Chinese researchers have reportedly achieved a significant milestone in quantum computing by mounting what they claim is the first successful quantum attack on widely used encryption algorithms. Led by Wang Chao from Shanghai University, the team utilized a D-Wave quantum computer to breach cryptographic protocols, raising alarms about the security of critical sectors such as banking and military.
Their study, published in the Chinese Journal of Computers on September 30, showcases a substantial advancement in quantum computing capabilities. The researchers employed the D-Wave Advantage machine, originally designed for practical applications like logistics, to target algorithms based on the Substitution-Permutation Network (SPN) structure. These SPN algorithms form the backbone of widely deployed encryption standards, including AES-256, which is regarded as the gold standard for military and financial security.
Also Read: Hackers Misusing ChatGPT Easier to Detect: OpenAI Report
This development marks the first instance where a real quantum computer poses a genuine threat to full-scale SPN-structured algorithms currently in use. Although specific passcodes were not compromised, the researchers caution that quantum computers could soon challenge the integrity of modern encryption systems.
Quantum computers function on principles significantly different from those of classical computers, employing quantum annealing and tunneling to solve complex problems more efficiently. Wang’s team combined these quantum techniques with conventional mathematical methods to devise a new computational approach capable of breaching various SPN algorithms, including Present, Gift-64, and Rectangle.
Despite this breakthrough, the researchers acknowledge that quantum computing still faces limitations, such as hardware immaturity and environmental interference, which hinder the technology’s full potential. While no immediate breaches have been reported, experts are closely monitoring the rapid advancements in quantum computing, as they could unlock new vulnerabilities in current encryption standards.