Latest Quantum Code Breaking Challenges

Explore top LinkedIn content from expert professionals.

Summary

The latest quantum code breaking challenges refer to the rapidly advancing efforts and breakthroughs in using quantum computers to crack modern encryption methods, such as RSA and Elliptic Curve Cryptography (ECC). This field is evolving fast, and recent research shows that far fewer quantum bits (qubits) are needed to threaten global cybersecurity, putting critical banking, communications, and cryptocurrency systems at risk sooner than once thought.

  • Monitor quantum progress: Stay updated on new quantum computing research, as breakthroughs in qubit efficiency and error correction are shortening the timeline to when encryption could be compromised.
  • Prioritize migration: Begin planning and executing moves to post-quantum cryptographic standards to protect sensitive assets before quantum computers become powerful enough to break current codes.
  • Assess asset exposure: Evaluate which legacy systems and dormant accounts are most vulnerable, especially in cryptocurrencies, and work to secure them against emerging quantum threats.
Summarized by AI based on LinkedIn member posts
  • View profile for Marin Ivezic

    CEO Applied Quantum | PostQuantum.com | SANS Instructor | Former CISO, Big 4 Partner, Quantum Entrepreneur

    34,165 followers

    Today was the most significant day for quantum cryptanalysis in years. Two papers published on the same day – same conclusion. Paper 1: Google Quantum AI showed that breaking the ECC protecting Bitcoin and Ethereum requires fewer than 500,000 superconducting qubits and approximately 9 minutes. A 10x reduction in spacetime volume over prior estimates. Verified by a zero-knowledge proof. My analysis: https://lnkd.in/ep2mHJte Paper 2: A team from Oratomic, Caltech, and UC Berkeley showed that the same algorithm runs on as few as 10,000 neutral atom qubits. Fifty times fewer qubits. But days instead of minutes. My analysis: https://lnkd.in/esrKWs56 The TL;DR: breaking cryptocurrency cryptography now has two credible paths. A fast one (superconducting, 500K qubits, minutes - threatens active transactions) and a small one (neutral atoms, 10K–26K qubits, days - threatens dormant wallets and exposed keys). The two papers are not independent. Oratomic's resource estimates build directly on Google's newly published circuit optimizations. Does this bring Q-Day closer? Honestly, not in an absolute sense. Nobody built a 500,000-qubit superconducting machine or a 26,000-atom neutral atom computer overnight. The hard engineering problems remain hard. But that's not the real story. The real story is that the million-qubit comfort margin is dead. A year ago, the standard mental model was "breaking crypto requires millions of qubits, we have decades." Today, we have four independent papers - Gidney (2025), Pinnacle (2026), Google (2026), and now Oratomic (2026) - showing credible paths ranging from 10,000 to 1,000,000 physical qubits across multiple hardware modalities. The diversity of viable architectures is itself the threat. And ECC falls before RSA on every architecture. Google needs half the qubits for ECC-256 that Gidney needs for RSA-2048. Oratomic needs 10,000 qubits for ECC versus 102,000 for RSA. Two papers. Two architectures. One conclusion: the migration to post-quantum cryptography is not a future planning exercise. It is an operational imperative. #PostQuantumCryptography #QuantumComputing #Bitcoin #Ethereum #Cybersecurity #PQC #PostQuantum #QuantumSecurity

  • View profile for Keith King

    Former White House Lead Communications Engineer, U.S. Dept of State, and Joint Chiefs of Staff in the Pentagon. Veteran U.S. Navy, Top Secret/SCI Security Clearance. Over 16,000+ direct connections & 43,000+ followers.

    43,801 followers

    Headline: China Cracks RSA Encryption Using Quantum Annealing—Global Data Security Now Under Pressure ⸻ Introduction: A Chinese research team has achieved a milestone with profound cybersecurity implications: successfully cracking a small RSA-encrypted integer using a quantum computer. Though modest in scale, this experiment signals that quantum systems are starting to undermine the very cryptographic foundations that secure today’s banking, commerce, and communication systems. The race to build quantum-resistant encryption is no longer theoretical—it’s urgent. ⸻ Key Details 🔓 Cracking RSA with Quantum Annealing • Researchers: Wang Chao and team from Shanghai University. • Hardware Used: A D-Wave Advantage quantum annealer, built by D-Wave Systems. • Achievement: The team factored a 22-bit RSA semiprime integer, a task previously unsolved on this class of hardware. 🔐 What Makes RSA Strong—and Vulnerable • RSA Encryption: Based on the difficulty of factoring large semiprime numbers (products of two primes). • Classical Challenge: Conventional computers require subexponential time to factor 2048-bit keys—considered secure for now. • Largest Cracked Classically: RSA250 (829-bit key) using supercomputers over weeks. • Quantum Approach: The Chinese team translated factorization into a QUBO (Quadratic Unconstrained Binary Optimization) problem, solvable by quantum annealing. 🧠 Why This is a Warning Shot • Early Stage, But Symbolic: While a 22-bit number is trivial by today’s standards, the methodology proves scalability potential. • First Step Toward Quantum Decryption: Demonstrates quantum annealers can be adapted for cryptographic tasks—not just optimization. • Signals Future Risk: Today’s encryption might withstand current tech, but scalable quantum systems could break RSA entirely in years, not decades. ⸻ Why It Matters • Global Cybersecurity Threatened: Banking, defense, healthcare, and internet infrastructure all rely on RSA and similar public-key systems. This experiment shows those systems may soon be obsolete. • Quantum Arms Race Accelerates: The demonstration by Chinese researchers will likely intensify global investment in both quantum computing and post-quantum cryptography. • Urgent Need for Migration: Governments and corporations must begin transitioning to quantum-resistant encryption standards, or risk catastrophic breaches in the near future. • Tactical and Strategic Implications: Countries that master quantum decryption first may gain unparalleled capabilities in espionage, warfare, and economic control. ⸻ Keith King https://lnkd.in/gHPvUttw Arzan Alghanmi

  • View profile for Jan Mikolon

    CTO for Quantum Computing & AI bei QuantumBasel | Generative AI, quantum computing

    12,083 followers

    🔐 𝗤𝘂𝗮𝗻𝘁𝘂𝗺 𝗶𝘀 𝗴𝗲𝘁𝘁𝗶𝗻𝗴 𝗰𝗹𝗼𝘀𝗲𝗿 𝘁𝗵𝗮𝗻 𝘄𝗲 𝘁𝗵𝗼𝘂𝗴𝗵𝘁. 𝗠𝘂𝗰𝗵 𝗰𝗹𝗼𝘀𝗲𝗿. What if breaking today’s cryptography doesn’t require millions of qubits… but just ~10,000? New research suggests that Shor’s algorithm could become practical far sooner than expected — dramatically lowering the barrier to cryptographically relevant quantum computing. ⚙️ What changed? 🧠 Advanced quantum error-correcting codes slash overhead ⚡ Smarter logical operations and circuit design 📉 Massive reduction in qubit requirements ⏱️ Estimated timelines to break real-world crypto: • ECC-256 → ~10 days • RSA-2048 → ~97 days And here’s the twist 👇 Neutral-atom systems are emerging as a serious contender for scalable, fault-tolerant quantum machines.

  • View profile for Vijoy Pandey

    SVP/GM | Building 0 to 1

    16,713 followers

    Right on the heels of RSAC from last week, this paper that dropped yesterday should be on everyone's radar. It accelerates the quantum threat timeline in a significant way. Breaking RSA or ECC encryption with a quantum computer requires running something called Shor's algorithm at scale. The biggest question has always been around how many physical qubits you need to run Shor’s. For years that number was in the millions, which made the threat feel distant. The 2021 Gidney-Ekera paper, the prior gold standard, put it at ~20 million qubits. Yesterday, a team from Caltech and Oratomic, including John Preskill, one of the architects of quantum error correction, published a paper bringing that number down to 10,000–14,000 physical qubits on a neutral-atom architecture. For context: some neutral-atom labs have already demonstrated arrays of 6,100 qubits. Which means that the gap between theory and practice just went from roughly 3,000x to about 2x. 2𝐗!! What happened? This is all due to better error-correcting codes that pack more logical qubits into the same physical hardware, combined with reconfigurable atomic architectures. The result is a 2,000x reduction in qubit requirements over the prior gold standard. Runtime for this is still ~10 days and not minutes. So this isn’t like “oh, RSA is broken today in real-time”. But there are 3 bullets that make this urgent: - The "harvest now, decrypt later" threat is now active and real. Adversaries are collecting encrypted traffic now, to decrypt once hardware catches up - and that horizon just moved much much closer. - ECC-256, the crypto that actually protects most live TLS, SSH, and PKI traffic today, is more quantum-vulnerable than RSA-2048 in this analysis. (Because, smaller keys mean simpler quantum circuits.) - Quantum computing and quantum networking hardware is improving fast. The 10-day runtime at 26,000 qubits will get shorter, and investment in this space is accelerating. All this to say, the timeline for deploying NIST-standardized post-quantum cryptography, PQC (ML-KEM, ML-DSA, SLH-DSA, just moved to now.

  • View profile for Jaime Gómez García

    Global Head of Santander Quantum Threat Program | Chair of Europol Quantum Safe Financial Forum | Quantum Security 25 | Quantum Leap Award 2025 | Representative at EU QuIC, AMETIC

    17,295 followers

    💣 Two almost simultaneous relevant papers on #quantum #cryptoanalysis. 👉 "Shor’s algorithm is possible with as few as 10,000 reconfigurable atomic qubits" (https://lnkd.in/eyGiqXQt): This document, supported by trusted names like John Preskill, discusses advances in error-correcting codes and other efficiencies that could be leveraged in neutral atoms quantum computers. They discuss attacks on RSA using as few as 10,000 atomic qubits, although at a great cost in time. Their most time-efficient architectures can enable run times of 10 days for ECC–256 with ≈26,000 qubits, and 97 days for RSA–2048 with ≈102,000 qubits. See the graph below. 👉 "Securing Elliptic Curve Cryptocurrencies against Quantum Vulnerabilities: Resource Estimates and Mitigations" (https://lnkd.in/e_HsxUcx, https://lnkd.in/eakjd4HU): This paper has been published by Google Research and counts also with trusted authors from Google, Ethereum Foundation, University of California, Berkeley and Stanford University, like Craig Gidney, Justin Drake, or Dan Boneh. The paper is a comprehensive review of #quantum #security in #blockchain that deserves a careful reading. They demonstrate that Shor’s algorithm for breaking 256-bit ECC can execute with either ≤ 1200 logical qubits and ≤ 90M Toffoli gates or ≤ 1450 logical qubits and ≤ 70M Toffoli gates.  On superconducting architectures with 10^−3 physical error rates, it could be executed in minutes using <0.5M physical qubits. They analyze how this can enable different attack scenarios to cryptocurrencies. 👉 This not a sudden breakthrough, but steady, credible progress in quantum cryptoanalysis. 💡What stands out is not just feasibility, but implications. 🚩 Although substantial expertise, experimental development effort, and architectural design are required, quantum systems capable of breaking today’s cryptography are not speculative. This underscores the importance of ongoing efforts to transition widely-deployed cryptographic systems toward post-quantum standards. 🚩 The emergence of CRQCs represents a serious threat to cryptocurrencies. ✏️ The Bitcoin community needs to face urgent and difficult decisions regarding legacy assets, such as the 1.7 million bitcoin locked in P2PK scripts and an even greater amount of assets vulnerable due to address reuse. ✏️ Ethereum is more exposed than Bitcoin due to the prevalence of at-rest vulnerabilities, but its recent active steps towards PQC migration promise a more expedient transition to quantum-safe protocols. This is critical since the tokenization of real-world assets is expected to open up markets projected to exceed 16 trillion USD by 2030, breaking the “too-big-to-fail” economic stability thresholds. ✏️ There is time to migrate public blockchains to PQC, though the margin for error is increasingly narrow.

  • View profile for Zlatko Minev

    Google Quantum AI | MIT TR35 | Ex-Team & Tech Lead, Qiskit Metal & Qiskit Leap, IBM Quantum | Founder, Open Labs | JVA | Board, Yale Alumni

    26,206 followers

    🔐 A cryptography wake-up call! Last week brought a reality check for quantum computing timelines. Two research groups announced advances that could enable machines capable of breaking RSA and elliptic curve cryptography much sooner than expected. Google Quantum AI announced updated resource estimates for breaking 256-bit elliptic curve cryptography, the backbone of Bitcoin, Ethereum, and much of modern blockchain security. Their new circuits require fewer than 500,000 physical qubits on superconducting architectures, offering roughly a 20x improvement over previous estimates. Impressively, the team estimates a superconducting computer could derive a private key in under 9 minutes, fast enough to intercept a Bitcoin transaction before it's recorded on-chain. Separately, researchers from Oratomic and Caltech showed that Shor's algorithm could run at cryptographically relevant scales with as few as 10,000 reconfigurable neutral-atom qubits, two orders of magnitude below earlier estimates for such platforms. At ~26,000 qubits, they project 256-bit elliptic curve cryptography could be broken in about 10 days. Neither paper claims a cryptographically relevant quantum computer exists today, and both acknowledge that significant engineering challenges persist. Nonetheless, both advances signify genuine algorithmic and architectural progress beyond small, incremental updates. What I find most notable is the convergence of better error-correcting codes, more efficient logical operations, and optimized circuit design, each improving simultaneously. As a result, resource requirements for cryptographic relevance continue to shrink. This phenomenon should serve as a call to action for the post-quantum cryptography transition. I am curious to hear from others in the community: What is your read on the current quantum cryptographic timeline and where do you see the biggest bottlenecks in a full PQC transition? Google Oratomic #Physics #Cryptography #Quantum #QuantumComputing #Science

  • View profile for Harun Seker (CISSP, CEH, CSIS, CIOS)

    AI-Aided Cybersecurity Specialist | A+ | Network + | Security+ | CySA+ | Pentest + | CASP+ | Cloud+| EC-Council Certified Instructor | CEH | CSA | CHFI | CTIA | MCP | MCSE | CCNA | ISO 27001 Lead Auditor | CC | CISSP

    113,452 followers

    🛑 Google did NOT say quantum computers will break all encryption by 2029. But that's the version 500,000 people shared this week. What Google actually announced: a 2029 deadline to migrate their own systems to post-quantum cryptography. A self-imposed engineering target. Ahead of the NSA's 2031 goal. Ahead of the US government's 2035 benchmark. That's leadership, not a warning label. Here's the part the viral post conveniently skipped: • Current quantum computers can't break encryption. Period. They're still battling fundamental physics problems with qubit stability. • NIST published post-quantum cryptography standards in 2024. The defense is already being built. • Google, Apple, Microsoft, and AWS are actively deploying quantum-resistant encryption today. Now here's the part that actually matters — and nobody's talking about: The "store now, decrypt later" threat. Nation-state actors and advanced threat groups are harvesting encrypted traffic right now. Government secrets. Corporate IP. Health records. Financial data. All of it sitting in storage, waiting for the day a quantum machine can open it. That's not a 2029 problem. That's a today problem. If you're a CISO or security leader, the move isn't panic. It's inventory. Where does RSA live in your stack? Where's ECC? What's your cryptographic migration plan? Do you even have one? The quantum threat is real. The timeline is compressing. But your threat model should come from Google's actual blog post — not from a screenshot with a red siren emoji. Read the source. Do the work. #CyberSecurity #QuantumComputing #ThreatIntelligence #PQC #CISO

Explore categories