Highest encryption cracked with quantum computers?

Highest encryption cracked with quantum computers?
Advertising

Share post

The currently highest encryption is the RSA-2048 key. The researcher Ed Gerck Ph.D, physicist and mathematician, now claims to have cracked this using a quantum computer. If all of this were true, all companies would have to put the topic of post-quantum cryptography – i.e. quantum-secure encryption – at the top of their to-do list.

The news that researcher Ed Gerck claims to have cracked the RSA-2048 key is currently stirring up a lot of dust. He also claims to have achieved this with a commercial mobile phone or Linux desktop. Ultimately, this would mean that many encryptions for access and passwords in the future would be anything but secure. Gerck, a researcher and founder of Planalto Research, a self-described research institution, claims to have undermined the most secure version of the RSA security protocol. Ed Gerk is no stranger: he has been working in the field of encryption his whole life. At least that's what his own vita shows.

Advertising

Researchers skeptical: RSA-2048 key cracked

Gerk has announced his success on various portals, like here on LinkedInHe himself writes in somewhat philosophical tones: "Today we were able to announce it. Quantum computing (QC) has become a reality. We have cracked the RSA-2048 key. Ron Rivest is a good friend, but this was necessary to make progress." You have to know that Ron Rivest is a cryptologist who developed the RSA encryption.

Gerk continues: "The version of QC (quantum computing) used here has simultaneous multi-state logic (along the lines of 'all states at once'), with more than a googol of possible states. We show that the equivalence of QC techniques (with IBM, Google and others compared to our version of QC) has been hidden for about 2.500 years - since Pythagoras. All of our QC calculations were performed in a commercial mobile phone or a commercial Linux desktop, as our QC devices opened the user market to many industries. No cryogenics or special materials were used."

Advertising

However, many comments on his announcement are very cautious and await the published scientific work. He is currently only distributing these individually upon request. However, the general public will not be able to read anything from such a publication anyway.

Post-quantum cryptography – otherwise all passwords will become insecure

Researcher Gerk concludes: "A post-quantum, HIPAA-compliant, end-to-end, patent-free, export-free and secure online solution is being developed based on ZSentry, as used from 2004 to 2014 to replace RSA. A quantum-resistant algorithm is needed because all existing public key encryptions can be cracked. The US NIST must mark RSA as obsolete today! Otherwise SNDL will continue."

SNDL stands for "store-now-decrypt-later". Apparently, cyber criminals are already collecting highly encrypted password files in order to decrypt them later with the right computing power. Google is already using a quantum-safe encryption method (post-quantum cryptography) in its latest version of the Chrome browser. The quantum-safe key encapsulation method in the Chrome browser protects the exchange of symmetric keys when establishing secure TLS connections.

Other companies should also act with similar foresight, who are currently investing in their security infrastructures. You should make sure that these technologies are crypto-agile. This allows a cyber security system to quickly switch to an alternative, new crypto system without making significant changes to the IT system or cyber security system (system architectures, protocols, etc.).

 

Matching articles on the topic

Sophisticated Phishing-as-a-Service (PhaaS) platform

Security researchers have uncovered a sophisticated Phishing-as-a-Service (PhaaS) platform that poses a serious threat to organizations around the world. The threat actor ➡ Read more

PDFs: The Trojan Horses of Hackers

Cybercriminals are increasingly using the popular PDF file format to hide malicious code. Recent IT forensics findings underscore this: 68 ➡ Read more

Maximum IT security for OT systems

OT systems are rarely attacked directly. However, gaps and vulnerabilities in traditional IT make OT systems more vulnerable to attacks. ➡ Read more

IT resilience: cybersecurity at the storage level

More data security features for greater IT resilience at the storage level: Cyber ​​security managers can pursue a proactive data security approach at the storage level with highly secure NetApp storage and thus ➡ Read more

Algorithms for post-quantum cryptography

A provider of IT security solutions introduces Quantum Protect, a post-quantum cryptography application suite for its u.trust General Purpose Hardware Security Modules (HSMs) ➡ Read more

Power grid threat: security gaps in solar systems

A cybersecurity solutions provider published its research report “SUN:DOWN – Destabilizing the Grid via Orchestrated Exploitation of Solar Power Systems”, which ➡ Read more

Cloud and SaaS security is inadequate

A recent study shows that companies' security strategies are failing to keep pace with the rapid adoption of cloud-native technologies. 28 ➡ Read more

OT environments: Detect and assess threats

Enterprises with limited resources can identify, assess, and make informed decisions about threats in OT environments with a comprehensive endpoint protection solution. ➡ Read more