TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Breaking RSA Security with a Low Noise D-Wave 2000Q Quantum Annealer

111 pointsby adulauabout 5 years ago

10 comments

osamagirl69about 5 years ago
This is pretty impressive, they were able to factor a 17 bit number (103459 = 337 * 307) using 1635 physical qubits (arranged as 73 logical qubits) using QUBO. In this configuration they were able to achieve an average time to solution of just under 100ms.<p>That said, they did pick an &#x27;easy&#x27; number to factor, just like most other quantum factorization results. This number could easily be factored using Fermat&#x27;s factorization method (only the first step is required). It would have been very interesting to see a list of all primes and the time required to factor them (since they claim it only takes 100ms to factor the 17 bit one, such an experiment should be able to run in a day...).<p>For an extreeme case of this class of &#x27;cheating&#x27; compare to the largest number factored on a quantum computer (1,099,551,473,989 =1,048,589 * 1,048,601) which only actually takes 3 qubits to calculate [1]<p>They also estimate that in order to factor a 2048bit number it would require just under a million logical qubits using QUBO, but didn&#x27;t present a physical implementation. Worse yet, this is still not a general algorithm and is generally predicated on picking an easy number to factor in the first place!<p>[1]<a href="https:&#x2F;&#x2F;quantumcomputing.stackexchange.com&#x2F;questions&#x2F;9204&#x2F;the-algorithm-of-the-new-quantum-factoring-record-1-099-551-473-989" rel="nofollow">https:&#x2F;&#x2F;quantumcomputing.stackexchange.com&#x2F;questions&#x2F;9204&#x2F;th...</a>
评论 #23100385 未加载
评论 #23100626 未加载
评论 #23100580 未加载
评论 #23100074 未加载
评论 #23102263 未加载
评论 #23100088 未加载
评论 #23101303 未加载
archgoonabout 5 years ago
Well, for those looking at the comments first:<p>No; they do not actually factor any 1024 or 2048 bit numbers. The largest is 17 bits. Although they point out that representing the problem can be done in a quadratic size of the input, the datapoints in the paper don&#x27;t give any reason to believe that the <i>time</i> to finding the factors won&#x27;t just be exponential in the input.<p>Also, no, this is not a record for Quantum Computing; as this is a DWave Quantum Annealing machine which needs to be evaluated by a different standard.<p>This seems to be more interesting if you look at it from the perspective &quot;How can I treat prime factorization as a optimization problem&quot; rather than &quot;Does it look like Quantum Annealing Machines can factor RSA in the near term&quot;.
评论 #23099850 未加载
评论 #23099833 未加载
NoKnowledgeabout 5 years ago
This study considers seven semi-primes (without justification why these seven) and reports an average(?) runtime of factoring each with D-Wave. No conclusions should be drawn on so few data-points. The proposed &quot;Block Multiplication Table Method&quot; will only affect the constants and thus has no effect on the asymptotics. The embedding from logical to physical qubits appears to have an exponential gap (but again, we shouldn&#x27;t draw conclusions from so few data-points). However, if this is indeed true then even a polynomial runtime for annealing would still result in an exponential runtime for factoring. All in all, it eludes me why authors conclude that the obtained results are promising.
rwmjabout 5 years ago
IBM and Google both claim to have 53 qubit computers, which I thought was the edge of the technology at the moment. This machine has 1635 &quot;physical qubits&quot;. I&#x27;m guessing these are not the same thing. Can anyone comment on what the difference is?
评论 #23101144 未加载
评论 #23101150 未加载
评论 #23110896 未加载
评论 #23101795 未加载
plopilopabout 5 years ago
The authors give the following factorization with their algorithm: 231037 = 499 * 363. Not only is the product not equal to 231037, but 363 is also clearly not a prime as it is divisible by 3.<p>There is no discussion whatsoever about this failure, except for &quot;The low noise D-Wave 2000Q factored correctly all integers N up to L_N= 17&quot;
评论 #23103399 未加载
评论 #23104427 未加载
评论 #23103461 未加载
hutzlibuabout 5 years ago
Layman question:<p>assuming one day RSA gets actually broken and a quantum computer or a new algorithm can factorize prime numbers fast: would there be any alternatives avaiable for public&#x2F;private key encryption?<p>Or would the solution be, to use just a lot bigger prime numbers calculated also with a quantum computer? That sounds not too promising.
评论 #23100969 未加载
评论 #23103921 未加载
评论 #23101879 未加载
评论 #23100983 未加载
ganzuulabout 5 years ago
At what bit lenght is this approach faster than <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Lenstra%E2%80%93Lenstra%E2%80%93Lov%C3%A1sz_lattice_basis_reduction_algorithm" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Lenstra%E2%80%93Lenstra%E2%80%...</a> ?
评论 #23103363 未加载
da-xabout 5 years ago
It&#x27;s 2020, and I&#x27;m still waiting to see an impressive proof of work out out of a quantum computer that I can easily verify on my traditional computer (two different files with identical SHA-512, for example?).<p>Maybe a few years from now?
评论 #23100624 未加载
评论 #23100510 未加载
评论 #23100223 未加载
评论 #23100367 未加载
dmos62about 5 years ago
I see a slight irony in how I perceive crypto conversations as very cryptic. It&#x27;s pleasant to wander into a thread like this where you can&#x27;t really tell up from down (as a relative layperson).
TheUndead96about 5 years ago
oh boy