Imagine waking up one morning to find out the math behind the encryption protecting your bank account is slowly beginning to break. That’s exactly the kind of shift a recent breakthrough in China is hinting at — and while we’re not in immediate danger, it’s a wake-up call the world can't ignore.
A team of researchers from Shanghai University used a quantum annealing computer by D-Wave Systems to crack a 22-bit RSA key — a small feat in terms of practical encryption but a huge leap in terms of quantum capabilities.
They avoided the traditional Shor’s algorithm and instead reframed the problem as a combinatorial optimization task, ideal for D-Wave’s quantum annealers.
While a 22-bit key is not used in practice, this successful demonstration shows significant progress in real-world quantum cryptanalysis. It scaled beyond past limits and demonstrated strategies that could extend to larger key sizes.
text
CopyEdit
1977 ─────► RSA encryption is introduced.
1994 ─────► Shor’s algorithm (theoretical RSA breaker) is proposed.
2019 ─────► Google achieves "quantum supremacy" in a limited task.
2022 ─────► NIST announces 4 finalists for post-quantum cryptographic standards.
2023 ─────► IBM & others build 400–1000+ qubit gate-based quantum processors.
2024 ─────► China factors a 22-bit RSA key using D-Wave quantum annealer.
2024 ─────► NIST releases FIPS 203–205: Official PQC standards.
2025 ─────► HQC selected as additional PQC candidate by NIST.
20XX ─────► Full-scale quantum computers pose real threat to 2048-bit RSA.
⚠️ We're here 👆 — and we’re already past the planning phase.
RSA, ECC, and other traditional algorithms protect nearly everything online. Quantum computers, once powerful enough, could break these systems in minutes.
Governments and standards organizations are already preparing. The U.S. National Institute of Standards and Technology (NIST) is leading the global shift to post-quantum cryptography (PQC), using lattice-based algorithms like CRYSTALS-Kyber.
Whether you’re a developer, architect, or IT leader, now is the time to:
✅ Audit where your systems use RSA, ECC, SHA, or other vulnerable algorithms