Many people thought that the ability to crack traditional encryption using quantum computers was years away. If you believe this report it is not only NOT years away, it has already happened.
A team of scientists in China claim to have an effective quantum attack on classical encryption. According to the South China Post, the attack was done using off-the-shelf Canadian quantum computers.
The researchers would not disclose the details of the attack, which they say compromised the substitution-permutation network (SPN) algorithms used in AES, the current US standard for encryption, including for much of the military.
What does this cloak and dagger refusal mean?
MAYBE, it doesn’t really work, but China wants to scare us or it works in certain cases but not generally.
OR, it works really well and the Chinese government wants to use it. AGAINST US!
OR, They want to get 30 seconds of fame at some conference.
To quote Clint Eastwood, are you feeling lucky, punk?
The paper was peer reviewed, so that is worth a little bit.
Assuming it is what is behind door number 2 and it works well, then that is, shall we say, a bit of a problem. That means, if true, that encryption no longer protects either the privacy or the integrity of data which is encrypted using AES, which is most data.
In any case, I think whether this particular attack is real or not, this is a wakeup call for folks that use or develop software and assume that the encryption will protect your data when it no longer will protect you.
Now would be a good time to start working on a quantum resistant encryption plan. If you need help with this, please contact us.
Credit: Cybernews