Newsletter Subject

Did China Crack U.S. Military-Grade Encryption?

From

brownstoneresearch.com

Email Address

feedback@e.brownstoneresearch.com

Sent On

Tue, Oct 22, 2024 08:08 PM

Email Preheader Text

Did China Crack U.S. Military-Grade Encryption? By Jeff Brown, Editor, The Bleeding Edge -----------

[The Bleeding Edge]( Did China Crack U.S. Military-Grade Encryption? By Jeff Brown, Editor, The Bleeding Edge --------------------------------------------------------------- A couple of weeks ago, there was a buzz in the world of cryptography. Word spread that China had hacked “military-grade encryption,” suggesting that some of the West’s worst fears had come true. The headlines didn’t make sense to me… After all, I’m not aware of any computing system that could possibly achieve such a feat. Cracked? Current encryption technologies used by governments and militaries – as well as the kinds of RSA encryption that we use in our public communications – are too difficult to crack with any classical computing system. Even the world’s most powerful supercomputer, Frontier, can’t achieve such a task. The only system that can theoretically crack this kind of encryption is a quantum computer. None of which is powerful enough to do so… yet. The research behind the claims came out of a team from Shanghai University in China. The research was actually published this May. But as often happens when less well-known scientific journals publish research, it takes a while before there is a broader awareness of the research. As seen in the excerpt above, the research involved quantum-computing technology from publicly traded D-Wave Quantum (QBTS). D-Wave stands out in the quantum computing industry due to its approach to quantum computing – quantum annealing. That is quite different from what the rest of the industry is working on, which is gate-based quantum computing. What was interesting was that the D-Wave stock price jumped by almost 41% in the days that followed the news hitting the Western media. It’s an odd dynamic. The speculation is that if D-Wave computers can crack advanced encryption technology, there would be a spike in sales of D-Wave quantum annealing technology. But there was one problem with that whole story… It wasn’t true. Recommended Link [Bill Gates Did What? “Game-changer”]( [image]( Bill Gates’s new AI project ([click here to see the details]( has been called “a revolutionary supercomputer…” “The most powerful AI system ever created…” And a “Game-changer.” [Click here to see the details]( because I believe it will make a lot of people rich. [Learn More…]( -- A Critical Nuance The researchers behind the published research did succeed in breaking 50-bit RSA encryption… RSA is one of the most widely used encryption standards. It has been around for almost five decades. The RSA standards are used for most public communications like e-mail. They are designed with the complexity of factoring the product of two large prime numbers. This is the problem that no classical computer can solve in any reasonable amount of time. The issue with the research, however, is twofold… Since 2015, the National Institute for Standards and Technology (NIST) recommended that all RSA encryption use 2,048 bits. Before that, since 2002, the industry used 1,024-bit RSA encryption. This contrasts the findings of the researchers at Shanghai University, who claim to have cracked 50-bit RSA encryption. To put that into perspective, the difference between 50-bit and 2,048-bit encryption is 21998 times more difficult to crack. These two challenges aren’t even in the same universe in terms of complexity. The other issue with the claims is around “military-grade” encryption. When this language is used, it typically refers to 256-bit AES encryption (Advanced Encryption Standard). NIST established AES encryption in 2001 with the primary goal of protecting sensitive and top-secret information in government and military agencies, hence “military grade.” And the researchers in Shanghai did not crack AES encryption. AES technology is particularly good at fast encryption and decryption speeds, which is why it is great for applications like streaming services and data storage. RSA technology is typically used for communications like e-mails or even digital signatures because speed is less of an issue. Fortunately, the China-based researchers cracked neither RSA nor AES encryption – the kind that is widely in use today. Bottom line: There’s no need to panic. We have time before that day comes. And I seriously doubt it will happen on a quantum-annealing quantum computer. A Sense of Urgency D-Wave’s quantum computers are powerful and capable. But the advantage of quantum-annealing technology is that it doesn’t have the fidelity challenges that gate-based quantum computers typically have. D-Wave likes to refer to its systems as “practical quantum computing” as a way to differentiate its technology from the rest of the industry. Quantum annealing is best suited for optimization problems. For example, the company announced this summer a deal with Hermes (a European logistics company) to “explore vehicle routing quantum optimization application to route trucks from 50 depots to a network of 17,000 parcel shops throughout Germany.” The goal is to ultimately lower CO2 emissions. This is a great problem for a quantum annealing system to solve. But the end game of quantum-computing technology is a universal fault-tolerant quantum computer. These are all gate-based quantum computers, and they will eventually be capable of cracking both AES and RSA encryption technology. This quantum computing technology was the catalyst for NIST’s almost decade-long project to develop post-quantum encryption standards. We explored this previously in [The Bleeding Edge – The Most Important Encryption Upgrade in 50 Years](. 2024 was a big year for the industry, as NIST finalized three key standards, with a fourth expected before the end of the year: - Federal Information Processing Standard (FIPS) 203 – the primary standard for general encryption - FIPS 204 – the primary standard for digital signatures - FIPS 205 – the secondary standard for digital signatures; acts as a backup method if FIPS 204 is determined to have a weakness - FIPS 206 (forthcoming) – also for digital signatures and identity verification. This initiative at NIST was incredibly important, given the advancements in quantum computing. With encryption technology, we need to establish standards so that an encryption/decryption scheme will work – and tech companies can design their software and hardware to incorporate that technology. We can expect to see some early industry product support for these new post-quantum standards by next year. In fact, cybersecurity company Cloudflare (NET) and Alphabet (GOOGL) are already using some post-quantum computing software, but it is still limited. Changing these encryption standards to the new FIPS standards will take years. It’s an incredibly complex problem to solve because an entire industry needs to adopt the new standards – and then government and corporations need to upgrade all of their software systems, as well. For those who understand how quickly quantum computing is advancing, there is a sense of urgency. Whether it’s the big, well-funded powerhouses like [IBM]( (IBM), [Microsoft]( (MSFT), [Intel]( (INTC), [Honeywell]( (HON), or [Alphabet]( (GOOGL) – or the earlier stage leaders like [D-Wave Quantum]( (QBTS), [Rigetti Computing]( (RGTI), [IonQ]( (IONQ), [Xanadu]( [Quantinuum]( [Zapata Computing]( (ZPTA), or [PsiQuantum]( – progress is being made with quantum computers at an exponential rate. Regards, Jeff [Brownstone Research]( Brownstone Research 1125 N Charles St, Baltimore, MD 21201 [www.brownstoneresearch.com]( To ensure our emails continue reaching your inbox, please [add our email address]( to your address book. This editorial email containing advertisements was sent to {EMAIL} because you subscribed to this service. To stop receiving these emails, click [here](. Brownstone Research welcomes your feedback and questions. But please note: The law prohibits us from giving personalized advice. To contact Customer Service, call toll free Domestic/International: 1-888-512-0726, Mon–Fri, 9am–7pm ET, or email us [here](mailto:memberservices@brownstoneresearch.com). © 2024 Brownstone Research. All rights reserved. Any reproduction, copying, or redistribution of our content, in whole or in part, is prohibited without written permission from Brownstone Research. [Privacy Policy]( | [Terms of Use](

Marketing emails from brownstoneresearch.com

View More
Sent On

08/12/2024

Sent On

07/12/2024

Sent On

06/12/2024

Sent On

06/12/2024

Sent On

05/12/2024

Sent On

05/12/2024

Email Content Statistics

Subscribe Now

Subject Line Length

Data shows that subject lines with 6 to 10 words generated 21 percent higher open rate.

Subscribe Now

Average in this category

Subscribe Now

Number of Words

The more words in the content, the more time the user will need to spend reading. Get straight to the point with catchy short phrases and interesting photos and graphics.

Subscribe Now

Average in this category

Subscribe Now

Number of Images

More images or large images might cause the email to load slower. Aim for a balance of words and images.

Subscribe Now

Average in this category

Subscribe Now

Time to Read

Longer reading time requires more attention and patience from users. Aim for short phrases and catchy keywords.

Subscribe Now

Average in this category

Subscribe Now

Predicted open rate

Subscribe Now

Spam Score

Spam score is determined by a large number of checks performed on the content of the email. For the best delivery results, it is advised to lower your spam score as much as possible.

Subscribe Now

Flesch reading score

Flesch reading score measures how complex a text is. The lower the score, the more difficult the text is to read. The Flesch readability score uses the average length of your sentences (measured by the number of words) and the average number of syllables per word in an equation to calculate the reading ease. Text with a very high Flesch reading ease score (about 100) is straightforward and easy to read, with short sentences and no words of more than two syllables. Usually, a reading ease score of 60-70 is considered acceptable/normal for web copy.

Subscribe Now

Technologies

What powers this email? Every email we receive is parsed to determine the sending ESP and any additional email technologies used.

Subscribe Now

Email Size (not include images)

Font Used

No. Font Name
Subscribe Now

Copyright © 2019–2024 SimilarMail.