create account

A Quantum of Lies: No, researchers did not break RSA 2048 encryption with Quantum Computers. Here is how they cheated. by vikisecrets

View this thread on: hive.blogpeakd.comecency.com
· @vikisecrets · (edited)
$15.01
A Quantum of Lies: No, researchers did not break RSA 2048 encryption with Quantum Computers. Here is how they cheated.
Beim Thema Quanten-Computer ist es nicht so einfach Hype von Fakten zu trennen und es gibt noch eine dritte Kategorie, die man auf dem Radar haben muss:

Wissenschaftliche Publikationen, die große Durchbrüche bei Quanten-Computern behaupten, aber in Wirklichkeit keine sind, wie dieses Paper von 5 chinesischen Wissenschaftlern, das von keiner renommierten Konferenz peer-reviewed wurde.

Der Titel des Papers suggeriert, dass mit Quanten-Comptuern von D-Wave das erste Mal erfolgreich RSA-2048 Keys geknackt worden seien. Das wäre tatsächlich ein großer Durchbruch und ein Albtraum für die gesamte IT-Industrie. Mega-Schlagzeile. Quanten Computer brechen RSA-Verschlüsselung.

Es gibt nur einen kleinen Haken. Die Wissenschaftler haben gleich auf mehreren Ebenen geschummelt und eigentlich nichts erreicht.

Die RSA-Verschlüsselung basiert auf der Schwierigkeit das Produkt zweier großer Primzahlen zu faktorisieren.

```
N = p * q
```

Wobei p und q zwei unterschiedliche Primzahlen sein müssen und auch noch weitere Eigenschaften erfüllen müssen, damit RSA sicher ist.

Und genau hier schummelt das Paper heftig. Die Primzahlen wurden so gewählt, dass das Problem der Faktorisierung trivial wird.

Anstatt zwei unterschiedliche Primzahlen zu verwenden, verwenden sie für p und q dieselbe Primzahl, haben aber lediglich Bit 1 und Bit 2 geflippt.

Dadurch wird die Faktorisierung nahezu trivial. Es ergeben sich im Prinzip nur 4 mögliche Bitfolgen für die letzten 4 Bits von p und q: 0111 * 0001, 1111 * 1001, 0011 * 0101 und 1011 * 1101.

Der zweite Punkt, wo die Wissenschaftler schummeln, ist, dass sie für die Faktorisierung einen hybriden Ansatz verwenden, d.h. sowohl einen klassischen als auch einen Quanten-Computer. Und jetzt haltet euch fest, für die Faktorisierung verwenden sie hauptsächlich den klassischen Computer. Den relevanten Teil des Problems muss ein klassischer Computer lösen.

Der Quanten-Computer berechnet lediglich die zwei geflippten Bits, was eine triviale Aufgabe ist, die eigentliche Faktorisierung muss ein klassischer Algorithmus erledigen (siehe Equation 16 und 18 im Paper), worauf im Paper aber nicht klar hingewiesen wird.

Und der dritte Punkt, wo das Paper ein bisschen schummelt, ist in der Konvertierung der objective Function der Multiplikation in ein QUBO-Problem (Quadratic Unconstrained Binary Optimization). Hier werden einige Vereinfachungen durchgeführt, um das Problem überhaupt mit Quantum-Annealing berechnen zu können.

Im Prinzip ist mit dem Quanten-Computer nichts gewonnen, sondern es wurde ein trivialer Fall konstruiert, um einen Quanten-Computer zu verwenden, ohne einen wirklichen Nutzen zu generieren, um behaupten zu können, sie haben einen Spezial-Fall mit schwachen Primzahlen mit einem Quanten-Computer geknackt, wobei die relevante Berechnung klassisch stattfinden muss.

Insgesamt ist das eine ziemlich unseriöse Vorgehensweise.

Interessant an dem Paper ist hingegen, dass man mit Quantum-Annealing auch Faktorisierungen berechnen könnte, aber die Frage ist, ob das mit den Vereinfachungen und mit den bekannten Problemen von Quanten-Computern (Noise, Skalierung, Annealing liefert keine exakten Ergebnisse sondern ist ein Optimierungsalgorithmus) in der Praxis überhaupt bei größeren Zahlen, die mehr als ein paar Bits lang sind, funktionieren würde. Hier könnte es in der Praxis schnell zu Limitierungen kommen.

Was sagt ihr dazu? Denkt ihr, dass man mit Quantum-Annealing tatsächlich größere Zahlen faktorisieren kann oder ist das mehr Hype als Realität?

## Wang C, Yu J, Pei Z, et al. A First Successful Factorization of RSA-2048 Integer by D-Wave Quantum Computer.

![image.png](https://files.peakd.com/file/peakd-hive/vikisecrets/EoeMA4jd4kGL29ti7oFDCitoSNW6xevrBFmechYJMbv7N835vy3CnCMqKMmqTZycACi.png)

https://www.sciopen.com/article/10.26599/TST.2024.9010028

## Kaspersky: Quantum of Lies

https://www.kaspersky.com/blog/quantum-cryptography-2024-hype/52884/

## Sabine Hossenfelder: Chinese claim "First Successful Factorization of RSA-2028 Integer".

https://www.youtube.com/watch?v=RJ16miAsnZw

Video credit: [Sabine Hossenfelder](https://www.youtube.com/watch?v=RJ16miAsnZw)



## English

When it comes to quantum computing, it's not so easy to separate hype from fact and there's a third category to keep on the radar:

Scientific publications that claim major breakthroughs in quantum computing but in reality are not, like this paper by 5 Chinese scientists that has not been peer-reviewed by any reputable conference.

The title of the paper suggests that by using quantum computers from D-Wave they have successfully cracked RSA-2048 keys for the first time. This would indeed be a major breakthrough and a nightmare for the entire IT industry. Mega headline. Quantum computers break RSA encryption.

There's just one small catch. The scientists cheated on several levels and didn't actually achieve anything.

RSA encryption is based on the difficulty of factorizing the product of two large prime numbers.

```
N = p * q
```

Whereby p and q must be two different prime numbers and must also fulfill other properties for RSA to be secure.

And this is exactly where the paper cheats badly. The primes were chosen in such a way that the problem of factorization becomes trivial.

Instead of using two different primes, they used the same prime for p and q, but only flipped bit 1 and bit 2.

This makes factorization almost trivial. In principle, there are only 4 possible bit sequences for the last 4 bits of p and q: 0111 * 0001, 1111 * 1001, 0011 * 0101 and 1011 * 1101.

The second point where the scientists cheat is that they use a hybrid approach for the factorization, i.e. both a classical and a quantum computer. And now brace yourself, for the factorization they mainly use a classical computer. The relevant part of the problem has to be solved by a classical computer.

The quantum computer only calculates the two flipped bits, which is a trivial task, the actual factorization has to be done by a classical algorithm (see Equation 16 and 18 in the paper), but this is not clearly pointed out in the paper.

And the third point where the paper cheats a bit is in the conversion of the objective function of the multiplication into a QUBO problem (Quadratic Unconstrained Binary Optimization). Some simplifications are made here in order to be able to calculate the problem with quantum annealing at all.

In principle, nothing is gained with the quantum computer, but a trivial case has been constructed to use a quantum computer without generating any real benefit in order to be able to claim that they have cracked a special case with weak primes with a quantum computer, whereas the relevant calculation must take place classically.

All in all, this is a rather dubious approach.

What is interesting about the paper, however, is that quantum annealing could also be used to calculate factorizations, but the question is whether this would even work in practice with the simplifications made and with the known problems of quantum computers (noise, scaling, annealing does not provide exact results but is an optimization algorithm) for larger numbers that are more than a few bits long. This could quickly lead to limitations in practice.

What do you think? Do you think that quantum annealing can actually be used to factorize larger numbers or is this more hype than reality?
👍  , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and 98 others
properties (23)
authorvikisecrets
permlinka-quantum-of-lies-no-researchers-did-not-break-rsa-2048-encryption-with-quantum-computers-here-is-how-they-cheated
categoryhive-163521
json_metadata{"app":"peakd/2025.5.6","format":"markdown","image":["https://files.peakd.com/file/peakd-hive/vikisecrets/EoeMA4jd4kGL29ti7oFDCitoSNW6xevrBFmechYJMbv7N835vy3CnCMqKMmqTZycACi.png"],"links":["https://www.youtube.com/watch?v=RJ16miAsnZw"],"tags":["quantumcomputers","stem","physics","dwave","rsa","encryption","deutsch","proofofbrain","hive-engine","inleo"],"users":[]}
created2025-05-14 10:25:54
last_update2025-05-14 13:56:15
depth0
children10
last_payout2025-05-21 10:25:54
cashout_time1969-12-31 23:59:59
total_payout_value7.516 HBD
curator_payout_value7.495 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length7,389
author_reputation1,199,496,796,275,883
root_title"A Quantum of Lies: No, researchers did not break RSA 2048 encryption with Quantum Computers. Here is how they cheated."
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id142,720,766
net_rshares42,883,915,757,301
author_curate_reward""
vote details (162)
@davideownzall ·
$0.11
Well that was sort of expected, they prolly exploit the fact that not many people know how it works

!PIZZA 
👍  ,
properties (23)
authordavideownzall
permlinkre-vikisecrets-sw997g
categoryhive-163521
json_metadata{"tags":["hive-163521"],"app":"peakd/2025.5.6","image":[],"users":[]}
created2025-05-14 14:21:15
last_update2025-05-14 14:21:15
depth1
children2
last_payout2025-05-21 14:21:15
cashout_time1969-12-31 23:59:59
total_payout_value0.055 HBD
curator_payout_value0.055 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length108
author_reputation102,319,470,853,299
root_title"A Quantum of Lies: No, researchers did not break RSA 2048 encryption with Quantum Computers. Here is how they cheated."
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id142,724,568
net_rshares319,300,555,049
author_curate_reward""
vote details (2)
@vikisecrets ·
Yeah, I got a bit skeptical lately when reading about major breakthroughs in Quantum Computing. Subject is so complicated that it's easy to bluff. So far I don't see any real-world use case despite the claim having thousands of qubits and quantum supremacy achieved etc. Even D-Wave made a similar announcement recently but it's not super clear what they actually computed.
👍  
properties (23)
authorvikisecrets
permlinkre-davideownzall-sw9abl
categoryhive-163521
json_metadata{"tags":["hive-163521"],"app":"peakd/2025.5.6"}
created2025-05-14 14:45:21
last_update2025-05-14 14:45:21
depth2
children1
last_payout2025-05-21 14:45:21
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length373
author_reputation1,199,496,796,275,883
root_title"A Quantum of Lies: No, researchers did not break RSA 2048 encryption with Quantum Computers. Here is how they cheated."
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id142,725,015
net_rshares827,639,119
author_curate_reward""
vote details (1)
@davideownzall ·
$0.10
And in the end of the day they can even lie, no one can due them for this, they might just say oh we made an error
👍  
properties (23)
authordavideownzall
permlinkre-vikisecrets-sw9ag2
categoryhive-163521
json_metadata{"tags":["hive-163521"],"app":"peakd/2025.5.6","image":[],"users":[]}
created2025-05-14 14:48:03
last_update2025-05-14 14:48:03
depth3
children0
last_payout2025-05-21 14:48:03
cashout_time1969-12-31 23:59:59
total_payout_value0.047 HBD
curator_payout_value0.048 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length114
author_reputation102,319,470,853,299
root_title"A Quantum of Lies: No, researchers did not break RSA 2048 encryption with Quantum Computers. Here is how they cheated."
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id142,725,056
net_rshares275,716,208,381
author_curate_reward""
vote details (1)
@djbravo ·
It's exactly like that. Many people didn't know what was being done in this way, but from your post, everyone has come to know very special things about this company. 
properties (22)
authordjbravo
permlinkre-vikisecrets-2025515t52859842z
categoryhive-163521
json_metadata{"tags":["quantumcomputers","stem","physics","dwave","rsa","encryption","deutsch","proofofbrain","hive-engine","inleo"],"app":"ecency/4.0.4-vision","format":"markdown+html"}
created2025-05-15 00:29:03
last_update2025-05-15 00:29:03
depth1
children0
last_payout2025-05-22 00:29:03
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length167
author_reputation358,356,949,531,659
root_title"A Quantum of Lies: No, researchers did not break RSA 2048 encryption with Quantum Computers. Here is how they cheated."
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id142,735,525
net_rshares0
@gatet ·
$0.11
Quantum research companies have been very popular lately.
👍  ,
properties (23)
authorgatet
permlinkre-vikisecrets-2025514t151032817z
categoryhive-163521
json_metadata{"tags":["quantumcomputers","stem","physics","dwave","rsa","encryption","deutsch","proofofbrain","hive-engine","inleo"],"app":"ecency/4.0.4-vision","format":"markdown+html"}
created2025-05-14 13:10:30
last_update2025-05-14 13:10:30
depth1
children0
last_payout2025-05-21 13:10:30
cashout_time1969-12-31 23:59:59
total_payout_value0.055 HBD
curator_payout_value0.055 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length57
author_reputation1,046,720,027,485
root_title"A Quantum of Lies: No, researchers did not break RSA 2048 encryption with Quantum Computers. Here is how they cheated."
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id142,723,437
net_rshares319,282,343,335
author_curate_reward""
vote details (2)
@hatdogsensei ·
I think that is more of a hype as this field requires a lot of research and testing
properties (22)
authorhatdogsensei
permlinksw9fkp
categoryhive-163521
json_metadata{"app":"hiveblog/0.1"}
created2025-05-14 16:38:54
last_update2025-05-14 16:38:54
depth1
children0
last_payout2025-05-21 16:38:54
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length83
author_reputation90,102,053,868,321
root_title"A Quantum of Lies: No, researchers did not break RSA 2048 encryption with Quantum Computers. Here is how they cheated."
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id142,727,036
net_rshares0
@jfang003 ·
$0.09
@jfang003 "Well, it doesn't look its a valid solution, but I ..."
Well, it doesn't look its a valid solution, but I guess it did make some improvements. Let's see how things go first before making any conclusion as other researchers could do a better job.
👍  
properties (23)
authorjfang003
permlinkre-vikisecrets-fmokhyi5
categoryhive-163521
json_metadata{"app":"leothreads/0.3","format":"markdown","tags":["leofinance"],"canonical_url":"https://inleo.io/threads/view/jfang003/re-vikisecrets-fmokhyi5","isPoll":false,"pollOptions":{},"dimensions":[]}
created2025-05-15 04:37:21
last_update2025-05-15 04:37:21
depth1
children0
last_payout2025-05-22 04:37:21
cashout_time1969-12-31 23:59:59
total_payout_value0.046 HBD
curator_payout_value0.047 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length189
author_reputation638,460,932,612,759
root_title"A Quantum of Lies: No, researchers did not break RSA 2048 encryption with Quantum Computers. Here is how they cheated."
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id142,737,896
net_rshares272,259,166,009
author_curate_reward""
vote details (1)
@lee1938 ·
https://x.com/lee19389/status/1922788165460353368
#hive #posh
properties (22)
authorlee1938
permlinksw9x2y
categoryhive-163521
json_metadata{"tags":["hive","posh"],"app":"hiveblog/0.1"}
created2025-05-14 22:57:00
last_update2025-05-14 22:57:00
depth1
children0
last_payout2025-05-21 22:57:00
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length61
author_reputation45,619,778,704,754
root_title"A Quantum of Lies: No, researchers did not break RSA 2048 encryption with Quantum Computers. Here is how they cheated."
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id142,734,453
net_rshares0
@mundharmonika ·
$0.10
!PIZZA 
👍  
properties (23)
authormundharmonika
permlinkre-vikisecrets-sw99yb
categoryhive-163521
json_metadata{"tags":["hive-163521"],"app":"peakd/2025.5.6","image":[],"users":[]}
created2025-05-14 14:37:24
last_update2025-05-14 14:37:24
depth1
children0
last_payout2025-05-21 14:37:24
cashout_time1969-12-31 23:59:59
total_payout_value0.048 HBD
curator_payout_value0.048 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length7
author_reputation51,511,583,372,642
root_title"A Quantum of Lies: No, researchers did not break RSA 2048 encryption with Quantum Computers. Here is how they cheated."
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id142,724,859
net_rshares275,968,953,037
author_curate_reward""
vote details (1)
@pizzabot · (edited)
RE: A Quantum of Lies: No, researchers did not break RSA 2048 encryption with Quantum Computers. Here is how they cheated.
<center>PIZZA!


$PIZZA slices delivered:
davideownzall tipped vikisecrets 
@mundharmonika<sub>(2/5)</sub> tipped @vikisecrets 


<sub>Come get [MOON](https://moon.hive.pizza)ed!</sub></center>
properties (22)
authorpizzabot
permlinkre-a-quantum-of-lies-no-researchers-did-not-break-rsa-2048-encryption-with-quantum-computers-here-is-how-they-cheated-20250514t142136z
categoryhive-163521
json_metadata"{"app": "pizzabot"}"
created2025-05-14 14:21:36
last_update2025-05-14 14:37:45
depth1
children0
last_payout2025-05-21 14:21:36
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length193
author_reputation7,541,173,784,865
root_title"A Quantum of Lies: No, researchers did not break RSA 2048 encryption with Quantum Computers. Here is how they cheated."
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id142,724,571
net_rshares0