One-Million-Qubit Machine Can Break 2048-Bit RSA in 7 Days

Key Takeaways

1. Google Quantum AI’s research shows only one million noisy qubits may be needed to break 2048-bit RSA encryption, drastically reducing earlier estimates of 20 million qubits.

2. Key advancements include improved Shor’s algorithm using approximation techniques and enhanced error-correction methods, lowering physical-qubit needs by a factor of twenty compared to 2019 projections.

3. Current quantum hardware, like IBM’s 1,121-qubit Condor and Google’s 53-qubit Sycamore, falls short of the capabilities needed for the proposed encryption-breaking tasks.

4. The future of secure communication is at risk, prompting NIST to advocate for a shift to post-quantum cryptography (PQC) to protect against potential quantum attacks.

5. As quantum algorithms improve and error rates decrease, the gap between theoretical research and practical cryptanalytic attacks is shrinking, posing a significant challenge for hardware developers and policymakers.


A recent preprint from Google Quantum AI has shifted the common beliefs about the hardware necessary to break widely used 2048-bit RSA encryption. The research team has shown on paper that around one million noisy qubits, running non-stop for approximately seven days, would be enough to achieve this. Earlier assessments suggested the need for nearly 20 million qubits, making this new estimate significantly reduce the gap between theoretical possibilities and actual dangers.

Advances in Quantum Computing

The reduction in qubit requirements is driven by two major developments. First, the researchers improved Shor’s factoring algorithm by employing approximation techniques instead of exact modular exponentiation. This adjustment decreases the logical qubits needed without excessively extending the run-time. Secondly, the use of tighter error-correction methods—like layered surface codes combined with “magic-state cultivation”—allows for tripling the storage density of idle logical qubits while managing error rates effectively. Altogether, these innovations lower the physical-qubit needs by a factor of twenty compared to projections from 2019.

Current Hardware Limitations

Despite these advancements, the hardware available today still doesn’t meet the capabilities suggested by the study. Current leading processors, such as IBM’s 1,121-qubit Condor and Google’s 53-qubit Sycamore, are still much smaller. There are plans for the future: IBM aims to develop a 100,000-qubit system by 2033, while Quantinuum is working towards a fully fault-tolerant platform by 2029. Nevertheless, maintaining a million qubits with sufficiently low error rates and executing billions of logical operations over a span of five continuous days presents a substantial engineering challenge.

The Future of Secure Communication

RSA, Elliptic Curve Diffie-Hellman, and other asymmetric encryption methods are the foundation of much of today’s secure communications. Because data that is encrypted now can potentially be decrypted in the future, NIST is advocating for a shift to post-quantum cryptography (PQC) algorithms. The agency plans to phase out vulnerable systems after 2030 and ban them entirely by 2035. Google has already begun implementing the ML-KEM key-encapsulation mechanism within Chrome and its internal systems, indicating a significant move towards quantum-resistant standards in the industry.

This research presents a clear threat model for both hardware developers and policymakers. As quantum algorithms improve and error rates decrease, the divide between what can be done in the lab and what can be executed in a cryptanalytic attack diminishes.

Source:
Link

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *