TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: How secure personal information is in Quantum Supremacy world?

1 点作者 gagan2020超过 5 年前
Google confirms ‘quantum supremacy’ breakthrough. And, what it means to RSA and other security algorithms that rely on the practical difficulty of factorization. With Quantum Supremacy, these practical difficulties will be gone within month or year. What will happen to our personal information saved on various websites? They are becoming more vulnerable.<p>1. Habits, Interest can be hacked easily and we could be targeted and exploited. 2. Financial information like credit card info, bank account info, etc can be scraped off easily, Even from HTTPS (TLS) sites.<p>How ready we are for new world?

1 comment

nabla9超过 5 年前
You are way off.<p>Google&#x27;s new quantum supremacy device has 1,113 single-qubit gates and 430 two-qubit gates.<p>Consider recent improvement in RSA factorization &quot;How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits&quot; <a href="https:&#x2F;&#x2F;arxiv.org&#x2F;abs&#x2F;1905.09749" rel="nofollow">https:&#x2F;&#x2F;arxiv.org&#x2F;abs&#x2F;1905.09749</a><p>Actual implementation of the device mentioned above requires 2.7 billion Toffoli gates gates for 2048 bit input and it could factor just one key in 8 hours. Microprocessors reached that high MOS transistor count less than 10 years ago. For example, 8-core Core i7 Haswell-E has 2.6 billion transistors (2014). If quantum computers follow Moore&#x27;s law like conventional IC, it will take 40-years before they can factor 2048 bit RSA.<p>Symmetric cryptography is already safe against quantum computers. Algorithms for Post-quantum_cryptography are under development and you might expect to see them adopted within next 10 years or so. <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Post-quantum_cryptography" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Post-quantum_cryptography</a>