@martijn_grooten definitely worth expressing skepticism here especially given what happened with the Schnorr paper
just a side note - maybe this is just me but yes I do see a lot of absolutely justifiable skepticism i also feel that there's been a sort of... inherent avoidance towards work on factoring and related problems? (best way i can put it really)
like it could be that people are afraid of the implications (justifiably so! again not saying it's wrong) of solving problems like factoring that it's easy to just brush aside things as practically unsolvable even when they haven't mathematically proven to be unsolvable in practice.
idk that's just my stance, i've been looking at the academic material on factoring and such but i'm definitely not an expert nor am i a cryptographer, i'm just interested in the field generally.
@martijn_grooten Well, they donât actually claim that they *can* break 2048-bit RSA, they rather say that they *could* break it on future quantum computers. So far they only managed to factorize a 48 bit integer and extrapolate the results.
Also, in my understanding this sentence means that it isnât clear whether cracking an RSA key will happen in a reasonable time:
> It should be pointed out that the quantum speedup of the algorithm is unclear due to the ambiguous convergence of QAOA
Not that I understand the terminology, but presumably there are unknowns related to the characteristics of these future quantum computers.
Even so, these results are quite remarkable of course.
A story emerged perhaps a decade ago that NSA had been able to "crack RSA", but in reading the article, it turned out that they only did it by brute force, so the obvious answer is: use longer keys. I use 4096 bits routinely, and will use 8192 and even 16384 when I can.
The "obvious" solution is to weaponize QC for defense as well as offense; we'll wait for new algorithms.
Long live RSA and Zimmerman.
@martijn_grooten Oh boyâŚ
One of the underlying problems here is that breaking RSA has become a measure of excellence for quantum computers. And that leads to some pretty shoddy and at times outright duplicitous work.
For example, there are ways you can significantly reduce the number of gates needed to implement Shorrâs algorithm. But they kinda depend on using information that you need to know the factors to derive. So yes, here you are doing Shorrâs but you donât have a system that can factor numbers.
This looks to be very much more of the same.