JVG算法可能使用少于5000个量子比特破解RSA-2048加密。
The JVG algorithm could break RSA-2048 encryption with fewer than 5k qubits

原始链接: https://briefglance.com/articles/new-quantum-algorithm-warns-of-an-accelerated-crypto-apocalypse

## 量子加密威胁加速:摘要 先进量子技术研究院(AQTI)的研究人员宣布了一种名为JVG的新算法,显著加快了量子计算机破解当前加密标准(RSA和ECC)的可能性——这是互联网安全的基础。与以往依赖于目前尚不可用的巨型量子计算机的方法不同,JVG采用混合方法,将任务卸载到经典计算机上,并大大降低了所需的量子计算能力。 JVG算法表明,RSA-2048加密可能在不到5000个量子比特的情况下,大约11小时内被破解,这与之前需要数百万个量子比特的估计形成了鲜明对比。这加速了潜在的“量子日”(Q-Day)的时间表——即量子计算机构成真正威胁的时间,可能比目前基于2030年代初的预测提前数年。 这一突破加剧了“现在收集,稍后解密”攻击的风险,即数据今天被窃取,并在未来的量子能力下解锁。虽然该研究目前是待同行评审的预印本,但它引起了各行各业的立即关注,从金融和电信到谷歌、IBM和微软等科技巨头,他们已经在致力于后量子密码学(PQC)解决方案。AQTI强调需要紧急的基础设施升级和向加密敏捷系统转变,以应对这一不断演变的威胁。

最近的一篇预印本声称,一种新的算法(JVG)可以使用少于5000个量子比特破解RSA-2048加密。然而,这一说法受到了Hacker News社区的广泛怀疑。 许多评论指出该论文存在根本性的缺陷,包括对量子态向量与经典向量的理解错误,以及用其经典对应物对量子模指数运算的质疑性替换。一位用户强调该算法依赖于一个定义不清的“QNTT”,并且缺乏对关键步骤的解释。 进一步的调查显示,该论文来自一所新成立的“大学”,作者正在推广后量子密码学解决方案。专家认为,这一预测不太可能实现,即使实现,能够运行该算法的实用量子计算机也还需要数年时间。尽管如此,这场讨论强调了迁移到后量子密码学以防御“现在收集,稍后解密”攻击的紧迫性。一些评论员还将此与人工智能在近期突破之前,早期且渐进的进展相提并论。
相关文章

原文

AUSTIN, TX – March 02, 2026 – The digital locks securing global finance, government secrets, and the daily transactions of billions of people may be far more brittle than previously understood. Researchers at the Advanced Quantum Technologies Institute (AQTI) today announced a breakthrough algorithm that dramatically accelerates the timeline for a quantum computer to shatter the world’s most trusted encryption standards.

The announcement centers on the Jesse-Victor-Gharabaghi (JVG) algorithm, a novel method that re-engineers how a quantum computer can defeat RSA and ECC encryption—the cryptographic bedrock of the internet. For decades, these systems have been protected by a simple fact: the mathematical problems they are based on are too hard for even the most powerful conventional supercomputers to solve. The JVG algorithm, however, suggests a hybrid quantum approach could make this task feasible years, if not a decade, ahead of most official projections, creating an urgent, worldwide security challenge.

A New Blueprint for Code-Breaking

For years, the theoretical specter of quantum code-breaking has been personified by Shor's algorithm. While brilliant on paper, Shor's demands a large, fault-tolerant quantum computer with millions of stable quantum bits, or 'qubits'—a machine that most experts believe is still many years away. The JVG algorithm fundamentally changes this calculation.

Described by its creators as a hybrid strategy, the JVG method cleverly offloads much of the computational heavy lifting to classical supercomputers, leaving a smaller, more focused, and more manageable problem for the quantum device. The innovation lies in replacing a key component of Shor's algorithm with a more efficient process, reducing the number of qubits and quantum operations required by orders of magnitude.

According to the research manuscript, published on the preprint server Preprints.org, the new approach could allow a quantum computer to break the widely used RSA-2048 encryption standard with fewer than 5,000 qubits. This is a staggering reduction from the millions of qubits estimated for Shor's algorithm. The paper projects that with such a machine, factoring RSA-2048 could take as little as 11 hours. This transforms the threat from a distant, abstract possibility into a concrete engineering milestone that is much closer on the horizon.

The Race Against Time Heats Up

The AQTI announcement lands in the middle of a global, high-stakes effort to transition to Post-Quantum Cryptography (PQC)—a new generation of encryption designed to resist attacks from both classical and quantum computers. For years, government bodies have been sounding a quieter alarm, preparing for an eventual 'Q-Day' when quantum computers mature.

The U.S. National Institute of Standards and Technology (NIST), after a multi-year global competition, began finalizing the first PQC standards in August 2024. Government agencies like the Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) have already issued directives, urging federal agencies and critical infrastructure operators to inventory their vulnerable systems and prepare for the complex and costly migration.

The problem, as highlighted by the JVG algorithm, is that these transition timelines are based on older threat models. Most roadmaps, for both government and private industry, work toward a deadline in the early 2030s. If AQTI's research holds, that may not be enough time. The new algorithm underscores a critical vulnerability: the 'harvest now, decrypt later' attack, where adversaries can steal and store encrypted data today, confident they will be able to unlock it with a future quantum computer. This makes long-term secrets in national security, law enforcement, and corporate intellectual property immediately vulnerable.

From Boardrooms to Browsers: Industry on High Alert

Major technology firms, which form the backbone of the digital economy, have been preparing their own defenses. Google has already begun rolling out PQC protection for traffic in its Chrome browser. IBM, a leader in quantum hardware development, has an extensive 'Quantum Safe' roadmap to guide clients through the transition, targeting a fault-tolerant machine by 2029. Microsoft is similarly working to integrate PQC across its entire product ecosystem, from Windows to its Azure cloud platform, aiming for a full transition by 2033.

However, the challenge extends far beyond big tech. The financial sector relies on RSA encryption for everything from ATM transactions to digital signatures. Telecommunications and satellite networks use equipment with long upgrade cycles, making a rapid cryptographic switch-out immensely difficult. The JVG announcement serves as a stark warning that gradual, decade-long transition plans may need to be radically compressed.

A Call to Arms, With a Caveat

AQTI frames its announcement not as an act of alarmism, but as a public service. "We are publishing this work to help the world prepare, not to help criminals," stated Prof. Jesse Van Griensven, one of the algorithm's namesakes. "The lesson from JVG is that the timeline is accelerating not only because hardware advances, but also because algorithms improve. That is why post-quantum upgrades must be treated as urgent infrastructure work."

It is crucial to note, however, that the paper detailing the JVG algorithm is a preprint, meaning it has been shared publicly for rapid dissemination but has not yet completed the rigorous, independent peer-review process that is the gold standard of scientific validation. While the mathematical concepts are now available for scrutiny by other experts in the field, the extraordinary claims of efficiency have yet to be confirmed by outside research groups. The scientific community will now begin the vital work of dissecting, testing, and attempting to replicate the results.

Regardless of whether the JVG algorithm performs exactly as its authors claim, its publication has irrevocably shifted the conversation. It demonstrates that algorithmic breakthroughs can be just as disruptive as hardware milestones. For organizations across the globe, the message is clear: the time for quantum-readiness assessments and pilot programs is over. The urgent work of identifying vulnerabilities, demanding quantum-resistant solutions from vendors, and building crypto-agile systems that can be upgraded quickly is now the most critical cybersecurity task of our time.

联系我们 contact @ memedata.com