[Cryptography] Claims of factoring 2048-bit RSA

Ray Dillinger bear at sonic.net
Tue Nov 7 13:09:48 EST 2023


On 11/3/23 09:34, Amarendra Godbole wrote:
> https://www.bankinfosecurity.com/blogs/researcher-claims-to-crack-rsa-2048-quantum-computer-p-3536

This man claims to be achieving quantum speedups in calculations on 
non-quantum hardware.  That claim is intrinsically bullshit. There is no 
reason to read further.

Researchers often use non-quantum hardware to run software simulations 
of quantum calculations.  But those simulations do not actually benefit 
from any quantum speedup; they do painfully slow serial modeling of 
eigenvector calculations that would be single-step hardware ops on 
actual quantum hardware, and then tell you how many operations it would 
have taken if it had been done on actual quantum hardware.  Which, 
because this is only a simulation, is not in fact how it was done.

TLDR, factoring a number without using quantum hardware will go no 
faster (in fact quite a bit slower) than it goes using conventional 
factoring algorithms.  Phones cannot do a 2048-bit factorization before 
the sun explodes, therefore no 'quantum' algorithm modeled on a phone 
can do a 2048-bit factorization before the sun explodes.

If he did not use the obvious-bullshit "quantum" to describe his claim, 
and instead had a new and much better serial factoring algorithm that 
*COULD* crack a 2048-bit factorization on a phone? There are well-known 
published factorization targets he could have broken in order to 
conclusively prove that his claim is not bullshit.  The factors to one 
of those targets would have been in the first ten lines of the abstract 
of any non-bullshit paper about such an algorithm, and are conspicuously 
absent here.

We have no reason at this time to believe that such an algorithm 
exists.  Any paper claiming revolutionary factoring capabilities which 
does not include the factors to one of those published targets will be 
assumed to be bullshit. If that assumption is wrong the researcher can 
easily correct their oversight by breaking one of the published targets 
and adding the evidence to the paper.  If the researcher does ANYTHING 
AT ALL ELSE it's an indication that whatever else they're doing is 
easier for them than breaking one of the published targets - which their 
paper claims would be easy for them to do.  That provides evidence that 
the paper's claim is false.

Bear




More information about the cryptography mailing list