{"id":23101,"date":"2016-03-04T02:17:16","date_gmt":"2016-03-04T10:17:16","guid":{"rendered":"http:\/\/lifeboat.com\/blog\/2016\/03\/quantum-computer-comes-closer-to-cracking-rsa-encryption"},"modified":"2017-06-04T20:07:51","modified_gmt":"2017-06-05T03:07:51","slug":"quantum-computer-comes-closer-to-cracking-rsa-encryption","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2016\/03\/quantum-computer-comes-closer-to-cracking-rsa-encryption","title":{"rendered":"Quantum Computer Comes Closer to Cracking RSA Encryption"},"content":{"rendered":"<p><a class=\"blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/quantum-computer-comes-closer-to-cracking-rsa-encryption.jpg\"><\/a><\/p>\n<p>Glad to see this article get published because it echoes many of the concerns established around China and Russia governments and their hackers having their infrastructures on Quantum before US, Europe, and Canada. Computer scientists at MIT and the University of Innsbruck say they\u2019ve assembled the first five quantum bits (qubits) of a quantum computer that could someday factor any number, and thereby crack the security of traditional encryption schemes.<\/p>\n<hr>\n<p>Shor\u2019s algorithm performed in a system less than half the size experts expected.<\/p>\n<p><!-- Link: <a href=\"http:\/\/spectrum.ieee.org\/tech-talk\/computing\/hardware\/encryptionbusting-quantum-computer-practices-factoring-in-scalable-fiveatom-experiment\">http:\/\/spectrum.ieee.org\/tech-talk\/computing\/hardware\/encryp...experiment<\/a> --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Glad to see this article get published because it echoes many of the concerns established around China and Russia governments and their hackers having their infrastructures on Quantum before US, Europe, and Canada. Computer scientists at MIT and the University of Innsbruck say they\u2019ve assembled the first five quantum bits (qubits) of a quantum computer [\u2026]<\/p>\n","protected":false},"author":395,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1523,1625,41,1617,1492],"tags":[],"class_list":["post-23101","post","type-post","status-publish","format-standard","hentry","category-computing","category-encryption","category-information-science","category-quantum-physics","category-security"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/23101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/395"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=23101"}],"version-history":[{"count":2,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/23101\/revisions"}],"predecessor-version":[{"id":68149,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/23101\/revisions\/68149"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=23101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=23101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=23101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}