Source: https://www.linkedin.com/feed/update/urn%3Ali%3Ashare%3A7250940962011582465
Interesting Engineering: China hacks military-grade encryption using quantum computer, poses threat to West: Researchers introduced two technical approaches grounded in the #quantum #annealing #algorithm. https://lnkd.in/eN7V2akH :
Dr. Yogesh Malhotra, AI-ML-Cyber-Quant Finance Post-Doc:
Our Latest R&D on #Quantum #Uncertainty & #Time-#Space #Complexity:
SSRN: https://lnkd.in/ec99Zkd
Our New York State Capitol Address on Next-Gen #Pentagon #AMBS-#JADC2:
https://lnkd.in/eR2fJpW
Our Plenary Keynote to Global Space4Women #Quantum #PhD-#Engineers:
https://lnkd.in/gVqiXXpG
* Our 2013 Presentation on Design of Next Generation Quantum Encryption:
https://lnkd.in/eCKAYpK
** Our 2013 Paper: Why Encryption and Crypto Systems Fail and How to Preempt and Prevent Such Systems Failures: Cryptology beyond Shannon’s Information Theory: Preparing for When ‘Enemy Knows the System’: Number Field Sieve Cryptanalysis Algorithms for Most Efficient Prime Factorization on Composites
https://lnkd.in/eMmiryt
A military-grade encryption #algorithm has reportedly been hacked by Chinese researchers using a *D-Wave quantum computer, claimed as first successful #quantum #attack on widely used #encryption #algorithms. This type of #hacking poses a significant threat to #military and #finance like sectors.
Initially designed for non-cryptographic usage, the #DWave Advantage system used in the process breached the #Substitution-#Permutation #Network-structured (SPN) algorithms.
D-Wave special #quantum #computing has a unique #quantum #tunneling effect that can jump out of the local extremes that traditional intelligent algorithms are prone to fall into. It can be considered a class of #artificialintelligence algorithms with #global #optimization-seeking capability, according to researchers.
Researchers introduced two technical approaches grounded in the quantum annealing algorithm, using pure quantum algorithm and quantum annealing combined with classical algorithm to implement #RSA #public #key #cryptography #attack (#factorizing the large integer #NFpq)**.
One approach is to convert the mathematical method of #cryptographic #attack into a #combinatorial #optimization problem or #exponential #space #search problem, which is solved by Ising model or QUB0 model.
—
New York State: “Join Dr. Yogi Malhotra to get up to speed on Cloud Technology.”
USAF-AFRL Ventures: “Do Something Epic: Save the World™”:
We Create the Digital Future™. You Can Too! Let’s Show You How!
AIMLExchange™: AIMLExchange.com: We Create the Digital Future™
BRINT™: BRINT.com: From Future of Finance™ to Future of Defense™
C4I-Cyber™: C4I-Cyber.com: Because the Future of the World Depends Upon It™
—
AWS Quantum Valley Global Risk Management Network LLC: 30-Years Leading AI-Quantum Finance Practices
Silicon Valley’s Next Big Thing™: Know-Build-Monetize™ Networks: 30-Years Building Meaning-Aware AI
Silicon Valley-Wall Street-Pentagon Leader: 30 Years Building AI-Cyber-Crypto-Quantum Risk Networks
—