> This study investigates a class of special integers that the factors differ by only two bits, and the difference is present only at the two bits with weights of 2 and 4.<p>So as far as I can tell from some quick skimming, the paper's title is entirely clickbait. Regardless of the size of the numbers involved, this is not really "RSA-2048" because no one would construct an actual RSA-2048 key this way. And if they did, I think it would be susceptible to classical attacks like Fermat factorization, no "quantum computer" needed.<p>To be fair, the paper does eventually admit this has no real impact on actual RSA-2048, but it does still try to characterize this as some sort of looming threat.
From the title, I thought this was a factorization of the RSA-2048 integer (i.e., the one you get the prize for factoring). So I quickly skimmed to the results section to see what the factors where.<p>It's not. It's a factorization of the product of two 1024-bit numbers that are known to differ only in two bits (and the bit positions they differ may also be an input to the algorithm, not clear on that). The only relevance to RSA-2048 is that it's not technically a lie that they factored a 2048-bit integer.
As others have already pointed out, the article has a clickbait title and is entirely in line with D-Wave's recent marketing push for "quantum realized" to one-up IBM with "quantum utility." This work amounts to brute-forcing an integer with very specific as constraints @rainsford noted. It has very little to do with RSA-2048.<p>Moreover, D-Wave's quantum computers rely on quantum annealing, not Shor's algorithm. Quantum annealers are NOT gate-based machines. Only for the latter is there a theoretical exponential speedup over a classical computer. For the former, we still don't know if there is any speedup at all. And if there is, it probably is not applicable in general: getting lucky with a specific integer does not count.
Note that this doesn't represent a general break of RSA-2048, and doesn't affect the security of RSA-2048 as it's used anywhere.<p>The paper only applies to "special integers" where the prime factors are known to only differ by two bits.
This is ridiculous clickbait even for quantum computing standards. It might actually cross the threshold of being flag-worthy…<p>> When factoring this class of integers, their special properties will make the exponential-level solution space search problem in the factorization simplify to a constant-level solution space search problem, which greatly saves computational resources.<p>„We elected to solve a O(1) subset instead of the actual problem“
Here we are treated to yet another clickbaity piece of quantum disinformation. Since the only tangible potential use case of this crackpot industry is cracking RSA encryption, its actors resort to misleading publications claiming success to part yet more money from clueless investors.<p>Here, they picked artificially constructed numbers that are designed to be easy to factor. Something classical computers could do far more efficiently mind you, but hey, maybe some guy won't read the article and invest a few extra bucks in D-Wave based on the headline, in which case it was all worth it. It only required further degrading the credibility of this clown industry.