cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Kyaw_Myo_Oo
Contributor III

Chinese researchers break RSA encryption with a quantum computer

Dear all,

The research team, led by Wang Chao from Shanghai University, found that D-Wave's quantum computers can optimize problem-solving in a way that makes it possible to attack encryption methods such as RSA.

https://www.csoonline.com/article/3562701/chinese-researchers-break-rsa-encryption-with-a-quantum-co...


Questions for discussion : How can organizations migrate to quantum-safe encryption without disrupting their existing systems and processes? What are the emerging trends and developments in quantum-safe encryption?

I encourage everyone to share your thoughts and insights on these questions. Thanks in advance.

 

 

Kyaw Myo Oo
Manager , CB BANK PCL
CCIE #58769 | PCNSE | SAA-C03 | CCSM | CISSP | PMP
2 Replies
ericgeater
Community Champion

Following this thread.  

-----------
A claim is as good as its veracity.
Caute_cautim
Community Champion

@Kyaw_Myo_Oo   I think you need to do some good solid evidence - No they did not break RSA encryption, this is all hype at the current time due to the fact the Chinese Universities are funded by the state government.  They would love to see the whole of the Western World running around like headless chickens for starters.   The media love hype, and with the world in flux due to ChatGPT what is correct these days, a misquote ends up as real news - so ask yourself fundamentally is it real?

 

Yes, it will be broken rather like the move from DES to AES it only took a decade to do this and the payments industry only took six years to migrate from SSL V3 to TLS 1.1 - so you see the issue quite plainly.   People are lazy.

 

Go to trust sites such as IBM Quantum Safe for starters or look up the edicts on NIST and Quantum cryptography.  Organisations as per my past postings, have given indications on how to prepare and to start the cryptography journey - but will people heed these, and put them aside until it too late - of course they will - no one likes to spend money or invest in a technical recession.

 

Look at my postings on GSMA and the Financial Sector, they provide a lot of guidance on how to prepare, so start researching, and start carrying out the first step, find out exactly where is your current cryptography being used and within what applications, hardware security modules - create a Cryptographic Bill of Materials or CBOM rather like a Software Bill of Materials - and whilst you are doing it, find out exactly what date is actually encrypted with what cryptographic algorithms, the risk rating, and who owns it too.  

 

Commence preparing - start messaging positively that if you already encrypt your data assets in storage with AES-256 bit then they are resistant to quantum cryptography - so relax a little, as long as you use Galois or GCM Mode encryption.  

 

Do the hard yards, find out where exactly where the data assets are, and what they are encrypted with, and align your risk management policies in accordance with the level of protection you need to protect clients and your organisations assets.

 

Happy to supply additional useful links, but organisations really do need to prepare now, and not leave it for another six years...

 

Regards

 

Caute_Cautim