We read this interesting article by Adriano DE ROSA on www.infosec.news of 2 November 2021.
More records for quantum computers
China has two Q-computers that would outperform the performance achieved so far by US competitors.
The production of quantum computers is an increasingly frequent reality in the most advanced countries of the world. It marks the beginning of yet another transition of our time, guided by the transformation of a theoretical idea into a concrete technology.
Quantum supremacy is the real driving force of this process and the data linked to it, to say the least, amazing, are pushing research in this area to improve almost daily the results previously achieved.
As if they were modern followers of a new-born futurist movement, magnetically attracted by the concept of speed, the United States and China are the countries that are achieving the best results globally.
This time it is the Asian country that attracts the attention of enthusiasts, with the presentation of two quantum computers that would surpass (the conditional is a must when it comes to China) the performance so far achieved by US competitors.
In a single millisecond Jiuzhang 2 promises to solve the same task for which the world’s fastest conventional computer would take 30 trillion years.
Even more impressive – if not yet – is the result of Zuchongzhi 2, a 66-qubit quantum supercomputer, 10 million times faster than Google’s 55-qubit Sycamore quantum computer.
What should we expect about marketing these miraculous devices? As was the case with the first computers, Q-computers will remain for some time locked up in research institutes.
At the moment, in fact, they can operate only at controlled temperature and to perform hyper-specialized tasks. Experiments are underway for calculation operations in the field of genetic mutation study, hypersonic flight simulation and stock price prediction.
The rapid growth that the sector is having, together with the widening of the application spectrum, presages a crucial role of quantum computers in the design of the society of the future. The transition in progress will soon take on the contours of a technological revolution, which will become even more appreciable when Q-computers, like computer progenitors, manage to become accessible to everyone.”
The potential of quantum computers was already known theoretically and already in 2008 the book MATHEMATICIANS SPIES AND COMPUTER PIRATES of the collection MATHEMATICAL WORLD wrote in chapter 6:
The end of cryptography?
“Quantum computation would bring with it the collapse of cryptography as we know it. Let’s take as an example the star of modern encryption algorithms, RSA.
As you will remember, anyone trying to break an RSA key by brute force, will have to successfully factorize the product of two huge prime numbers.
This operation is extraordinarily laborious and no mathematical attack has yet been found to deal with it more easily.
Could a quantum computer face the challenge of factoring a prime number the size of those handling the RSA key?
The answer, yes, was given by US computer scientist Peter Shor in 1994. Shor designed an algorithm, executable from a quantum computer, capable of decomposing huge numbers in an infinitely smaller time than the more powerful conventional computer.
If this amazing device were eventually built, Shor’s algorithm would destroy, piece by piece, the mighty cryptographic building built around the RSA and, overnight, the most sensitive communications on the planet would be exposed to sunlight.
The rest of contemporary cryptosystems would follow the same fate.”
We just had to wait for the hardware to reach the expected performance. TODAY WE ARE.
TODAY WE ARRIVED: What happens?
EASY to understand that the first task of these quantum computers is the violation of keys encrypted with brute force attacks.
The book goes on: With the advent of quantum computers cryptography would be dead, including the famous ASYMMETRIC CRYPTOGRAPHY or RSA, and everything would be revealed.
The book intended for a large audience tries to explain difficult concepts clearly but remains difficult the same. We report in the websites www.technosolution.org and www.realdigitalcurrency.com chapters 5 and 6 that speak enthusiastically about the final solution, the algorithm public and private key RSA and how, with quantum computers, also such algorithm is in web brags.
QUANTUM COMPUTERS ALREADY EXIST THAT VIOLATE ANY EXISTING ENCRYPTION.
What will they do?
THEY WILL EMPTY ALL ACCOUNTS IN CRYPTOCURRENCIES….
A COMPUTER to tame them, a COMPUTER to find them, a COMPUTER to seize them and chain them in the dark.
The Cavalry Arrives
It would seem the final victory of cryptographers against cryptographers, only the CRIPTEOS 3001 system laughs in the face of such results, 30 trillion years are only 18 zeros to remove from the immense number necessary to force CRIPTEOS 3001 with keys of 128 KILOBYTE . Even more, the REAL DIGITAL CURRENCY is protected with keys of 40 megabytes.
Keep in mind that they were made with “normal” computers, while they are scalable with keys longer than a TERABYTE.
But this had already been announced by Phil Zimmermann quoted in the book The Secret Codes of Simon Singh, “in modern cryptography it is possible to create really unattainable figures from all known forms of cryptanalysis”.
I’m sorry for the vendors who are struggling with cyber-security products, the first result of quantum computers is to select who wins from who loses. Even for all the millionaire startups that make crypto coins the “bubble” will burst. That’s what quantum computer algorithms say.