AT2k Design BBS Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages!

You are not logged in. Login here for full access privileges.

Previous Message | Next Message | Back to Slashdot  <--  <--- Return to Home Page
   Local Database  Slashdot   [227 / 238] RSS
 From   To   Subject   Date/Time 
Message   VRSS    All   How Many Qubits Will It Take to Break Secure Public Key Cryptogr   May 24, 2025
 2:40 PM  

Feed: Slashdot
Feed Link: https://slashdot.org/
---

Title: How Many Qubits Will It Take to Break Secure Public Key Cryptography
Algorithms?

Link: https://it.slashdot.org/story/25/05/24/053023...

Wednesday Google security researchers published a preprint demonstrating that
2048-bit RSA encryption "could theoretically be broken by a quantum computer
with 1 million noisy qubits running for one week," writes Google's security
blog. "This is a 20-fold decrease in the number of qubits from our previous
estimate, published in 2019... " The reduction in physical qubit count comes
from two sources: better algorithms and better error correction - whereby
qubits used by the algorithm ("logical qubits";) are redundantly encoded
across many physical qubits, so that errors can be detected and corrected...
[Google's researchers found a way to reduce the operations in a 2024
algorithm from 1000x more than previous work to just 2x. And "On the error
correction side, the key change is tripling the storage density of idle
logical qubits by adding a second layer of error correction."] Notably,
quantum computers with relevant error rates currently have on the order of
only 100 to 1000 qubits, and the National Institute of Standards and
Technology (NIST) recently released standard PQC algorithms that are expected
to be resistant to future large-scale quantum computers. However, this new
result does underscore the importance of migrating to these standards in line
with NIST recommended timelines. The article notes that Google started using
the standardized version of ML-KEM once it became available, both internally
and for encrypting traffic in Chrome... "The initial public draft of the NIST
internal report on the transition to post-quantum cryptography standards
states that vulnerable systems should be deprecated after 2030 and disallowed
after 2035. Our work highlights the importance of adhering to this
recommended timeline."

Read more of this story at Slashdot.

---
VRSS v2.1.180528
  Show ANSI Codes | Hide BBCodes | Show Color Codes | Hide Encoding | Hide HTML Tags | Show Routing
Previous Message | Next Message | Back to Slashdot  <--  <--- Return to Home Page

VADV-PHP
Execution Time: 0.0134 seconds

If you experience any problems with this website or need help, contact the webmaster.
VADV-PHP Copyright © 2002-2025 Steve Winn, Aspect Technologies. All Rights Reserved.
Virtual Advanced Copyright © 1995-1997 Roland De Graaf.
v2.1.250224