Quantum Computing Applications in Cryptanalysis

Explore top LinkedIn content from expert professionals.

Summary

Quantum computing applications in cryptanalysis involve using advanced quantum computers to break classical encryption methods by solving complex mathematical problems much faster than traditional computers can. As quantum technology advances, widely used cryptographic algorithms like RSA and AES could become vulnerable, underscoring the urgent need for new, quantum-resistant security measures.

  • Monitor quantum progress: Stay informed about breakthroughs in quantum computing, as recent research shows that the timeline for quantum threats to current encryption is shrinking faster than many expected.
  • Adopt post-quantum encryption: Begin transitioning to quantum-resistant cryptographic algorithms to protect sensitive data, since waiting could expose information to future decryption once quantum computers become practical.
  • Prioritize infrastructure updates: Review your organization's digital systems and plan for gradual upgrades to ensure that long-term assets and communications are secured against quantum attacks before they become a reality.
Summarized by AI based on LinkedIn member posts
  • View profile for Frédéric Barbaresco

    THALES "QUANTUM ALGORITHMS/COMPUTING" AND "AI/ALGO FOR SENSORS" SEGMENT LEADER

    31,320 followers

    Shor’s algorithm is possible with as few as 10,000 reconfigurable atomic qubits by John Preskill (Caltech) https://lnkd.in/ethGUK8B Quantum computers have the potential to perform computational tasks beyond the reach of classical machines. A prominent example is Shor's algorithm for integer factorization and discrete logarithms, which is of both fundamental importance and practical relevance to cryptography. However, due to the high overhead of quantum error correction, optimized resource estimates for cryptographically relevant instances of Shor's algorithm require millions of physical qubits. Here, by leveraging advances in high-rate quantum error-correcting codes, efficient logical instruction sets, and circuit design, we show that Shor's algorithm can be executed at cryptographically relevant scales with as few as 10,000 reconfigurable atomic qubits. Increasing the number of physical qubits improves time efficiency by enabling greater parallelism; under plausible assumptions, the runtime for discrete logarithms on the P-256 elliptic curve could be just a few days for a system with 26,000 physical qubits, while the runtime for factoring RSA-2048 integers is one to two orders of magnitude longer. Recent neutral-atom experiments have demonstrated universal fault-tolerant operations below the error-correction threshold, computation on arrays of hundreds of qubits, and trapping arrays with more than 6,000 highly coherent qubits. Although substantial engineering challenges remain, our theoretical analysis indicates that an appropriately designed neutral-atom architecture could support quantum computation at cryptographically relevant scales. More broadly, these results highlight the capability of neutral atoms for fault-tolerant quantum computing with wide-ranging scientific and technological applications.

  • View profile for Julien Bouteloup

    Entrepreneur and investor. Running Stake Capital Group

    12,192 followers

    🚨 Two major new research papers just dropped that dramatically accelerate the quantum threat to crypto. Google Quantum AI optimized Shor’s algorithm down to roughly 1K logical qubits, potentially allowing private keys to be cracked in minutes on advanced superconducting hardware. A follow-up from Oratomic then brought neutral-atom implementations down to just 26K physical qubits with a runtime of around 10 days. This makes Q-Day feel much closer, within just a few years of being reachable. This year at Satoshi Roundtable the mood around quantum computing wasn’t very enthusiastic. We openly discussed how a powerful enough quantum computer could break ECDSA signatures (secp256k1) used across Bitcoin, Ethereum, and most protocols, exposing massive on-chain value including dormant and early-mined coins. The big question was: how do we prepare, and prepare well? Crazy times to be living through. Honestly, teams working in encryption and blockchain should seriously consider stopping everything else and prioritizing this now. It’s time to start integrating quantum-resistant encryption algorithms into modern protocols. No matter if a cryptographically relevant quantum computer arrives in one year or in five, adversaries are likely already collecting encrypted traffic and on-chain data today waiting to decrypt everything the day quantum power crosses that threshold. The shift is real: migrating to post-quantum cryptography is no longer optional. It’s urgent infrastructure work for wallets, bridges, staking, exchanges, and every system holding long-term value. https://lnkd.in/dGUR24xH

  • View profile for Zulfikar Ramzan

    Chief Technology and Artificial Intelligence Officer, Point Wild

    5,922 followers

    Here’s a crypto post -- but not the kind that involves a ledger. A new paper from Craig Gidney at Google has sharpened the picture around a major research question in cryptography: how hard is it really to break RSA with a quantum computer? A 2019 paper by Gidney & Ekerå showed that a 2048-bit RSA key could be factored with ~20 million noisy qubits, running in about 8 hours. Gidney’s latest estimate cuts that requirement by an order of magnitude: fewer than one million qubits, and a runtime of less than a week. The improvement comes from trading space for time and deploying clever techniques like: * Approximate residue arithmetic, which compresses modular exponentiation by discarding unneeded precision * Magic state cultivation, which reduces overhead in fault-tolerant gate operations * Compact surface code layouts, which store qubits more efficiently while keeping errors in check The intuition is subtle but powerful: to extract the period associated with modular exponentiation (a key step Shor’s algorithm), you don’t need a perfect answer—just enough clean signal, handled carefully enough to preserve the interference pattern you're looking for. (Shor's algorithm uses quantum parallelism to create a periodic signal, and then uses (Quantum) Fourier analysis -- via the (Quantum) Fourier Transform -- to determine the period, which effectively turns factoring into a signal-processing problem.). So, what are the implications? First, it's not time to panic (yet). Today’s quantum hardware handles ~100 qubits, all noisy and none fault-tolerant. So, we still need to improve current quantum computing hardware by a factor of at least 10,000. However, progress will continue to be made, and that progress can be non-linear. More concretely, this paper narrows the gap between theoretical risk and engineering feasibility. The requirements for breaking RSA are concrete. For governments and organizations still relying on cryptosystems like RSA whose security is related to the complexity of factoring large integers, the message is clear: the sky isn’t falling, but the clouds are moving. Migrating between cryptographic algorithms is a slow, fragile, and complicated process. There is no switch one can flip to transition between traditional algorithms and those that considered quantum safe. And yes, I lied in the first line: if someone builds a quantum computer at this scale, Bitcoin and other cryptocurrencies would likely be among the first targets... 📄 Paper: https://lnkd.in/gGY3JRgw #quantumcomputing #cryptography #postquantum #RSA #security

  • View profile for Keith King

    Former White House Lead Communications Engineer, U.S. Dept of State, and Joint Chiefs of Staff in the Pentagon. Veteran U.S. Navy, Top Secret/SCI Security Clearance. Over 16,000+ direct connections & 44,000+ followers.

    43,837 followers

    Chinese Scientists Use Quantum Computers to Crack Military-Grade Encryption — A “Real and Substantial Threat” to RSA and AES Key Insights: • Chinese researchers claim to have conducted a successful quantum attack on widely used cryptographic algorithms, including RSA (Rivest-Shamir-Adleman) and AES (Advanced Encryption Standard). • The attack leveraged a D-Wave quantum computer using quantum annealing techniques to compromise substitution–permutation network (SPN) cryptographic algorithms. • These encryption standards are widely used in banking, military communications, and global cybersecurity systems, highlighting the severity of the threat. Technical Breakdown of the Attack: • The research paper, titled Quantum Annealing Public Key Cryptographic Attack Algorithm Based on D-Wave Advantage, describes two approaches utilizing quantum annealing algorithms. • The first approach relies entirely on the D-Wave Advantage quantum computer, which was programmed to solve an optimization problem and an exponential space search problem simultaneously. • These problems were mapped onto the Ising model, a mathematical model used in quantum annealing to optimize large, complex systems. • The algorithm successfully demonstrated vulnerabilities in the RSA encryption scheme, which relies on the computational difficulty of prime factorization for security. Why This Matters: • Cryptographic Vulnerability: RSA and AES encryption underpin global secure communications, digital banking, and government systems. • Quantum Threat Realized: While quantum computing’s threat to cryptography has long been theorized, this study marks a practical demonstration of such an attack, signaling that real-world vulnerabilities may arrive sooner than expected. • Immediate Risk: If validated, this breakthrough could undermine current cryptographic infrastructures worldwide, necessitating a shift to quantum-resistant encryption protocols. Implications for Global Security: • Military and Government Communications: Sensitive data protected by RSA and AES could potentially be exposed to adversaries equipped with quantum computing capabilities. • Banking and Financial Systems: Encryption standards securing online banking, e-commerce, and financial transactions might no longer guarantee data integrity and confidentiality. • Quantum-Resistant Algorithms: This event underscores the urgency of adopting post-quantum cryptography—encryption systems designed to withstand quantum attacks. This breakthrough highlights the tangible risks posed by quantum computing to global cybersecurity. While the immediate applicability of the attack remains under scrutiny, the study serves as a stark reminder that the era of quantum threats to classical encryption is no longer a distant concern but an emerging reality.

  • View profile for Pablo Conte

    Merging Data with Intuition 📊 🎯 | AI & Quantum Engineer | Qiskit Advocate | PhD Candidate

    32,530 followers

    ⚛️ Post-Quantum Cryptography and Quantum-Safe Security: A Comprehensive Survey 📑 Post-quantum cryptography (PQC) is moving from evaluation to deployment as NIST finalizes standards for ML-KEM, ML-DSA, and SLH-DSA. This survey maps the space from foundations to practice. We first develop a taxonomy across lattice-, code-, hash-, multivariate-, isogeny-, and MPC-in-the-Head families, summarizing security assumptions, cryptanalysis, and standardization status. We then compare performance and communication costs using representative, implementation-grounded measurements, and review hardware acceleration (AVX2, FPGA/ASIC) and implementation security with a focus on side-channel resistance. Building upward, we examine protocol integration (TLS, DNSSEC), PKI and certificate hygiene, and deployment in constrained and high-assurance environments (IoT, cloud, finance, blockchain). We also discuss complementarity with quantum technologies (QKD, QRNGs) and the limits of near-term quantum computing. Throughout, we emphasize crypto-agility, hybrid migration, and evidence-based guidance for operators. We conclude with open problems spanning parameter agility, leakage-resilient implementations, and domain-specific rollout playbooks. This survey aims to be a practical reference for researchers and practitioners planning quantum-safe systems, bridging standards, engineering, and operations. ℹ️ Chhetri et al - Texas State University, USA - 2025

  • View profile for Davide Maniscalco

    Head of Legal, Regulatory & Data Privacy Officer | Special Adv DFIR | Auditor ISO/IEC 27001| 27701 | 42001 | CBCP | Italian Army (S.M.O.M.) Reserve Officer ~ OF-2 |

    19,795 followers

    A recent comprehensive study, issued by Federal Office for Information Security (BSI) on the Status of #Quantum #Computer #Development provides a sober, evidence-based assessment of progress, risks, and timelines, particularly relevant for #cryptography, #cybersecurity, and strategic planning, with a focus on applications in #cryptanalysis. Key takeaways: • Quantum advantage is real, but still narrow Quantum computers have demonstrated advantage only on highly specialized benchmark problems. Broad, application-relevant superiority remains out of reach. • Cryptography is the primary strategic risk driver Shor’s algorithm continues to pose a credible long-term threat to RSA and elliptic-curve cryptography, while symmetric cryptography (e.g. AES) remains comparatively resilient with appropriate key lengths. • Fault tolerance is the true bottleneck Error rates not qubit counts are the dominant constraint. Scalable, fault-tolerant quantum computing requires massive overheads in error correction and infrastructure. • Leading hardware platforms are converging Superconducting qubits, trapped ions, and neutral atoms (Rydberg) currently lead the field, with rapid progress but no clear single winner. • #NISQ systems are not a near-term cryptographic threat Noisy Intermediate-Scale Quantum (NISQ) devices lack the depth and reliability needed for meaningful cryptanalysis, despite frequent hype. • A realistic timeline is emerging Based on verified advances in error correction, a cryptographically relevant quantum computer may be achievable in ~10–15 years—not decades, but not imminent either. • “Harvest now, decrypt later” remains a credible risk Sensitive data encrypted today may be vulnerable in the future, reinforcing the urgency of post-quantum cryptography migration. • Security preparedness must start now Transition planning, crypto-agility, standards development, and quantum-readiness assessments are no longer optional for governments and critical sectors. 👉 Bottom line: quantum computing is progressing steadily, not explosively, but its long-term implications for cybersecurity and digital trust demand early, structured, and risk-based action today. https://lnkd.in/eMui-D_W

  • View profile for Jan Mikolon

    CTO for Quantum Computing & AI bei QuantumBasel | Generative AI, quantum computing

    12,091 followers

    🔐 𝗤𝘂𝗮𝗻𝘁𝘂𝗺 𝗶𝘀 𝗴𝗲𝘁𝘁𝗶𝗻𝗴 𝗰𝗹𝗼𝘀𝗲𝗿 𝘁𝗵𝗮𝗻 𝘄𝗲 𝘁𝗵𝗼𝘂𝗴𝗵𝘁. 𝗠𝘂𝗰𝗵 𝗰𝗹𝗼𝘀𝗲𝗿. What if breaking today’s cryptography doesn’t require millions of qubits… but just ~10,000? New research suggests that Shor’s algorithm could become practical far sooner than expected — dramatically lowering the barrier to cryptographically relevant quantum computing. ⚙️ What changed? 🧠 Advanced quantum error-correcting codes slash overhead ⚡ Smarter logical operations and circuit design 📉 Massive reduction in qubit requirements ⏱️ Estimated timelines to break real-world crypto: • ECC-256 → ~10 days • RSA-2048 → ~97 days And here’s the twist 👇 Neutral-atom systems are emerging as a serious contender for scalable, fault-tolerant quantum machines.

  • View profile for Rich Campagna

    SVP Products, Palo Alto Networks

    17,772 followers

    Quantum computing is moving from "science fiction" to "business reality" faster than most predicted. Two recent papers have fundamentally shifted the timeline for when we need to care about Quantum-Safe security: 1️⃣ The "10,000 Qubits" Milestone: New research shows that we can execute Shor’s algorithm—the math that breaks today’s encryption—with far fewer resources than previously thought. By using reconfigurable atomic qubits, the hardware requirements for cracking RSA-2048 have dropped by nearly 20x. 2️⃣ The "9-Minute" Crypto Warning: Google’s latest whitepaper highlights a terrifying reality for digital assets. Under advanced quantum scenarios, the encryption protecting a cryptocurrency wallet could be cracked in under 10 minutes. This puts billions in "dormant" assets at immediate risk of "at-rest" attacks. The Bottom Line: The "Q-Day" window is shrinking. It’s no longer about if a quantum computer can break your encryption, but when your current migration timeline will run out. How do we respond? We can't just flip a switch on "Q-Day." For many organizations, becoming quantum safe is a multi-year journey. This is where Palo Alto Networks Quantum-Safe Security comes in. Instead of a manual, multi-year overhaul, we provide a path to Agentic Resilience: - Continuous Discovery: It automatically maps your "cryptographic bill of materials" (CBOM), identifying exactly where vulnerable RSA and ECC algorithms are hiding in your network. - Risk Prioritization: It correlates your encryption strength with business criticality, telling you exactly which high-value assets need to move to Post-Quantum Cryptography (PQC) first. - Real-Time Remediation: For legacy systems that can’t be easily upgraded, a "Quantum-Safe Proxy" re-encrypts vulnerable traffic into post-quantum algorithms (like ML-KEM) at the network edge. The transition to a quantum-safe future is a marathon, but the starting gun has already fired. Learn how to take your first steps at the link in the comments.

  • View profile for Zlatko Minev

    Google Quantum AI | MIT TR35 | Ex-Team & Tech Lead, Qiskit Metal & Qiskit Leap, IBM Quantum | Founder, Open Labs | JVA | Board, Yale Alumni

    26,217 followers

    🔐 A cryptography wake-up call! Last week brought a reality check for quantum computing timelines. Two research groups announced advances that could enable machines capable of breaking RSA and elliptic curve cryptography much sooner than expected. Google Quantum AI announced updated resource estimates for breaking 256-bit elliptic curve cryptography, the backbone of Bitcoin, Ethereum, and much of modern blockchain security. Their new circuits require fewer than 500,000 physical qubits on superconducting architectures, offering roughly a 20x improvement over previous estimates. Impressively, the team estimates a superconducting computer could derive a private key in under 9 minutes, fast enough to intercept a Bitcoin transaction before it's recorded on-chain. Separately, researchers from Oratomic and Caltech showed that Shor's algorithm could run at cryptographically relevant scales with as few as 10,000 reconfigurable neutral-atom qubits, two orders of magnitude below earlier estimates for such platforms. At ~26,000 qubits, they project 256-bit elliptic curve cryptography could be broken in about 10 days. Neither paper claims a cryptographically relevant quantum computer exists today, and both acknowledge that significant engineering challenges persist. Nonetheless, both advances signify genuine algorithmic and architectural progress beyond small, incremental updates. What I find most notable is the convergence of better error-correcting codes, more efficient logical operations, and optimized circuit design, each improving simultaneously. As a result, resource requirements for cryptographic relevance continue to shrink. This phenomenon should serve as a call to action for the post-quantum cryptography transition. I am curious to hear from others in the community: What is your read on the current quantum cryptographic timeline and where do you see the biggest bottlenecks in a full PQC transition? Google Oratomic #Physics #Cryptography #Quantum #QuantumComputing #Science

  • ⏳ 𝗤𝘂𝗮𝗻𝘁𝘂𝗺 𝗖𝗼𝗺𝗽𝘂𝘁𝗶𝗻𝗴 𝗮𝗻𝗱 𝗖𝗿𝘆𝗽𝘁𝗼𝗴𝗿𝗮𝗽𝗵𝘆: 𝗧𝗵𝗲 𝗧𝗶𝗺𝗲𝗹𝗶𝗻𝗲 𝗜𝘀 𝗦𝗵𝗿𝗶𝗻𝗸𝗶𝗻𝗴 𝗖𝗹𝗲𝗮𝗿 𝗣𝗮𝘁𝗵 𝘁𝗼 𝗖𝗿𝘆𝗽𝘁𝗮𝗻𝗮𝗹𝘆𝘁𝗶𝗰 𝗥𝗲𝗹𝗲𝘃𝗮𝗻𝗰𝗲 The Bundesamt für Sicherheit in der Informationstechnik (BSI) analysis is clear: Quantum computing is progressing steadily toward cryptanalytic relevance. The technical path is established: fault-tolerant Shor algorithms on superconducting systems with surface codes or ion-based systems with color codes. In 2024, key obstacles were removed. Quantum error correction works. Fault-tolerant computation is real. What remains is large-scale engineering. 𝗪𝗵𝘆 𝘁𝗵𝗲 “𝟮𝟬-𝗬𝗲𝗮𝗿” 𝗡𝗮𝗿𝗿𝗮𝘁𝗶𝘃𝗲 𝗜𝘀 𝗪𝗿𝗼𝗻𝗴 Error-correction break-even across several platforms in 2024–2025 invalidates the claim that relevant quantum computers are always decades away. A conservative estimate now points to around 15 years. This matches observed qubit growth and implies that systems with roughly one million qubits could be available in that timeframe, which is sufficient for cryptographic attacks. 𝗔 𝗦𝘁𝗿𝗮𝗶𝗴𝗵𝘁𝗳𝗼𝗿𝘄𝗮𝗿𝗱 𝗦𝗰𝗮𝗹𝗶𝗻𝗴 𝗧𝗶𝗺𝗲𝗹𝗶𝗻𝗲 The same result emerges from a modular view. Five years to design a scalable platform. Five years to produce and integrate modules. Five years to operate at full scale and quality. This is a scaling problem, not a scientific unknown. 𝗪𝗵𝗮𝘁 𝗖𝗼𝘂𝗹𝗱 𝗦𝗵𝗼𝗿𝘁𝗲𝗻 𝘁𝗵𝗲 𝗧𝗶𝗺𝗲𝗹𝗶𝗻𝗲 Advances in qLDPC codes, error mitigation, and neutral-atom platforms could reduce the horizon further. Ten years is no longer unrealistic. 𝗨𝗻𝗰𝗲𝗿𝘁𝗮𝗶𝗻𝘁𝘆 𝗜𝘀 𝗦𝘁𝗿𝘂𝗰𝘁𝘂𝗿𝗮𝗹 Multiple hardware platforms progress in parallel. Companies protect core technology. Some work happens in stealth mode. National security plays a role. A hidden qualitative leap seems unlikely today, but cannot be excluded. 𝗤-𝗗𝗮𝘆 𝗮𝗻𝗱 𝘁𝗵𝗲 𝗛𝗡𝗗𝗟 𝗥𝗶𝘀𝗸 To stay on the safe side, Q-Day planning should assume a horizon of no more than 10 years, especially for nation-state actors and cyber agencies. AI will accelerate engineering, scaling, and cryptanalysis. This increases the risk that Q-Day arrives earlier than expected. The HNDL threat—harvest now, decrypt later—is already active. Sensitive data intercepted today can be decrypted in the future. This affects critical infrastructure, government systems, and industrial communication with long confidentiality lifetimes. Protection must start now. This requires crypto-agile architectures and the early deployment of hybrid schemes combining classical and post-quantum cryptography. 𝗜𝗺𝗽𝗹𝗶𝗰𝗮𝘁𝗶𝗼𝗻𝘀 𝗳𝗼𝗿 𝗖𝗿𝘆𝗽𝘁𝗼𝗴𝗿𝗮𝗽𝗵𝗶𝗰 𝗜𝗻𝗳𝗿𝗮𝘀𝘁𝗿𝘂𝗰𝘁𝘂𝗿𝗲 Post-quantum migration is no longer optional. Waiting increases risk. 𝗢𝘂𝗿 𝗔𝗻𝗮𝗹𝘆𝘀𝗶𝘀 𝗳𝗼𝗿 𝘁𝗵𝗲 𝗗-𝗦𝘁𝗮𝗰𝗸 We at Spherity assessed these risks and transition paths for the German D-Stack, with a focus on crypto agility and long-term resilience: https://lnkd.in/eTJT4erD

Explore categories