小程序
传感搜
传感圈

Are Quantum Computers about to Break Online Privacy?

2023-01-10 15:52:43
关注

A team of researchers in China has unveiled a technique that—theoretically—could crack the most common methods used to ensure digital privacy, using a rudimentary quantum computer.

The technique worked in a small-scale demonstration, the researchers report, but other specialists are sceptical that the procedure could be scaled up to beat ordinary computers at the task. Still, they warn that the paper, posted late last month on the arXiv repository, is a reminder of the vulnerability of online privacy.

Quantum computers are known to be a potential threat to current encryption systems, but the technology is still in its infancy. Researchers typically estimate that it will be many years until quantum computers can crack cryptographic keys—the strings of characters used in an encryption algorithm to protect data—faster than ordinary computers.

Researchers realized in the 1990s that quantum computers could exploit peculiarities of physics to perform tasks that seem to be beyond the reach of ‘classical’ computers. Peter Shor, a mathematician who is now at the Massachusetts Institute of Technology in Cambridge, showed in 1994 how to apply the phenomena of quantum superposition—which describes the ability of atomic-sized objects to exist in a combination of multiple states at the same time—and quantum interference, which is analogous to how waves on a pond can add to each other or cancel each other out , to factoring integer numbers into primes, the integers that cannot be further divided without a remainder.

Shor’s algorithm would make a quantum computer exponentially faster than a classical one at cracking an encryption system based on large prime numbers—called Rivest–Shamir–Adleman, or RSA, after the initials of its inventors—as well as some other popular cryptography techniques, which currently protect online privacy and security. But implementing Shor’s technique would require a quantum computer much larger than the prototypes that are available. The size of a quantum computer is measured in quantum bits, or qubits. Researchers say it might take one million or more qubits to crack RSA. The largest quantum machine available today—the Osprey chip, announced in November by IBM—has 433 qubits.

A fresh approach

Shijie Wei at the Beijing Academy of Quantum Information Sciences and collaborators took a different route to beat RSA, based not on Shor’s but on Schnorr’s algorithm—a process for factoring integer numbers devised by mathematician Claus Schnorr at Goethe University in Frankfurt, Germany, also in the 1990s. Schnorr’s algorithm was designed to run on a classical computer, but Wei’s team implemented part of the process on a quantum computer, using a procedure called the quantum approximate optimization algorithm, or QAOA.

In the paper, which has not yet been peer reviewed, the authors claim that their algorithm could break strong RSA keys—numbers with more than 600 decimal digits—using just 372 qubits. In an e-mail to Nature on behalf of all the authors, Guilu Long, a physicist at Tsinghua University in China, cautioned that having many qubits is not enough, and that current quantum machines are still too error-prone to do such a large computation successfully. “Simply increasing the qubit number without reducing the error rate does not help.”

Chao-Yang Lu, a physicist who builds quantum computers at the University of Science and Technology of China in Hefei and who was not involved in the project, says that running the QAOA algorithm on such a small machine would require each of the 372 qubits to work without errors 99.9999% of the time. State-of-the-art qubits have barely reached 99.9% accuracy.

The team demonstrated the technique on a 10-qubit quantum computer to factor the more-manageable, 15-digit number 261,980,999,226,229. (It splits into two primes, as 15,538,213 × 16,860,433.) The researchers say this is the largest number yet to have been factored with the aid of a quantum computer—although it is much smaller than the encryption keys used by modern web browsers.

Controversial paper

The trouble is, no one knows whether the QAOA makes factoring large numbers faster than just running Schnorr’s classical algorithm on a laptop. “It should be pointed out that the quantum speedup of the algorithm is unclear,” write the authors. In other words, although Shor’s algorithm is guaranteed to break encryption efficiently when (and if) a large-enough quantum computer becomes available, the optimization-based technique could run on a much smaller machine, but it might never finish the task.

Michele Mosca, a mathematician at the University of Waterloo in Canada, also points out that the QAOA is not the first quantum algorithm known to be able to factor whole numbers using a small number of qubits. He and his collaborators described one in 2017. So researchers already knew that there is nothing fundamental that requires quantum computers to be very large to factor numbers.

Other researchers have complained that, although the latest paper could be correct, the caveat regarding speed comes only at the very end of it. “All told, this is one of the most misleading quantum computing papers I’ve seen in 25 years,” blogged quantum-computing theorist Scott Aaronson at the University of Texas at Austin.

In his e-mail, Long says that he and his collaborators plan to change the paper and will move the caveat higher up. “We welcome the peer review and the communication with scientists around the world,” the statement added.

Even if the Schnorr-based technique won’t break the Internet, quantum computers could eventually do so by running Shor’s algorithm. Security researchers have been busy developing a number of alternative cryptographic systems that are seen as less likely to succumb to a quantum attack, called post-quantum or quantum-safe. But researchers might also discover better quantum algorithms in the future that can beat these systems, with calamitous consequences.

“Confidence in digital infrastructures would collapse,” says Mosca. “We’d suddenly switch from managing the quantum-safe migration through technology lifecycle management to crisis management,” he adds. “It won’t be pretty any way you slice it.”

This article is reproduced with permission and was first published on January 6 2023.

参考译文
量子计算机将打破网络隐私?
中国的一个研究小组公布了一种技术,理论上可以利用一个基础的量子计算机来破解目前最常用的保障数字隐私的方法。研究人员表示,在小规模演示中,这种技术确实有效,但其他专家对该程序能否扩大规模,从而在破解加密任务上超越传统计算机持怀疑态度。尽管如此,他们警告说,这篇论文于上个月晚些时候发布在arXiv资料库上,提醒人们在线隐私的脆弱性。量子计算机被认为是对现有加密系统的一种潜在威胁,但这项技术仍处于起步阶段。研究人员通常估计,量子计算机要能在破解加密密钥(用于加密算法中以保护数据的一串字符)方面胜过普通计算机,可能还需要很多年。1990年代,研究人员意识到量子计算机可以利用物理学的独特性质完成一些任务,这些任务似乎超出了“经典”计算机的能力范围。现在在麻省理工学院的数学家彼得·肖尔(Peter Shor)于1994年展示了如何利用量子叠加现象——即描述原子级物体可以同时处于多种状态的特性,以及量子干涉现象——类似于池塘中波浪可以相互叠加或抵消——来进行质因数分解,即将整数分解成不能被进一步整除的质数。肖尔算法将使量子计算机在破解基于大质数的加密系统(以发明者名字命名为RSA)和一些其他流行的加密技术方面,比传统计算机快指数倍,这些技术目前保障着在线隐私和安全。但要实现肖尔的算法,需要的量子计算机远比目前的原型机大得多。量子计算机的规模以量子比特(qubits)数量来衡量。研究人员表示,破解RSA可能需要一个拥有一百万个或更多量子比特的量子计算机。目前最大的量子计算机是IBM今年11月推出的“海雕”(Osprey)芯片,拥有433个量子比特。来自中国北京量子信息科学研究院的魏世杰及其合作者采取了一条不同的路线来破解RSA加密,他们使用的是肖尔算法的替代方案——舒诺尔算法(Schnorr's algorithm),这一算法由德国法兰克福歌德大学的数学家克劳斯·舒诺尔(Claus Schnorr)于1990年代提出。舒诺尔算法原本是为经典计算机设计的,但魏世杰的团队采用了一种名为量子近似优化算法(QAOA)的程序,在量子计算机上部分实现该过程。在这篇尚未经过同行评审的论文中,作者声称,他们的算法只需使用372个量子比特,就能破解强RSA密钥(即超过600位的十进制数字)。在给《自然》杂志的电子邮件中,中国清华大学的物理学家龙桂鲁指出,拥有大量量子比特并不足够,因为目前的量子计算机仍然存在太多错误,难以成功完成如此大规模的计算。“仅仅增加量子比特的数量,而没有减少错误率,是没用的。”中国科学技术大学合肥校区的量子计算机研究者陆朝阳表示,要在一个如此小的机器上运行QAOA算法,372个量子比特中每一个的正确操作成功率必须达到99.9999%,而目前最先进的量子比特的准确率才勉强达到99.9%。该团队在一个10量子比特的量子计算机上展示了该技术,成功分解了一个更易处理的15位数字261,980,999,226,229。(它被分解为两个质数:15,538,213 × 16,860,433。)研究人员表示,这是迄今为止用量子计算机分解出的最大数字,尽管它远远小于现代网络浏览器使用的加密密钥。有争议的论文问题是,目前尚无人知道QAOA是否真的比在笔记本电脑上运行舒诺尔的经典算法更快。“应该指出,该算法的量子加速效果尚不明确。”论文作者写道。换句话说,尽管肖尔算法在足够大的量子计算机出现时(如果出现)可以保证高效破解加密,但基于优化的QAOA技术则可以在小得多的设备上运行,但它可能永远无法完成任务。加拿大滑铁卢大学的数学家米歇尔·莫萨(Michele Mosca)也指出,QAOA并不是已知的第一个能用少量量子比特分解整数的量子算法。他和其团队在2017年就描述过一种类似的方法。因此,研究人员早已知道,并没有根本性的限制要求量子计算机必须非常巨大才能分解整数。其他研究人员也抱怨说,尽管这篇新论文可能是正确的,但关于速度的问题却只在最后才提到。“综合来看,这是我25年来见过的最具误导性的量子计算论文之一。”德克萨斯大学奥斯汀分校的量子计算理论家斯科特·阿罗诺森(Scott Aaronson)在博客中写道。在电子邮件中,龙桂鲁表示,他和合作者计划修改这篇论文,并将警告内容提前。“我们欢迎同行评审和与世界各地科学家的交流,”声明中补充道。即使基于舒诺尔的技术不会直接破坏互联网,但最终运行肖尔算法的量子计算机可能会做到这一点。安全研究人员一直在努力开发一些替代性加密系统,这些系统被认为更不容易受到量子攻击,被称为“后量子”(post-quantum)或“量子安全”(quantum-safe)系统。但研究人员未来也可能会发现更好的量子算法,从而击败这些系统,造成灾难性后果。“我们对数字基础设施的信心将崩溃,”莫萨说。“我们会突然从通过技术生命周期管理来进行量子安全迁移,转为危机管理。”他补充道,“不管以何种方式来看,这都不会是什么好结果。”本文经授权转载,首次发表于2023年1月6日。
您觉得本篇内容如何
评分

评论

您需要登录才可以回复|注册

提交评论

广告
提取码
复制提取码
点击跳转至百度网盘