Quantum Computing Breakthrough Could Crack ECC Cryptography, Exposing Internet Secrets Claims PsiQuantum Researcher (2024)

Researchers have developed a novel fault-tolerant quantum computing architecture that could significantly reduce the resources needed to break commonly-used cryptographic systems. The active-volume architecture uses photonic components to reduce costs in quantum arithmetic, which is essential for cryptographic applications. The researchers found that small adjustments to existing elliptic curve cryptography (ECC) quantum algorithms could reduce the number of gates required for breaking ECC by up to 80%. Despite these breakthroughs, cracking 256-bit ECC keys still requires a quantum computer with millions of physical qubits, much larger than the first generation of useful, fault-tolerant quantum computers.

Researchers at PsiQuantum have developed a quantum computing architecture that could crack elliptic curve cryptography (ECC) keys up to 700 times faster than current methods. The team made minor adjustments to existing ECC quantum algorithms, reducing the required quantum gates by up to 80%. The new active-volume architecture leverages non-local connections from photonic components to reduce costs in quantum arithmetic needed for cryptographic applications. Despite the breakthrough, cracking 256-bit ECC keys still requires a quantum computer with millions of physical qubits, much larger than the first generation of fault-tolerant quantum computers.

Quantum Computers and Cryptography

Quantum computers have the potential to crack cryptographic systems that are currently used to secure digital communications. Public-key cryptographic systems, such as RSA and elliptic curve cryptography (ECC), rely on mathematical operations that are easy to apply for encoding but difficult to reverse for decoding. The difficulty of decoding these operations makes them secure, as it would take conventional computers an impractical amount of time to reverse the process.

However, quantum computers can efficiently reverse the mathematical operations at the heart of RSA and ECC, making them vulnerable to being broken. Breaking 256-bit ECC keys is easier than breaking 2048-bit RSA keys because shorter keys require fewer resource-intensive arithmetic operations.

Improving Quantum Algorithms for ECC

Researchers have found ways to improve existing ECC quantum algorithms, reducing the number of gates required for breaking ECC by up to 80%. This is achieved through two main modifications:

  1. Reusing the prepared state from the first half of the quantum algorithm for cracking ECC, which results in up to a 50% reduction in the number of quantum operations needed per key.
  2. Applying a known trick in the literature that allows for performing multiple modular multiplicative inversions for the price of one, providing an additional cost reduction of up to 60% per key cracked by the quantum algorithm.

Active Volume Architecture

A novel fault-tolerant quantum computing architecture called active volume architecture has been introduced, which leverages the unique non-local connections available from photonic components to reduce costs in quantum arithmetic needed for cryptographic applications substantially.

This architecture requires a different perspective on resources, deconstructing algorithms into larger subroutines with associated costs to determine the overall cost of the algorithm. The non-local connections leveraged in active volume architectures significantly reduce the number of quantum operations needed to crack an ECC key by a factor ranging between 300-700.

The Future of Cryptography and Quantum Computing

Cracking 256-bit ECC keys still requires a quantum computer with millions of physical qubits, much larger than the first generation of useful, fault-tolerant quantum computers. However, researchers are preparing for this eventuality by developing post-quantum cryptography schemes such as lattice cryptography and recommending longer RSA or ECC keys.

These approaches are suspected to be secure against quantum algorithms, and other developing quantum technologies can offer encryption schemes that are provably secure against quantum algorithms.

Responsible Deployment of Quantum Computing

Quantum computing is a powerful technology with the potential to easily break the cryptographic systems we rely on every day. Companies and organizations developing quantum computers carry a serious responsibility to ensure that quantum computing is deployed in a responsible and appropriately transparent way. This is why researchers are choosing to publish their methods in the public domain, allowing for further development and scrutiny of these powerful technologies.

“Quantum computing is a powerful technology, and it is striking to realize that quantum computers will be able to easily break the cryptographic systems which we rely on every day.”

Summary

Researchers have developed a novel fault-tolerant quantum computing architecture that significantly reduces the resources needed to break elliptic curve cryptography (ECC) keys, making it easier for quantum computers to crack cryptographic systems. However, cracking 256-bit ECC keys still requires a quantum computer with millions of physical qubits, much larger than the first generation of useful, fault-tolerant quantum computers.

  • Researchers have estimated the scale of quantum computers needed to break a commonly-used cryptosystem, considering a novel fault-tolerant quantum computing architecture.
  • Secure digital communications rely on the success of public-key cryptographic systems, such as RSA and elliptic curve cryptography (ECC).
  • Both RSA and ECC keys are susceptible to being broken by quantum computers, which can efficiently reverse the mathematical operations at the heart of these systems.
  • The researchers found that small adjustments to existing ECC quantum algorithms can significantly reduce the number of gates required for breaking ECC by up to 80%.
  • The active volume architecture used in the study led to a remarkable reduction in the number of quantum operations needed to crack an ECC key by a factor ranging between 300-700.
  • Cracking 256-bit ECC keys still requires a quantum computer with millions of physical qubits, which is much larger than the first generation of useful, fault-tolerant quantum computers.
  • Researchers are preparing for the eventuality of quantum computers breaking cryptographic systems by developing post-quantum cryptography schemes and recommending the use of longer RSA or ECC keys.
  • Quantum computing is a powerful technology with high potential impact, and companies and organizations developing quantum computers have a responsibility to ensure their responsible and transparent deployment.

Read the publication here.

Tags:

active-volume architecture cryptographic systems ECC elliptic curve cryptography fault-tolerant quantum computing photonic components physical qubits quantum algorithms quantum arithmetic

Quantum Computing Breakthrough Could Crack ECC Cryptography, Exposing Internet Secrets Claims PsiQuantum Researcher (2024)
Top Articles
Could Quantum Computers Defeat Bitcoin? Not So Fast. - Decrypt
Lifeline Breach and Clear Legendary skin
Umbc Baseball Camp
COLA Takes Effect With Sept. 30 Benefit Payment
Mileage To Walmart
Koordinaten w43/b14 mit Umrechner in alle Koordinatensysteme
Melfme
Where's The Nearest Wendy's
Guardians Of The Galaxy Vol 3 Full Movie 123Movies
Identogo Brunswick Ga
Aspen.sprout Forum
Alejos Hut Henderson Tx
Cinebarre Drink Menu
Wisconsin Women's Volleyball Team Leaked Pictures
Chastity Brainwash
iZurvive DayZ & ARMA Map
Vandymania Com Forums
Transactions (zipForm Edition) | Lone Wolf | Real Estate Forms Software
Sea To Dallas Google Flights
Mj Nails Derby Ct
Soulstone Survivors Igg
Pocono Recird Obits
Buying Cars from Craigslist: Tips for a Safe and Smart Purchase
Nsa Panama City Mwr
Costco Gas Hours St Cloud Mn
Regina Perrow
Roanoke Skipthegames Com
Weather October 15
Florence Y'alls Standings
Proto Ultima Exoplating
What Is The Lineup For Nascar Race Today
Learn4Good Job Posting
Manuel Pihakis Obituary
Orange Pill 44 291
Most popular Indian web series of 2022 (so far) as per IMDb: Rocket Boys, Panchayat, Mai in top 10
24 slang words teens and Gen Zers are using in 2020, and what they really mean
Lucky Larry's Latina's
The Legacy 3: The Tree of Might – Walkthrough
Toth Boer Goats
Barstool Sports Gif
Kb Home The Overlook At Medio Creek
Doublelist Paducah Ky
Ferhnvi
Petfinder Quiz
DL381 Delta Air Lines Estado de vuelo Hoy y Historial 2024 | Trip.com
Join MileSplit to get access to the latest news, films, and events!
Motorcycle For Sale In Deep East Texas By Owner
How to Do a Photoshoot in BitLife - Playbite
Solving Quadratics All Methods Worksheet Answers
Strange World Showtimes Near Atlas Cinemas Great Lakes Stadium 16
Gainswave Review Forum
Latest Posts
Article information

Author: Edmund Hettinger DC

Last Updated:

Views: 6059

Rating: 4.8 / 5 (58 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Edmund Hettinger DC

Birthday: 1994-08-17

Address: 2033 Gerhold Pine, Port Jocelyn, VA 12101-5654

Phone: +8524399971620

Job: Central Manufacturing Supervisor

Hobby: Jogging, Metalworking, Tai chi, Shopping, Puzzles, Rock climbing, Crocheting

Introduction: My name is Edmund Hettinger DC, I am a adventurous, colorful, gifted, determined, precious, open, colorful person who loves writing and wants to share my knowledge and understanding with you.