[Cryptography] Claims of factoring 2048-bit RSA

Viktor Dukhovni cryptography at dukhovni.org
Fri Nov 3 15:53:01 EDT 2023


On Fri, Nov 03, 2023 at 09:34:35AM -0700, Amarendra Godbole wrote:

> https://www.bankinfosecurity.com/blogs/researcher-claims-to-crack-rsa-2048-quantum-computer-p-3536
> 
> Of course quantum computer. I am not qualified enough to comment on
> this article and its claims, though this group has many people who
> are.

The referenced abstract isn't a "claim", all I see is blatant burble,
bursting with buzzwords.

    We factored numbers with more than 101000 decimal digits, and the
    capital cost was less than $1,000.  The quantum computing (QC)
    version used here hasp simultaneous multiple-states logic (following
    'all states at once'), with more than a googol of possible states.
    We show that the equivalence of QC techniques (with IBM, Google and
    others compared with our version of QC) has been hidden for about
    2,500 years – since Pythagoras. All our computations were done in a
    commercial cellphone, or a commercial Linux desktop, as our QC
    devices -- opening the user market to many industries. No cryogenics
    or special materials were used. A post-quantum, HIPAA compliant,
    end-to-end, patent-free, export-free, secure online solution, is
    being created, based on ZSentry as used from 2004 to 2014, to
    replace RSA. One needs a quantum-resistant algorithm, because all
    existing public-key encryption can be broken. We further present 8
    empirical conjectures, all supported by experiments, that should be
    helpful in the further development of QC, and applications to other
    areas.  Applications to healthcare and cosmology are suggested.

One would think they'd have used an LLM of their choice to help draft
more coherent BS, but clearly couldn't be bothered.

-- 
    Viktor.


More information about the cryptography mailing list