Quantum computers pose a fundamental threat to widely deployed public-key cryptosystems, such as RSA and ECC, by enabling efficient integer factorization using Shor's algorithm. Theoretical resource estimates suggest that 2048-bit RSA keys could be broken using Shor's algorithm with fewer than a million noisy qubits. Although such machines do not yet exist, the availability of smaller, cloud-accessible quantum processors and open-source implementations of Shor's algorithm raises the question of what key sizes can realistically be factored with today's platforms. In this work, we experimentally investigate Shor's algorithm on several cloud-based quantum computers using publicly available implementations. Our results reveal a substantial gap between the capabilities of current quantum hardware and the requirements for factoring cryptographically relevant integers. In particular, we observe that circuit constructions still need to be highly specific for each modulus, and that machine fidelities are unstable, with high and fluctuating error rates.
翻译:量子计算机通过利用Shor算法实现高效整数分解,对广泛部署的RSA和ECC等公钥密码体系构成根本性威胁。理论资源估算表明,使用少于一百万个含噪声量子比特的Shor算法即可破解2048位RSA密钥。虽然此类机器尚未问世,但当前可云端访问的小型量子处理器及Shor算法的开源实现,引发了关于现有平台实际可分解密钥规模的疑问。本研究通过实验在多个云端量子计算机上使用公开可用的实现方案测试Shor算法。结果表明,当前量子硬件能力与分解密码学相关整数所需条件之间存在显著差距。特别值得注意的是,我们发现电路构造仍需针对每个模数进行高度定制化设计,且机器保真度不稳定,错误率呈现高位波动特征。