Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Thought I'd compile this here so others can take advantage of it.

Thought I'd compile this here so others can take advantage of it.

Scheduled Pinned Locked Moved Uncategorized
5 Posts 4 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • mttaggart@infosec.exchangeM This user is from outside of this forum
    mttaggart@infosec.exchangeM This user is from outside of this forum
    mttaggart@infosec.exchange
    wrote last edited by mttaggart@infosec.exchange
    #1

    As of 2026-03-02, the state of the art in quantum decryption has cracked a:

    • 22-bit RSA key
    • 6-bit elliptic curve key

    https://forklog.com/en/quantum-computer-cracks-tiny-cryptographic-key

    The IBM QC that cracked the 6-bit key uses 133 qubits.

    Some new research suggests that RSA-2048 could be cracked with as "few" as 100,000 qubits.

    https://www.newscientist.com/article/2516404-breaking-encryption-with-a-quantum-computer-just-got-10-times-easier/

    (Paywall-free)

    Such a machine...is not feasible to build any time soon.

    So when your CISO or a vendor starts going off about "post-quantum" security, feel free to use this to remind them that we still have SMB1 in some places and Telnet in others. Plenty of work to do around the house.

    ghostonthehalfshell@masto.aiG jaythvv@infosec.exchangeJ sten@chaos.socialS 3 Replies Last reply
    1
    0
    • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

      As of 2026-03-02, the state of the art in quantum decryption has cracked a:

      • 22-bit RSA key
      • 6-bit elliptic curve key

      https://forklog.com/en/quantum-computer-cracks-tiny-cryptographic-key

      The IBM QC that cracked the 6-bit key uses 133 qubits.

      Some new research suggests that RSA-2048 could be cracked with as "few" as 100,000 qubits.

      https://www.newscientist.com/article/2516404-breaking-encryption-with-a-quantum-computer-just-got-10-times-easier/

      (Paywall-free)

      Such a machine...is not feasible to build any time soon.

      So when your CISO or a vendor starts going off about "post-quantum" security, feel free to use this to remind them that we still have SMB1 in some places and Telnet in others. Plenty of work to do around the house.

      ghostonthehalfshell@masto.aiG This user is from outside of this forum
      ghostonthehalfshell@masto.aiG This user is from outside of this forum
      ghostonthehalfshell@masto.ai
      wrote last edited by
      #2

      @mttaggart

      22 bit RSA I think most people’s phones could fart and crack that too

      1 Reply Last reply
      0
      • R relay@relay.an.exchange shared this topic
      • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

        As of 2026-03-02, the state of the art in quantum decryption has cracked a:

        • 22-bit RSA key
        • 6-bit elliptic curve key

        https://forklog.com/en/quantum-computer-cracks-tiny-cryptographic-key

        The IBM QC that cracked the 6-bit key uses 133 qubits.

        Some new research suggests that RSA-2048 could be cracked with as "few" as 100,000 qubits.

        https://www.newscientist.com/article/2516404-breaking-encryption-with-a-quantum-computer-just-got-10-times-easier/

        (Paywall-free)

        Such a machine...is not feasible to build any time soon.

        So when your CISO or a vendor starts going off about "post-quantum" security, feel free to use this to remind them that we still have SMB1 in some places and Telnet in others. Plenty of work to do around the house.

        jaythvv@infosec.exchangeJ This user is from outside of this forum
        jaythvv@infosec.exchangeJ This user is from outside of this forum
        jaythvv@infosec.exchange
        wrote last edited by
        #3

        @mttaggart it's crazy that this is the controversial, minority opinion in cybersec....

        1 Reply Last reply
        0
        • mttaggart@infosec.exchangeM mttaggart@infosec.exchange

          As of 2026-03-02, the state of the art in quantum decryption has cracked a:

          • 22-bit RSA key
          • 6-bit elliptic curve key

          https://forklog.com/en/quantum-computer-cracks-tiny-cryptographic-key

          The IBM QC that cracked the 6-bit key uses 133 qubits.

          Some new research suggests that RSA-2048 could be cracked with as "few" as 100,000 qubits.

          https://www.newscientist.com/article/2516404-breaking-encryption-with-a-quantum-computer-just-got-10-times-easier/

          (Paywall-free)

          Such a machine...is not feasible to build any time soon.

          So when your CISO or a vendor starts going off about "post-quantum" security, feel free to use this to remind them that we still have SMB1 in some places and Telnet in others. Plenty of work to do around the house.

          sten@chaos.socialS This user is from outside of this forum
          sten@chaos.socialS This user is from outside of this forum
          sten@chaos.social
          wrote last edited by
          #4

          @mttaggart Note also the "expensive pre- and postprocessing" for the RSA "break". So far, each and every quantum factorisation has used massive trickery, which ensures that these "results" won't generalise. I haven't yet had a look at this one, but given that quantum annealing has had no demonstrable benefit over conventional computers, I think the chances are high.

          1 Reply Last reply
          0
          • mttaggart@infosec.exchangeM This user is from outside of this forum
            mttaggart@infosec.exchangeM This user is from outside of this forum
            mttaggart@infosec.exchange
            wrote last edited by
            #5

            @hweimer These weren't strictly Shor's, but I take your point.

            1 Reply Last reply
            0
            Reply
            • Reply as topic
            Log in to reply
            • Oldest to Newest
            • Newest to Oldest
            • Most Votes


            • Login

            • Login or register to search.
            • First post
              Last post
            0
            • Categories
            • Recent
            • Tags
            • Popular
            • World
            • Users
            • Groups