Chinese scientists hack military grade encryption on quantum computer: paper
Chinese scientists hack military grade encryption on quantum computer: paper

Chinese scientists hack military grade encryption on quantum computer: paper

Chinese scientists hack military grade encryption on quantum computer: paper
Chinese scientists hack military grade encryption on quantum computer: paper
I love how it did not at all explain what they broke. It mentioned "rectangle"? Whats that? How does it have any relation to AES? Because AES is NOT vulnerable to quantum computing. Did they get the key by knowing the ciphertext and the original data?
It'd be nice if it, you know, linked to the actual paper. The article reads like it was written by someone who knows cryptography words but had no clue what they mean.
It was probably written by these fancy autocomplete things.
I have not been following the quantum computing attacks on cryptography, so I'm not current here at all.
I can believe that current AES in general use cannot be broken by existing quantum computers.
But if what you're saying is that AES cannot be broken by quantum computing at all, that doesn't seem to be what various pages out there say.
https://crypto.stackexchange.com/questions/6712/is-aes-256-a-post-quantum-secure-cipher-or-not
All we need to do to make AES secure is double the size of the key. That's it.
Bump AES to a min 1024 and you buy time.
Then why are hashes secure?
Interesting. I know things like SimpleX use padding to force each message block to be a multiple of 16KB
Yeah, appears propaganda-y, they even mention that "Despite the slow progress in general-purpose quantum computing, which currently poses no threat to modern cryptography", very weird. Supposedly used Canadian technology.
Canadian technology? So they politely asked for the private key then
Perhaps it's: military grade (40 years ago)
AES works with a shared key. This won't work when you want to have an encrypted connection with a webshop (how would you get the key over there in a secure way?). For this you have asynchronous key algorithms such as RSA en ECDH. These algorithms can make a secure connection without anything preshared. Usually this is used to compute a shared key and then continue over AES. These asynchronous algorithms are at risk of being cracked with quantum computers.
You attack kex, so dh or rsa (ie shors) , which we're moving away from (very slowly).
Ecc is better for similar keylengths, but you need lattice to really resist quantum.
My guess they hit old rsa, still a standard but being deprecated everywhere.
You can't really hit the sboxes, they're just this side of otp.
Key exchange is mostly discrete logarithm, ie you use modulo to hide/destroy data making it hard for anyone to figure it out without guessing wildly.
The article says they hit AES, which doesn't make much sense. Block ciphers aren't vulnerable to QC in the same way as public key crypto. Even so far as Grover's Algorithm would help at all, it's far from being practical.