Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Encryption Google Security

How Many Qubits Will It Take to Break Secure Public Key Cryptography Algorithms? (googleblog.com) 53

Wednesday Google security researchers published a preprint demonstrating that 2048-bit RSA encryption "could theoretically be broken by a quantum computer with 1 million noisy qubits running for one week," writes Google's security blog.

"This is a 20-fold decrease in the number of qubits from our previous estimate, published in 2019... " The reduction in physical qubit count comes from two sources: better algorithms and better error correction — whereby qubits used by the algorithm ("logical qubits") are redundantly encoded across many physical qubits, so that errors can be detected and corrected... [Google's researchers found a way to reduce the operations in a 2024 algorithm from 1000x more than previous work to just 2x. And "On the error correction side, the key change is tripling the storage density of idle logical qubits by adding a second layer of error correction."]

Notably, quantum computers with relevant error rates currently have on the order of only 100 to 1000 qubits, and the National Institute of Standards and Technology (NIST) recently released standard PQC algorithms that are expected to be resistant to future large-scale quantum computers. However, this new result does underscore the importance of migrating to these standards in line with NIST recommended timelines.

The article notes that Google started using the standardized version of ML-KEM once it became available, both internally and for encrypting traffic in Chrome...

"The initial public draft of the NIST internal report on the transition to post-quantum cryptography standards states that vulnerable systems should be deprecated after 2030 and disallowed after 2035. Our work highlights the importance of adhering to this recommended timeline."

How Many Qubits Will It Take to Break Secure Public Key Cryptography Algorithms?

Comments Filter:
  • I think most of my SSH keys are 4Kb RSA. If they need a million qubits for 2Kb, do they have to square that for 4K?

    Is there a good post-quantum recommendation for ssh keys?

    • 640. (Score:2, Funny)

      by Anonymous Coward

      640 qubits ought to be enough for anybody.

    • by gweihir ( 88907 )

      Stay with that 4096 bit key. Nobody is going to break it in the next 100 years.

    • "If they need a million qubits for 2Kb, do they have to square that for 4K"

      If they did, it seems like that would be a problem for the first 2Kib. Following that logic, 1000 qubits could handle 1Kib, and 32 qubits could handle 512 bits (which it obviously cannot).

      • So, the purpose of a quantum computer is to translate O(c^n) to O(log(n)) or exponential to logarithmic time complexity. (hmm, or was it O(n*log(n)), linearithmic time)

        If a million qubits can solve the problem in a week, technically, the larger system will use considerably more time.

        And noisy qubits with error correction all estimation, not solving
    • For your actual SSH keys you can stick to RSA 4096 or better still, Ed25519. As for the key exchange phase, which I presume is what you're really asking about, there are two post-quantum alternatives available today: ML-KEM x25519 (aka "mlkem768x25519-sha256" in OpenSSH) and NTRU Prime ("sntrup761x25519-sha512").
    • by niftydude ( 1745144 ) on Saturday May 24, 2025 @07:02PM (#65402139)
      Grover's algorithm apparently scales by order sqrt(N).

      So I guess for 4 kb RSA, maybe that becomes 1.4 million noisy qubits and 10 days.

      Both those numbers seem crazy large to me given where current state of the art Quantum computing is.

      Holding a quantum state for a week while Grover's algorithm runs all it's iterations seems very, very far away to me.
      • by ceoyoyo ( 59147 ) on Saturday May 24, 2025 @07:48PM (#65402187)

        You use Shor's algorithm on RSA. It's order log(N).

        Grover's algorithm would work on things like AES. If you can get it to work at all, which is iffy even compared to Shor's algorithm.

        The N isn't the key length, it's the search space. RSA's search space is, roughly, N = 2^n where n is the key length in bits. 2^4096 / 2^2048 is 2^2048 so a 4096 bit key is ridiculously stronger than a 2048 bit one. BUT, if you have a quantum computer that can run Shor's algorithm on it, log(2^4096) / log(2^2048) is only 2. That's not how many more qubits you need, it's more like the time it takes if you've got enough cubits, but 2 is a small enough number that cryptography types aren't willing to gamble.

        Grover's algorithm is sqrt(N). sqrt(2^512) / sqrt(2^256) is still a gigantic number, which is why the recommendation for AES is to double your key length and not worry about it. Or just not worry about it if you're a normal mortal.

    • At some point we're going to run out of parallel universes, right?
    • While I don't understand all the details, from what I'm reading SSH is expected to rely on a new key exchange algorithm called ML-KEM, and this is designed to address standards defined by FIPS 203-205. Some Google searches should get you closer to an authoritative answer (if there even is one).

  • Noah: (Score:3, Funny)

    by Anonymous Coward on Saturday May 24, 2025 @04:11PM (#65401837)

    What's a qubit?

  • I have two questions. One, why would this not be instantaneous? I thought the point of quantum computing was that all states were visited in parallel, with it collapsing on the final state pretty much instantly. You set up the starting state, and it collapses into the result. At least that's what I've always heard.

    The second, is how do you know when you've successfully decrypted the data? What if you end up with data that looks correct (like a credit card number, or a valid sentence that even makes sense),

    • by AlanObject ( 3603453 ) on Saturday May 24, 2025 @04:33PM (#65401871)

      That is a common misconception about quantum computing. One that I shared until I started learning more about it. No, it doesn't do everything all at once in parallel.

      Here is an excellent video [youtube.com] that, if you are willing to part with about 30 minutes in time, will make you 10 billion percent better informed than you are now, or I was. I really think everyone with these question should watch this.

      • I spent the thirty minutes. It's heady stuff even in the dumbed down form. Now I understand it even less than before.

    • by ceoyoyo ( 59147 )

      Pop sci explanations are rarely very good.

      A quantum computer is a highly programmable random number generator. The trick is to come up with a circuit that makes the random numbers you get as output have a distribution that is related to your problem in some usable way. Each run gives you one sample.

      Suppose you've set things up so your answer is the mean or the mode of that distribution. Depending on how good your computer and algorithm are, i.e. what the shape of that distribution is and how noisy your resu

    • No. It's not going to create an avalanche effect. The "singularity" isn't about to happen.
    • The problem you're presenting [in your 2nd paragraph] is for symmetric ciphers. But that's not the problem presented by TFA. There the question is to take a public key and produce the private key. There the math is well-defined for validation.

      Additionally, albeit this is well beyond my expertise, re a plausible but incorrect decryption [of a symmetric cipher], you're dealing with a few issues.

      a) you're basically asking for the equivalent of the intersection of multiple checksum/hash functions. Possible, but

  • by gweihir ( 88907 ) on Saturday May 24, 2025 @04:53PM (#65401915)

    The use of "teoretically" and then "1M noisy Qbits" and "1 week" and finally "RSA 2048". Now, how should I put this?
    1. 1M QBits are so far out of reach (because they still need to get entangled and stay that way), this may as well a prediction for the next millenia.
    2. A QC calculation 1 week long? Are you serious? That is probably even harder than (1).
    3. RSA 2048? That was the state of things a decade or so ago. And if people were smart and used encryption with perfect forward secrecy, breaking that key gets you excatly nothing.

    So, nothing to see here. Seriously.

    • by sjames ( 1099 )

      Meanwhile, the steady march of breathless press releases anticipating larger numbers of Qbits seems to have dried up. MS turned out to have nithing and Google abruptly went silent about the time they were anticipating crowing about success.

      I'm guessing they discovered some new and exciting way that Qbits lose coherence.

      • by gweihir ( 88907 )

        Yes, I suspect the same.

      • by PPH ( 736903 )

        It's looking like the quantum computing world is running into the practical limitations of the kind that AI will be encountering soon. The difference being that QC didn't try to secure Terawatts of utility capacity prior to having anything to show for itself.

        • by gweihir ( 88907 )

          With QCs it is more that adding QBits increses effort much more than linearly. That means you are going to hit a wall at relatively low numbers. In that situations, tech breakgroughs give you a constant factor (which we have observed seveal times over the last 40 years or so), but they never lead to scalability and that wall is still there. Given that breaking RSA requires 3x the number of effective (error corrected) QBits than the keylenght, and these need to stay entangled over a long computation, even to

          • by sjames ( 1099 )

            Worse, there is now no uncontaminated internet to steal for a second time. It's too polluted with hallucinations from the first wave of LLMs.

    • by ceoyoyo ( 59147 )

      They don't mean that a single calculation is a week long. That would be ridiculous. They mean that their hypothetical computer would hypothetically need about a week to run enough times to provide enough samples to give a reasonable confidence in the answer.

      • by gweihir ( 88907 )

        Are you sure? They talk about error correction and that usually means a single compuation.

        • by ceoyoyo ( 59147 )

          The paper [arxiv.org] talks about the execution time in section "3.2 Physical Costs."

          It's extremely jargon heavy, but a "shot" is a single execution of the algorithm, and they estimate the per-shot time at 12 hours. That's still ridiculous, but they're proposing to use a couple different types of quantum state storage so I don't think you'd actually need to maintain coherence in your computational qubits for that long. That requirement is more like milliseconds, which is still pushing it for current superconducting QCs

    • re state of the rat & RSA2048... yeah, it's still state of the rat. At least 18 months ago, the last time I was directly involved therein, Google, Fastly & CloudFlare only allowed 2048 bit RSA keys on their CDNs/LBs [also 256bit EC].
      They didn't care what you had on your origins [and for that, keepalive/pipelining is a thing], but for computation reasons they don't allow big RSA keys on their outward facing systems [and ditto Google's internal LBs].

      I do agree that 1M qbits is believed currently impos

      • by gweihir ( 88907 )

        Well, if you like living on the edge, sure, do 2048 bit. Probably out of reach for the foreseeable future, but only probably.

        As to "classified labs", nothing is hiding there. They would have to be much more advanced on too many things.

  • by RUs1729 ( 10049396 ) on Saturday May 24, 2025 @05:54PM (#65402007)
    First, we are still very, very far from having a QC with one million qubits. Second, we can keep a few hundred qubits in superposition and entangled for (much) less than one second.
    • We may be a bit closer... Microsoft [microsoft.com] has stuff going in this arena. Will it actually pan out? Who knows. All the while China is waiting in the wings with what they make.

      Once someone is able to factor ECC algorithms and has the ability to put bogus transactions on blockchains, say buh-bye to cryptocurrencies as we know it.

      • Once someone is able to factor ECC algorithms and has the ability to put bogus transactions on blockchains, say buh-bye to cryptocurrencies as we know it.

        I wish. Sadly, cryptocurrencies aren't so vulnerable. It's a simple matter to replace ECDSA with ML-DSA for wallet keys. Yes, it'll require updating a bit of infrastructure so that everyone looking at transactions on the blockchain understands the new signatures, and everyone will have to generate new wallet keys and enter transactions to transfer their coins from their old key to new, but there are no fundamental problems to solve, just work to do.

        Also, you don't "factor" to break ECC.

    • by tlhIngan ( 30335 )

      It's also a problem of scaling - adding extra qubits reduces coherence time and increases the likelihood of errors.

      A million qubits might simply be impossible for quite a long time. And that's RSA-2048. That's been deemed within reach for a couple of decades now and to move to RSA-4096.

  • ...even 5 years from breaking RSA 2048 with anything quantum. Once there, the way to surpass RSA 4096 is yet longer. If you want to stick with RSA instead of something modern like Ed25519, then move to 4096 bit keys today and you can stop thinking about this at least another decade.

"The way of the world is to praise dead saints and prosecute live ones." -- Nathaniel Howe

Working...