China’s Scientists Use A D-Wave Quantum Computer To Reportedly Crack Some Of The Most Widely Used Encryption Algorithms

Rohail Saleem
Encryption D-Wave

This is not investment advice. The author has no position in any of the stocks mentioned. Wccftech.com has a disclosure and ethics policy.

In what has all of the necessary ingredients to morph into a doomsday scenario, China's scientists have reportedly leveraged Western quantum computing tech - from D-Wave, specifically - to crack open encryption algorithms that were previously considered unbreakable. This development marks a significant milestone for the still-nascent field of quantum cryptography.

Related Story No, Google’s Quantum Computing Breakthrough Via The Willow Chip Is Not A Threat To Bitcoin (BTC)

To wit, as per a report by the South China Morning Post, a team of researchers led by Shanghai University's Wang Chao have cracked some of the most widely used encryption algorithms. In the associated peer-reviewed paper, the researchers term this development a "real and substantial threat" to the encryption methods used within the banking and military sectors.

As per the available details, the team used a quantum computer from Canada's D-Wave to crack foundational encryption algorithms, including Present, Gift-64, and Rectangle, which together form the backbone of our current digital security paradigm.

Specifically, Wang Chao's team used a technique known as quantum annealing, which is the fundamental principle behind D-Wave's computers. The method leverages quantum fluctuations - a random, temporary change in the amount of energy at a particular point in space - to find the global minimum of a given function over a set of candidate solutions.

The team then combined the quantum annealing algorithm with a host of conventional mathematical approaches to produce a novel computational architecture that is capable of cracking widely used encryption methods.

Critically, according to the team's findings, this method can also be used to eventually crack open the AES-256, which is widely dubbed a "military-grade" encryption algorithm.

Bear in mind that this method has not yet revealed the encrypted passcodes, but it is closer than ever to doing so. The method's prevailing limitations include a host of environmental factors, still-nascent hardware, and the challenge of coming up with a single attack vector for breaching multiple encryption algorithms.

Follow Wccftech on Google to get more of our news coverage in your feeds.

Button