A team in China just showed that the math behind RSA encryption is starting to bend to the will of the quantum realm.
Using a quantum annealing processor built by D‑Wave Systems, the researchers say they factored a 22‑bit RSA integer that had resisted earlier attempts on the same class of hardware. Wang Chao and colleagues at Shanghai University carried out the experiment. //
When RSA encryption debuted in 1977 it was lauded for tying security to the difficulty of splitting a large semiprime into its two prime factors .
Classic computers still need sub‑exponential time to break today’s 2048‑bit keys, and the largest key so far cracked with conventional methods is only 829 bits (RSA‑250) after weeks on a supercomputer.
“Using the D‑Wave Advantage, we successfully factored a 22‑bit RSA integer, demonstrating the potential for quantum machines to tackle cryptographic problems,” the authors wrote. //
Universal, gate‑based quantum machines run Shor’s algorithm, which in principle can shred RSA by finding the period of modular exponentiation in polynomial time.
Those devices still struggle with error correction, while D‑Wave’s annealers, though not universal, already pack more than 5000 qubits and avoid deep circuits by using a chilling 15 mK environment and analog evolution. //
A White House event framing the publication urged U.S. agencies to begin swapping vulnerable keys because adversaries may already be hoarding encrypted data for “hack now, decrypt later” attacks.
“Businesses must treat cryptographic renewal like a multi‑year infrastructure project,” the Wall Street Journal’s CIO briefing noted when the final standards neared release last year. Corporate technology leaders echoed that sense of urgency. //
Large‑key RSA is still safe today, yet the study shows that hardware improvements and smarter embeddings keep shaving away at the gap.