Shor’s Algorithm Breaks 5-bit Elliptic Curve Key on 133-Qubit Quantum Computer

The security of modern digital communication relies on complex mathematical problems that are difficult for conventional computers to solve. Still, a new demonstration showcases the potential of quantum computers to break these safeguards. Tippeconnic from Arizona State University and colleagues successfully break a 5-bit elliptic curve cryptographic key, a fundamental component of many security systems, using a 133-qubit quantum computer. The team achieves this breakthrough by implementing a quantum algorithm that exploits the unique properties of quantum interference to reveal the secret key without directly encoding it within the computation, a significant step towards assessing the real-world threat posed by quantum computers to current encryption methods. This experiment, performed on an IBM quantum processor, demonstrates the ability to solve a cryptographic problem with a relatively small number of qubits and a surprisingly deep circuit, paving the way for further research into quantum-resistant cryptography.

Shor’s Algorithm Breaks 5-Bit Cryptographic Key.

The experiment successfully broke a 5-bit elliptic curve cryptographic key using a quantum attack based on Shor’s algorithm, executed on IBM’s 133-qubit IBM_Torino processor. A key innovation lies in the method’s ability to extract the secret key without directly encoding it into the quantum circuit, enhancing security against certain attacks. The approach focuses on interfering over a specific subgroup of the elliptic curve, allowing researchers to reveal key information through quantum measurement, which manifests as a distinct pattern in the quantum data. The methodology begins by mapping the points of the elliptic curve to integers, simplifying calculations while preserving the necessary mathematical relationships.

Quantum registers then represent parameters of the equation, including the exponent and a point index, initialised in a superposition of states using carefully timed pulses. A specifically constructed quantum oracle performs a reversible transformation, linking these registers through a function related to the secret key, designed to avoid directly referencing the key itself. Following the oracle’s operation, the algorithm isolates a specific register, focusing on the phase relationship between registers rather than absolute values. A Quantum Fourier Transform is then applied, transforming the data into a frequency domain where the interference pattern becomes more apparent, revealing the modular phase relation and ultimately the secret key.

Classical post-processing analyses the measurement results, identifying the most likely key candidates based on the observed interference pattern. The success of the attack is demonstrated by the consistent appearance of the correct key within the top results, even in the presence of quantum noise. The experiment highlights the power of quantum interference to reveal hidden information and the potential for quantum computers to break commonly used cryptographic algorithms. Researchers emphasise that the observed interference pattern is a physically real phenomenon exploitable for cryptographic attacks.

Summary

Researchers successfully demonstrated a quantum attack on elliptic curve cryptography by breaking a 5-bit key using a modified Shor’s algorithm on IBM’s 133-qubit quantum processor. Despite the extreme complexity of the quantum circuit (over 67,000 layers deep), the system maintained sufficient quantum coherence to produce valid interference patterns. Classical post-processing of the quantum results correctly identified the secret key (k=7) within the top 100 candidate solutions.

The experiment validates that Shor’s algorithm remains effective even with very deep quantum circuits, suggesting potential scalability for attacking larger cryptographic keys. The approach used modular arithmetic techniques to encode the problem without directly referencing the secret key, and visualization of the results confirmed the expected quantum interference patterns.

All experimental data, code, and visualizations are publicly available at the project’s GitHub repository and website (www.qubits.work).

👉 More information
🗞 Breaking a 5-Bit Elliptic Curve Key using a 133-Qubit Quantum Computer
🧠 DOI: https://doi.org/10.48550/arXiv.2507.10592

Quantum News

Quantum News

As the Official Quantum Dog (or hound) by role is to dig out the latest nuggets of quantum goodness. There is so much happening right now in the field of technology, whether AI or the march of robots. But Quantum occupies a special space. Quite literally a special space. A Hilbert space infact, haha! Here I try to provide some of the news that might be considered breaking news in the Quantum Computing space.

Latest Posts by Quantum News:

IBM Remembers Lou Gerstner, CEO Who Reshaped Company in the 1990s

IBM Remembers Lou Gerstner, CEO Who Reshaped Company in the 1990s

December 29, 2025
Optical Tweezers Scale to 6,100 Qubits with 99.99% Imaging Survival

Optical Tweezers Scale to 6,100 Qubits with 99.99% Imaging Survival

December 28, 2025
Rosatom & Moscow State University Develop 72-Qubit Quantum Computer Prototype

Rosatom & Moscow State University Develop 72-Qubit Quantum Computer Prototype

December 27, 2025