中国在量子计算领域的突破对安全团队发出警告

  • A+
所属分类:未分类

中国与Google一起宣称拥有新技术的量子优势,从而加剧了RSA解密的担忧。

中国顶尖的量子计算机研究人员报告说,他们已经实现了量子霸权,即执行传统超级计算机无法完成的任务的能力。尽管这是一个激动人心的发展,但量子计算的必然崛起意味着安全团队距离面对比以往任何时候都更加强大的威胁仅一步之遥。

Researchers from the University of Science and Technology of China explained in the journal Science they were able to get a system they named Jiuzhang to perform a calculation in minutes that would have taken a traditional supercomputer an estimated 10,000 years to solve.

The team joins Google, which claimed it achieved quantum supremacy in Oct. 2019 using a “supercold, superconducting metal,” according to WIRED. IBM has also entered the quantum computing fray, while leveling criticism against Google’s claims of supremacy.

Now, the Chinese researchers have claimed quantum supremacy using a quantum computation called Gaussian boson sampling (GBS), their paper explained, which uses particles of light sent through an optical circuit, measuring the output. This means there are now multiple proven quantum-computing technologies, with surely more to come.

The security concern is that quantum computers will be able to crack RSA public key cryptography, used to protect data in transit. That means security teams will have to pivot to new post-quantum cryptography solutions. A conservative estimate from a 2019 DigiCert report said teams will need to have protections from quantum computing breaches in place by 2022.

To be clear, quantum computing isn’t there just yet. And the Chinese aren’t any closer to being able to decrypt RSA than Google or IBM, but it’s only a matter of time, according to experts.

“China’s new quantum-computing breakthrough is important for a number of reasons,” Tim Hollebeek, industry and standards technical strategist with DigiCert told Threatpost. “First, China has invested heavily in funding quantum-computing research, and this new result shows that that investment is paying off. Second, it means two different approaches to building a quantum computer have now successfully achieved quantum supremacy. This could potentially speed up the arrival of commercially useful quantum computers, as one approach may succeed if and when the other runs into some technical roadblock.”

Quantum Computing and RSA

John Prisco, from Safe Quantum Inc., said the ability for quantum computing to beat RSA is the goal, not the claims of quantum supremacy.

“China’s GSB approach is interesting but cumbersome to implement,” Prisco told Threatpost. “Quantum supremacy is not the prize at the finish line.  If it were, Google and IBM finished light years ahead of China’s claim. The finish line is a quantum prime computer capable of breaking encryption as we know it.”

He added when it comes to widespread implementation, the Chinese approach has challenges.

“Scaling the GSB approach to quantum prime levels is not likely, due to the enormity of the integration of classical mirrors and beam splitters,” he explained. “Ion trap or super-conducting quantum computers championed by IonQ and IBM respectively are likely to finish the race to a quantum prime computers well ahead of the China approach in this announcement.”

Nonetheless, Hollebeek warned that time is running short for security teams to prepare to combat malicious actors superpowered by quantum computing.

“While such quantum computers are not a threat to encryption today, they do remind us that the day is coming when that will no longer be true,” he said. “It is important that security professionals start planning for the transition to post-quantum cryptography, as such transitions take many years to plan and implement. The Chinese result probably does not materially change predictions of how soon that will be, but leading organizations still expect it to come within the next 10 years or so. So, it is important to start preparing now.”

The reasonable starting place would be a set of standards. But that’s been slow in coming.

Quantum-Computing Standards

The National Institute for Standards and Technology (NIST) hasn’t determined its guidance yet and is currently in a third round of a competition to decide the final Post-Quantum Cryptology standard going forward. The final draft standards aren’t expected to be available until 2022 at the earliest, according to NIST’s tentative timeline.

But while standards are still being hammered out, there are things business and IT teams can do to get prepared, including gaining an understanding of the looming landscape.

“Factorization of large prime numbers (RSA key cracking) by quantum computers is a real and huge problem,” Prisco warned. “Quantum literacy must improve in government agencies and corporations before a quantum prime computer exists. Creating a quantum-safe environment for data security will not occur overnight. ”

Today’s Threat from Quantum Computing

A harvesting attack right now could grab an RSA encryption key to be filed away until quantum computing catches up, he added.

“There is no time to waste, because of other classical security problems like harvesting attacks which occur today,” Prisco said. “A harvesting attack is the theft of encrypted data and the RSA encryption key used to encrypt that data. While the key cannot be hacked today with the currently available quantum computer, an adversary can steal the data and the key, store it inexpensively in memory, and decrypt the info when they have access to a more powerful quantum computer that can break the key.”

April Burdhardt from Quantum Xchage advised that security teams should deploy solutions agile enough to evolve along with both threats and still to-be-determined NIST standards — and they should do it now.

“Companies must start to prepare for the quantum threat now by deploying quantum-safe, crypto-agile solutions that can keep pace with the evolving threat landscape — not to mention guard against harvesting attacks,” Burdhardt told Threatpost. “We encourage companies and government agencies to adopt a multi-layered or defense-in-depth approach to secure-key transfer, protected by NIST post-quantum cryptography-candidate algorithms and/or [quantum key distribution] in a FIPS 140-2 validated implementation.

Put Ransomware on the Run: Save your spot for “What’s Next for Ransomware,” a FREE Threatpost webinar on Dec. 16 at 2 p.m. ET. Find out what’s coming in the ransomware world and how to fight back. 

Get the latest from John (Austin) Merritt, Cyber Threat Intelligence Analyst at Digital Shadows, and Israel Barak, CISO at Cybereason, on new kinds of attacks. Topics will include the most dangerous ransomware threat actors, their evolving TTPs and what your organization needs to do to get ahead of the next, inevitable ransomware attack. Register here for the Wed., Dec. 16 for this LIVE webinar.

发表评论

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: