iTnews Asia
  • Home
  • News
  • Security

Quantum computers won't break RSA encryption any time soon

Quantum computers won't break RSA encryption any time soon

Fujitsu simulation finds Shor’s algorithm still too hard to run.

By Richard Chirgwin on Jan 25, 2023 10:53AM

Modern encryption algorithms like RSA 2048 will remain safe from decryption by quantum computers for the foreseeable future, according to scientists from Fujitsu.

The researchers used the company’s Fugaku supercomputer and its 39 bit quantum simulator to simulate a quantum-based attack on RSA using Shor’s algorithm.

They found that to factor a composite number of 2048 bits would require around 10,000 qubits, 2.23 trillion quantum gates, and “a quantum circuit depth of 1.8 trillion”, Fujitsu said in a statement.

The researchers also found a sufficiently-large fault-tolerant quantum computer would need 104 days to crack RSA.

While warning against complacency, senior director of data and security research at Fujitsu Dr Tetsuya Izu said: “Our research demonstrates that quantum computing doesn’t pose an immediate threat to existing cryptographic methods”.

US academic Peter Shor proposed his algorithm for using quantum computers to attack cryptography in 1994.

Fujitsu was able to factor RSA-type integers from 15 to 511.

The researchers then generated quantum circuits to factor composite numbers from 10 bits to 25 bits, and used the results to estimate what would be needed to factor a 2048 bit composite number.

The research is to be presented at this week’s 2023 Symposium on Cryptography and Information Security (SCIS 2023) in Kitakyushu City in southern Japan.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
fujitsu quantum computer rsa security shors algorithm software

Related Articles

  • Your organisation’s physical security can be a gateway for cybercriminals
  • The best way to outsmart your threat actors is to think like one
  • How cybercriminals are exploiting LLMs to harm your business
  • Is identity now the next parameter of cybersecurity breaches?
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

The best way to outsmart your threat actors is to think like one

The best way to outsmart your threat actors is to think like one

Your organisation’s physical security can be a gateway for cybercriminals

Your organisation’s physical security can be a gateway for cybercriminals

What are the most pressing cyber security concerns going into 2025?

What are the most pressing cyber security concerns going into 2025?

Malaysia ramps up cyber security defense to stem rising fraud and ransomware attacks

Malaysia ramps up cyber security defense to stem rising fraud and ransomware attacks

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.