Halloween joke?

 

We factored (and published in LinkedIn) numbers with more than 10^1000 decimal digits, and the capital cost was less than $1,000.

The quantum computing (QC) version used here uses simultaneous multiple-states logic (following ‘all states at once’), with more than a googol of possible states.

We show that the equivalence of QC techniques (with IBM, Google and others compared with our version of QC) has been hidden for about 2,500 years – since Pythagoras.

All our computations were done in a commercial cellphone, or a commercial Linux desktop, as our QC devices -- opening the user market to many industries. No cryogenics or special materials were used.

A post-quantum, HIPAA compliant, end-to-end, patent-free, export-free, secure online solution, is being created, based on ZSentry as used from 2004 to 2014, to replace RSA. One needs a quantum-resistant algorithm, because all existing public-key encryption can be broken.

We further present 8 empirical conjectures, all supported by experiments, that should be helpful in the further development of QC, and applications to other areas. Applications to healthcare and cosmology are suggested."

(In publication)


https://www.youtube.com/watch?v=-UrdExQW0cs

 

Awaiting an official announcement.

 

If this is true, we have a serious issue worldwide!

 

Let the debate commence......

 

Regards

 

Caute_Cautim

 

26 Replies
Jaccovantuijl
Viewer II

According to Amazon the guy released a new book every day in 2019, one if them with the title "The Wikipedia Experiment: Falsification and Knowledge Decay"

Caute_cautim
Community Champion

@Jaccovantuijl   There are a lot of experts seeking answers at the present time - never state something is fake, until it is proven to be fake.   Doing so, just creates conspiracy theories, we have enough of those polluting the world as it is.

 

https://www.databreachtoday.com/blogs/researcher-claims-to-crack-rsa-2048-quantum-computer-p-3536

 

Everyone is waiting for proof of the theory - the world awaits.

 

In the meantime, I suggest everyone prepare it is inevitable, don't wait until it is too late.

 

Regards

 

Caute_Cautim

denbesten
Community Champion


@Jaccovantuijl wrote:

The research is fake

What lead you to this conclusion? Citing sources or your own research methodology would strengthen your case. 

 

@Caute_cautim wrote:

never state something is fake, until it is proven to be fake.  


To be fair, given the state of US politics, I don't know what the word "fake" means anymore.  It seems to have adopted a new definition of "although true, it casts me in a bad light". 

 

denbesten
Community Champion




@Jaccovantuijl wrote:

According to Amazon the guy released a new book every day in 2019, one if them with the title "The Wikipedia Experiment: Falsification and Knowledge Decay"


One needs to be careful about ad-hominem arguments.  At question is his allegedly developing a ground-breaking factoring algorithm, not his stance on Wikipedia.

 

A publishing frequency on  Amazon self-publishing (KDP) really does not tell one very much.  It could be as simple as somebody attempting to monetize their prior works.  KDP has no editorial controls and has few barriers-to-entry (e.g. they are "free").  Therefore on its own, publishing through them neither contributes to nor hurts one's reputation.  Instead, I would look at the ratings/reviews, paying particular attention to those with insightful commentary (or lack thereof).  Doing so is not hard in that this particular author has a grand total of 9 ratings across all 23 titles on his author page.

JoePete
Advocate I


@Caute_cautim wrote:

His claim is that using their techniques using a commercial cellphone and Quantum Computing RSA-2048 Bit and that it is pathologically broken. 


I have to admit when I read that, it sounded like claims about cold fusion. That said, the math has always been there to derive a private key from a public one. In the context of large primes and modular arithmetic, it's plausible that there is some previously unseen approach that can reduce the work factor. The idea of a backdoor in public-key cryptosystems isn't fantasy either.

denbesten
Community Champion


@JoePete wrote:
it sounded like claims about cold fusion. That said, the math has always been there to derive a private key from a public one. 

Completely agree.

 

Encryption has long been an arms-race, with old algorithms being broken and new ones being developed.  This is just another (perhaps big) step in a never-ending journey.  Eventually, RSA will go the same way as RC4 and 3DES.

 

The future path is already being paved.  NIST released "provisional results" for its quantum-safe crypto algorithms" about a year ago and expects to finalize their recommendation in about a year. [cite].  Following that, we can expect new versions of TLS, SSH, CA/Browser-Forum standards, etc.  Then, lots of app/OS version bumps and pleas from everyone to upgrade and disable.

 

My only concern is that the bad guys do not catch up before the good guys are ready.

 

 

Early_Adopter
Community Champion

This is a very exiting topic, but there isn’t reallly enough data - so let’s wildly extrapolate:

https://m.youtube.com/watch?v=0HLBCMwyxo4
Caute_cautim
Community Champion

@Early_Adopter @denbesten   No need to speculate, it is under international scrutiny by cryptographic experts.

 

They will get to the bottom of this situation, I am very sure indeed.

 

As the originator states wait and see.

 

Either come up with the proof, or it puts his own company in a bad light "ZSentry".

 

Regards

 

Caute_Cautim

Early_Adopter
Community Champion

@Caute_cautim have a look at that you tube link, a) it’s very funny and b) it illustrates the practice of jumping to conclusion via media frenzy very succinctly…
Early_Adopter
Community Champion

@denbetsen absolutely, if there’s one component you want to keep updated and be ready to update very quickly it’s OpenSSL.