NSA eyeing encryption-breaking 'quantum' machine: leaked report
January 4, 2014, 12:00 am TWN
WASHINGTON--The U.S. National Security Agency is making strides toward building a "quantum computer" that could break nearly any kind of encryption, The Washington Post reported Thursday.
The Post said leaked documents from fugitive ex-NSA contractor Edward Snowden indicate the computer would allow the secret intelligence agency to break encryption used to protect banking, medical, business and government records around the world.
Quantum computing has been a goal among commercial firms such as IBM because it could harness the power of atoms and molecules, vastly increasing speed and security of computers and other devices.
But experts cited by the newspaper said it was unlikely that the NSA would be close to creating such a machine without the scientific community being aware of it.
"It seems improbable that the NSA could be that far ahead of the open world without anybody knowing it," Scott Aaronson of the Massachusetts Institute of Technology told the daily.
The NSA declined to comment on the report.
The Post said the leaked documents indicate that the agency carries out research in large, shielded rooms known as Faraday cages designed to prevent electromagnetic energy from entering or exiting.
Because of its vast computing power, a working quantum computer would break the strongest encryption tools in use today for online activities, including banking and emails.
Some technology firms such as Google and Yahoo have said in recent weeks that they were stepping up efforts to encrypt their communications following reports that the NSA had been able to break or circumvent many of the current encryption standards.
A September report by The New York Times, ProPublica and The Guardian, also based on leaked documents, said U.S. and British spy agencies are able to decipher data even with the supposedly secure encryption to make it private.
The documents indicated that the NSA, working with its British counterpart GCHQ, accomplished the feat by using supercomputers, court orders and some cooperation from technology companies.
MOST POPULAR OF THIS SECTION