Quantum Computing Could Put U.S. Secrets At Grave Risk

(JustPatriots.com)- According to national security experts, China claims to be the third nation to have successfully constructed a quantum computer.  A technological advancement that, with China’s recent claim to have cracked the code protecting key digital firms, could put America’s most closely guarded secrets at risk.

The Global Times, China’s state-run media, said China had joined the United States and Canada in quantum computing. The Chinese company Origin Quantum stated that it sent its computer, the Wuyuan, to an unknown customer the previous year.

According to security experts, China may have discovered a technique to crack the most used kind of internet encryption using the current generation of quantum computers years before the technology was anticipated to pose a danger.

According to the claims of 24 researchers from various academic institutions and state laboratories, the method outlined in a scientific paper published in late December could be used to break the RSA algorithm.

The RSA algorithm underpins most online encryption using a quantum machine with only 372 quantum bits, a basic unit of quantum computing.

IBM had announced that their 433 quantum Osprey system, the most powerful quantum computer to be revealed publicly, would be made available to clients in the first quarter of this year.

IBM explains that Quantum Computing uses the principles of quantum physics to address issues too complicated for conventional computers.

A technology scientists had only just begun to envisage thirty years ago is now accessible to hundreds of thousands of developers.

According to computer experts, China is allegedly already taking data and waiting to decode it. It could be too late to keep those secrets they have already taken.

Those in charge of national security who must keep information under wraps for a very long period must create quantum-proof algorithms. The US government has been working on that.

We will also need a complete re-evaluation of how we keep data. According to some analysts, slicing files into tiny fragments might prevent an adversary from compiling its data.