China breaks RSA encryption with a quantum computer

If you logged onto your bank account this morning, the security protocols still seem secure – but things are changing quickly in the tech world. A team in China just showed that the math behind RSA encryption is starting to bend to the will of the quantum realm.

Using a quantum annealing processor built by D‑Wave Systems, the researchers say they factored a 22‑bit RSA integer that had resisted earlier attempts on the same class of hardware. Wang Chao and colleagues at Shanghai University carried out the experiment.

RSA’s reputation for toughness

When RSA encryption debuted in 1977 it was lauded for tying security to the difficulty of splitting a large semiprime into its two prime factors .

Classic computers still need sub‑exponential time to break today’s 2048‑bit keys, and the largest key so far cracked with conventional methods is only 829 bits (RSA‑250) after weeks on a supercomputer.

“Using the D‑Wave Advantage, we successfully factored a 22‑bit RSA integer, demonstrating the potential for quantum machines to tackle cryptographic problems,” the authors wrote.

The group translated factorization into a Quadratic Unconstrained Binary Optimization problem, which the D‑Wave Advantage system solves by letting qubits tunnel through energy barriers seeking the lowest energy state. 

They also applied the same method to Substitution–Permutation Network ciphers such as Present and Rectangle, calling it “the first time that a real quantum computer has posed a substantial threat to multiple full‑scale SPN structured algorithms in use today.”

Twenty‑two bits still matter

A 22‑bit key is trivially small compared with production‑grade RSA, yet the test matters because the approach scaled beyond past demonstrations that stopped at 19 bits and required more qubits per variable.

Reducing the local‑field and coupling coefficients in the Ising model cut noise, letting the annealer reach correct factors more often and hinting at paths to bigger keys, according to the paper.

“The advancement of quantum computers can seriously threaten data security and privacy for various enterprises,” warned Prabhjyot Kaur of analyst firm Everest Group, who was not involved in the study.

Annealing vs. Shor’s promise

Universal, gate‑based quantum machines run Shor’s algorithm, which in principle can shred RSA by finding the period of modular exponentiation in polynomial time.

Those devices still struggle with error correction, while D‑Wave’s annealers, though not universal, already pack more than 5000 qubits and avoid deep circuits by using a chilling 15 mK environment and analog evolution.

Annealing excels at combinatorial optimization, so the Shanghai team reframed factoring as that type of search problem instead of using Shor’s period‑finding route.

The strategy sidesteps current qubit‑count limits of gate machines but pays a price in exponential scaling, which is why only a 22‑bit modulus fell this time.

The policy clock keeps ticking

Standards bodies are not waiting. In August 2024 NIST released FIPS 203, 204 and 205, the first federal standards for post‑quantum cryptography based on lattice problems, and in March 2025 it selected HQC for the next wave. 

A White House event framing the publication urged U.S. agencies to begin swapping vulnerable keys because adversaries may already be hoarding encrypted data for “hack now, decrypt later” attacks.

“Businesses must treat cryptographic renewal like a multi‑year infrastructure project,” the Wall Street Journal’s CIO briefing noted when the final standards neared release last year. Corporate technology leaders echoed that sense of urgency. 

RSA vs. quantum cracking

Most businesses haven’t yet updated their cryptography inventories, and many don’t even know which algorithms their systems depend on.

Security experts recommend starting with an internal audit to identify all uses of RSA, ECC, and other vulnerable algorithms before building a replacement plan.

While full migration may take years, organizations can begin by testing quantum-safe libraries such as Open Quantum Safe, deploying hybrid key exchange methods.

Integrating crypto-agility – the ability to swap cryptographic algorithms without reengineering entire systems – is also a good option. This makes future upgrades less painful as new standards arrive.

What comes next and what to watch

Large‑key RSA is still safe today, yet the study shows that hardware improvements and smarter embeddings keep shaving away at the gap.

D‑Wave plans a Zephyr‑topology processor with more than 7000 qubits later this year, and each topology upgrade improves connectivity, which in turn reduces the number of physical qubits needed per logical variable.

Cryptographers, meanwhile, recommend adopting hybrid schemes that wrap lattice‑based algorithms such as CRYSTALS‑Kyber around classical RSA signatures to provide forward secrecy during the transition period.

Organizations holding sensitive data for decades, health records, genomic files, diplomatic cables, have the most to lose if they wait until a full‑scale quantum computer arrives.

Some observers point out that the Shanghai result relied on heavy classical pre‑ and post‑processing, and that the annealer still required many runs to locate the right factors.

Even so, history shows that cryptanalytic proofs of concept rarely stay small: DES fell to a $250,000 machine in 1998 only four years after the first partial cracks surfaced.

The study is published in the Chinese Journal of Computers.

—–

Like what you read? Subscribe to our newsletter for engaging articles, exclusive content, and the latest updates. 

Check us out on EarthSnap, a free app brought to you by Eric Ralls and Earth.com.

—–



Source link

Visited 1 times, 1 visit(s) today

Related Article

File Photo

Beijing urges US to work with China in ‘addressing root cause of bilateral tensions’

‘China and US must develop new narrative to define constructive framework for engagement between 2 countries,’ says foreign minister The Chinese foreign minister on Wednesday urged the US to work with Beijing in addressing the “root cause” of bilateral tensions to lay a solid foundation for a “stable” and “constructive” relationship between the two major

ET logo

China shows a 0.6 cm spy drone that is smaller than your fingertip but can paralyse a large army: Watch video

China has revealed a mosquito-like flying robot designed for stealth missions, triggering global concern about its potential use in surveillance, cybercrime, and even biowarfare. Developed by China’s National University of Defense Technology (NUDT), the insect-sized drone was recently featured on CCTV 7, the country’s official military channel. Tiny, silent, and built for spying At first

AI and Automotive Deals Deepen High-Tech Industrial Collaboration with China

AI and Automotive Deals Deepen High-Tech Industrial Collaboration with China

Minister for National Economy Márton Nagy paid an official visit to Beijing, where three key economic policy consultations took place with leaders of the National Development and Reform Commission (NDRC), the Ministry of Industry and Information Technology (MIIT) of China and the Chinese Ministry of Finance. The Hungarian Ministry for National Economy emphasized that China

ET logo

India refuses to sign SCO joint statement as China, Pakistan avoid hard line on terror

India on Thursday refused to sign a joint communique at the Shanghai Cooperation Organisation (SCO) Defence Ministers’ meeting in Qingdao, China. The statement, according to Indian officials, as reported by TOI, would have weakened India’s position on terrorism and regional security. Defence Minister Rajnath Singh’s decision meant the ten-member bloc, which includes Pakistan, China, and

China hosts Iranian, Russian defense ministers against backdrop of momentous change

China hosts Iranian, Russian defense ministers against backdrop of ‘momentous change’

QINGDAO Iran’s Defense Minister Amir Nasirzadeh, Kazakhstan’s Defense Minister Dauren Kossanov, China’s Defense Minister Dong Jun, Kyrgyzstan’s Defense Minister Ruslan Mukambetov, and Pakistan’s Defense Minister Khawaja Muhammad Asif gather for a group photo during the Defense Ministers’ Meeting of the Shanghai Cooperation Organization (SCO) Member States in Qingdao, in eastern China’s Shandong province on June

0
Would love your thoughts, please comment.x
()
x