Chinese researchers have reportedly used a D-Wave quantum computer to execute what they claim to be the first successful quantum attack on widely used encryption algorithms, posing a “real and substantial threat” to the security of banking and military sectors. The breakthrough was reported by the South China Morning Post (SCMP), raising alarm among experts as quantum computing edges closer to cryptographic applications.
The research, led by Wang Chao of Shanghai University, marks a significant step in the field, though the quantum threat remains at an early stage. According to Wang’s peer-reviewed paper published in the Chinese Journal of Computers, the attack specifically targeted SPN-structured algorithms. However, it has not yet revealed specific passcodes, highlighting that environmental interference and underdeveloped hardware continue to hinder quantum computing’s cryptographic potential.
A Rising Threat to Encryption Standards
Chinese scientists successfully mounted what they claim is the world’s first effective quantum attack on widely used encryption methods, as detailed by SCMP. The advance, although significant, is limited by technological challenges that for now hold back the full potential of quantum hacks.
“This is the first time that a real quantum computer has posed a real and substantial threat to multiple full-scale SPN structured algorithms in use today,” Wang’s team wrote in the report.
Given the sensitivity of the research, Wang declined to provide further comments to SCMP.
The implications of this development extend to several encryption standards, including those used by military and financial institutions. AES-256, often labeled as military-grade encryption and one of the most secure methods available, might soon be within reach of quantum computers, as suggested by the research team.
Quantum Computing’s Early Stages and the D-Wave Advantage
Despite this advance, the general-purpose quantum computing field is still in its infancy, and there is no immediate risk to modern cryptographic systems. However, specialized quantum computers, such as the one from Canada’s D-Wave Systems used by Wang’s team, are being explored for specific applications—including cybersecurity vulnerabilities. The D-Wave Advantage quantum computer was utilized to target cryptographic algorithms like Present, Gift-64, and Rectangle, all of which are key representatives of the SPN structure foundational for advanced encryption standards.
The D-Wave Advantage, initially developed for practical applications outside of cryptographic hacking, employs quantum annealing. This technique, similar to metallurgy’s heating and cooling process, allows rapid problem-solving by searching for the lowest energy state—akin to guiding a ball through a landscape of hills and valleys. Quantum annealing utilizes quantum tunneling to overcome obstacles more efficiently than traditional algorithms, effectively finding optimal solutions without needing to explore every possible path.
Quantum Annealing Meets Cryptographic Challenges
Wang’s paper described quantum annealing as comparable to an artificial intelligence algorithm capable of optimizing solutions on a global scale. By combining quantum annealing with conventional mathematics, Wang’s team created a novel computational architecture that has redefined how to approach encryption issues as optimization challenges.
According to an anonymous expert cited by SCMP, Wang’s approach is groundbreaking because it presents real-world encryption as a binary optimization problem—something a quantum computer excels at handling.
Current Limitations and Future Potential
While the progress is notable, significant obstacles remain before quantum computers can consistently crack modern cryptographic systems. As Wang pointed out in the study, quantum computing’s development is still hampered by environmental factors, immature hardware, and the challenge of devising a universal attack capable of breaching multiple encryption systems.
The researchers highlighted that although a quantum computer has not yet deciphered specific passcodes for the tested algorithms, they have come closer to achieving this than any previous efforts. Continued advancements could yield increasingly effective quantum attacks, pointing to potential vulnerabilities in existing encryption systems as the technology progresses. Wang’s work suggests that the landscape of cybersecurity may soon need to adapt to the looming possibilities presented by quantum computing.