{"id":3183,"date":"2025-08-01T17:30:05","date_gmt":"2025-08-01T17:30:05","guid":{"rendered":"https:\/\/scienceblog.com\/horizon\/?p=3183"},"modified":"2025-08-01T17:30:05","modified_gmt":"2025-08-01T17:30:05","slug":"codemakers-race-to-secure-the-internet-as-quantum-threat-looms","status":"publish","type":"post","link":"https:\/\/scienceblog.com\/horizon\/3183\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\/","title":{"rendered":"Codemakers race to secure the internet as quantum threat looms"},"content":{"rendered":"<p>With quantum computing on the horizon, cryptographers are working to secure digital communications against a new generation of potential threats.<\/p>\n<p><em>By<\/em> Anthony King<\/p>\n<p>How do you outsmart a computer that could soon eclipse anything we have ever built? That is the challenge facing researchers who are working to build up our defences against the coming age of quantum computing.<\/p>\n<p>Quantum computers promise a giant leap in computational power, but they will also bring risks. Their code-breaking capabilities could enable governments or criminals to intercept online communications and steal sensitive data.\u00a0The threat is not a distant one.<\/p>\n<p>According to Professor Marcos Curty, a\u00a0leading expert in quantum communication and cryptography, there is a reasonable probability that the first such computers could be switched on within the next 10 to 15 years. \u00a0We need to start preparing now.<\/p>\n<p>\u201cWe want to be sure that messages can continue to be sent securely without someone being able to access that information, either now or in the near future,\u201d he said.<\/p>\n<p><strong>Training for tomorrow<\/strong><\/p>\n<p>Curty is a communications engineering professor at\u00a0the University of Vigo in Spain and the scientific director of the Vigo Quantum Communication Center (VQCC) based there.<\/p>\n<p>Part-funded by the EU, the VQCC officially started in January 2022. It is a key node in the European Quantum Communications Infrastructure \u2013 the EU\u2019s flagship effort to build a\u00a0secure quantum communication infrastructure across Europe.<\/p>\n<p>The aim is to make Vigo an international hub for quantum-safe communications. In line with this ambition, Curty is coordinating an EU-funded training network called\u00a0Quantum\u2011Safe Internet (QSI) to develop quantum-resistant cryptography and quantum key distribution technologies.<\/p>\n<p>Bringing together researchers from five EU countries, as well as from Canada, Japan, Switzerland, the UK and the US, the network intends to train young cryptographers for the challenges of a quantum computing world.<\/p>\n<p><strong>The clock is ticking<\/strong><\/p>\n<p>Quantum computers may still be a few years off, but the risks are already present.<\/p>\n<p>\u201cOne of our biggest concerns with cryptography is the \u2018store now, decrypt later\u2019 concept,\u201d said Silvia Ritsch, a PhD candidate at Eindhoven University of Technology in the Netherlands. \u201cSomeone could store your encrypted communications today and wait until they have the tools to access them in the future.\u201d<\/p>\n<p>The idea is simple, yet serious. Third parties can intercept and store encrypted data now, and wait until more powerful decryption tools, such as\u00a0quantum computers, are available in the future. Once they have those tools, they can go back and\u00a0decrypt the stored data, which may still be sensitive or valuable.<\/p>\n<p>That is where cryptographers come in. They study, design and test new methods for protecting data. Their role will take on added importance in the context of quantum computing.<\/p>\n<p>According to Curty, upgrading the digital infrastructure that protects communications could take five to seven years, making early preparation and improvements in cryptography essential.<\/p>\n<p><strong>Evolving tools for evolving technology<\/strong><\/p>\n<p>Codes are not new.\u00a0Julius Caesar used a simple alphabet-based cipher to conceal military information. Over time, these simple systems have evolved into the complex cryptographic methods we rely on today, protecting everything from online payments to personal health records.<\/p>\n<p>\u201cProtecting company secrets from foreign digital spying will become even more relevant in future,\u201d said Curty.\u00a0\u201cAnd concerns about personal privacy have become more prominent, especially following recent whistleblower revelations about mass surveillance.\u201d<\/p>\n<p>Today\u2019s encryption systems rely on mathematical puzzles that are easy to solve with a private key, but extremely difficult without one. These puzzles form the backbone of secure online communication. But as quantum computing capabilities develop, they may become easier to crack.<\/p>\n<p>There are two possible solutions: quantum cryptography, based on quantum mechanics, and post-quantum cryptography, relying on advanced mathematical algorithms.<\/p>\n<p><strong>The quantum puzzle<\/strong><\/p>\n<p>Another member of the QSI team is Alex Grilo, an experienced cryptography researcher with the French National Centre for Scientific Research based at the Sorbonne University in Paris, France. He specialises in constructing quantum public-key encryption and secret-sharing protocols, and warns of the potential dangers.<\/p>\n<p>\u201cIf a malicious party breaks our current cryptography using a quantum computer, all our private information is suddenly vulnerable,\u201d\u00a0he said.<\/p>\n<p>That\u2019s the bad news.\u00a0The good side to quantum is that it can also offer solutions to this problem.<\/p>\n<p>Quantum cryptography uses the principles of quantum mechanics to enable secure communication. One advantage of quantum systems is that information cannot be measured or copied without changing it, meaning eavesdropping attempts are detectable.<\/p>\n<p>\u201cAny attempt by an eavesdropper to access information encoded in a quantum state will inevitably disturb the state,\u201d said Curty.<\/p>\n<p>The method uses a string of light pulses which act like an advanced Morse code that cannot be intercepted without being disrupted.<\/p>\n<p>\u201cIf you try to copy a quantum particle, you will disturb the particle,\u201d explained Alessandro Marcomini, a PhD student at the University of Vigo. His research focuses on using quantum systems to securely share cryptographic keys, rather than the message itself.<\/p>\n<p>Post-quantum cryptography, on the other hand, does not rely on quantum physics, but instead develops new mathematical algorithms designed to be difficult for quantum computers to solve. This is the area where Ritsch has focused her doctoral research.<\/p>\n<p>\u201cQuantum computers work very differently from classical computers, so it requires that we really think differently about the problems,\u201d she said. This involves designing non-linear problems and paradigm shifts that puzzle quantum computers.<\/p>\n<p><strong>Building a global defence<\/strong><\/p>\n<p>Clearly, this is an issue of global concern, and international exchange and collaboration are central to the work of the QSI team, not just within Europe, but also beyond.<\/p>\n<p>Ritsch recently visited the University of Amsterdam to deepen her cryptography expertise. In 2024, Marcomini spent three months at the University of Toyama in Japan, where he worked alongside Japanese experts in quantum communication. A further exchange is planned in 2025.<\/p>\n<p>Both Marcomini and Grilo will team up with Japanese partners to present their work at Expo 2025 in Osaka, Japan. Through talks in Japanese and English, interactive demonstrations and games for children, they aim to raise awareness about quantum threats and showcase the creative minds working to counter them.<\/p>\n<p>Quantum computers may still be a decade away from widespread use, but the race to secure the internet has already begun.<\/p>\n<p><em>Research in this article was funded by the Marie Sk\u0142odowska-Curie Actions (MSCA). The views of the interviewees don\u2019t necessarily reflect those of the European Commission. <\/em><\/p>\n<p><em>\u200bThis article was originally published\u202fin\u00a0<a href=\"https:\/\/projects.research-and-innovation.ec.europa.eu\/en\/horizon-magazine\">Horizon<\/a>\u00a0the EU Research and Innovation Magazine.<\/em><\/p>\n<p>More info<\/p>\n<ul>\n<li><a href=\"https:\/\/cordis.europa.eu\/project\/id\/101072637\">QSI<\/a><\/li>\n<li><a href=\"https:\/\/quantum-safeinternet.com\/\">QSI project website<\/a><\/li>\n<li><a href=\"https:\/\/commission.europa.eu\/strategy-and-policy\/priorities-2019-2024\/europe-fit-digital-age_en\">EU Digital Strategy<\/a><\/li>\n<li><a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/cybersecurity-strategy\">EU Cybersecurity strategy<\/a><\/li>\n<li><a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/european-quantum-communication-infrastructure-euroqci\">The European Quantum Communication Infrastructure (EuroQCI)<\/a><\/li>\n<li><a href=\"https:\/\/eu-at-world-expos.europa.eu\/index_en\">EU at Expo 2025<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>With quantum computing on the horizon, cryptographers are working to secure digital communications against a new generation of potential threats. By Anthony King How do you outsmart a computer that could soon eclipse anything we have ever built? That is the challenge facing researchers who are working to build up our defences against the coming &#8230; <a title=\"Codemakers race to secure the internet as quantum threat looms\" class=\"read-more\" href=\"https:\/\/scienceblog.com\/horizon\/3183\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\/\" aria-label=\"Read more about Codemakers race to secure the internet as quantum threat looms\">Read more<\/a><\/p>\n","protected":false},"author":298,"featured_media":3185,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"generate_page_header":"","_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_post_was_ever_published":false},"categories":[462,112],"tags":[],"class_list":["post-3183","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-frontier-research","category-ict"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Codemakers race to secure the internet as quantum threat looms - Horizon Magazine Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/scienceblog.com\/horizon\/3183\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Codemakers race to secure the internet as quantum threat looms\" \/>\n<meta property=\"og:description\" content=\"With quantum computing on the horizon, cryptographers are working to secure digital communications against a new generation of potential threats. By Anthony King How do you outsmart a computer that could soon eclipse anything we have ever built? That is the challenge facing researchers who are working to build up our defences against the coming ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/scienceblog.com\/horizon\/3183\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\/\" \/>\n<meta property=\"og:site_name\" content=\"Horizon Magazine Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/horizon.magazine.eu\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-01T17:30:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/08\/31-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"225\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Horizon Magazine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/HorizonMagEU\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Horizon Magazine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3183\\\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3183\\\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\\\/\"},\"author\":{\"name\":\"Horizon Magazine\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#\\\/schema\\\/person\\\/8f23522ba58f477f04dd574e1034f679\"},\"headline\":\"Codemakers race to secure the internet as quantum threat looms\",\"datePublished\":\"2025-08-01T17:30:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3183\\\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\\\/\"},\"wordCount\":1101,\"publisher\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3183\\\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2025\\\/08\\\/31-1.jpg\",\"articleSection\":[\"Frontier Research\",\"ICT\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2025\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3183\\\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\\\/\",\"url\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3183\\\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\\\/\",\"name\":\"Codemakers race to secure the internet as quantum threat looms - Horizon Magazine Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3183\\\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3183\\\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2025\\\/08\\\/31-1.jpg\",\"datePublished\":\"2025-08-01T17:30:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3183\\\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3183\\\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3183\\\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\\\/#primaryimage\",\"url\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2025\\\/08\\\/31-1.jpg\",\"contentUrl\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2025\\\/08\\\/31-1.jpg\",\"width\":900,\"height\":225,\"caption\":\"Researchers are already working to contain security risks quantum computers will pose for digital communications. \u00a9 sakkmesterke, Shutterstock.com\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/3183\\\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Codemakers race to secure the internet as quantum threat looms\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#website\",\"url\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/\",\"name\":\"Horizon Magazine Blog\",\"description\":\"The EU Research &amp; Innovation Magazine\",\"publisher\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#organization\",\"name\":\"Horizon Magazine Blog\",\"url\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2026\\\/04\\\/eu-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2026\\\/04\\\/eu-logo.jpg\",\"width\":601,\"height\":283,\"caption\":\"Horizon Magazine Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#\\\/schema\\\/person\\\/8f23522ba58f477f04dd574e1034f679\",\"name\":\"Horizon Magazine\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/407bd816be829798850d5e7f646c4137f70c86c6af6c761b67a6ea80c364ffa4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/407bd816be829798850d5e7f646c4137f70c86c6af6c761b67a6ea80c364ffa4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/407bd816be829798850d5e7f646c4137f70c86c6af6c761b67a6ea80c364ffa4?s=96&d=mm&r=g\",\"caption\":\"Horizon Magazine\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/horizon.magazine.eu\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/HorizonMagEU\"],\"url\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/author\\\/horizonmagazine\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Codemakers race to secure the internet as quantum threat looms - Horizon Magazine Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/scienceblog.com\/horizon\/3183\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\/","og_locale":"en_US","og_type":"article","og_title":"Codemakers race to secure the internet as quantum threat looms","og_description":"With quantum computing on the horizon, cryptographers are working to secure digital communications against a new generation of potential threats. By Anthony King How do you outsmart a computer that could soon eclipse anything we have ever built? That is the challenge facing researchers who are working to build up our defences against the coming ... Read more","og_url":"https:\/\/scienceblog.com\/horizon\/3183\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\/","og_site_name":"Horizon Magazine Blog","article_author":"https:\/\/www.facebook.com\/horizon.magazine.eu","article_published_time":"2025-08-01T17:30:05+00:00","og_image":[{"width":900,"height":225,"url":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/08\/31-1.jpg","type":"image\/jpeg"}],"author":"Horizon Magazine","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/HorizonMagEU","twitter_misc":{"Written by":"Horizon Magazine","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/scienceblog.com\/horizon\/3183\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\/#article","isPartOf":{"@id":"https:\/\/scienceblog.com\/horizon\/3183\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\/"},"author":{"name":"Horizon Magazine","@id":"https:\/\/scienceblog.com\/horizon\/#\/schema\/person\/8f23522ba58f477f04dd574e1034f679"},"headline":"Codemakers race to secure the internet as quantum threat looms","datePublished":"2025-08-01T17:30:05+00:00","mainEntityOfPage":{"@id":"https:\/\/scienceblog.com\/horizon\/3183\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\/"},"wordCount":1101,"publisher":{"@id":"https:\/\/scienceblog.com\/horizon\/#organization"},"image":{"@id":"https:\/\/scienceblog.com\/horizon\/3183\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\/#primaryimage"},"thumbnailUrl":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/08\/31-1.jpg","articleSection":["Frontier Research","ICT"],"inLanguage":"en-US","copyrightYear":"2025","copyrightHolder":{"@id":"https:\/\/scienceblog.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/scienceblog.com\/horizon\/3183\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\/","url":"https:\/\/scienceblog.com\/horizon\/3183\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\/","name":"Codemakers race to secure the internet as quantum threat looms - Horizon Magazine Blog","isPartOf":{"@id":"https:\/\/scienceblog.com\/horizon\/#website"},"primaryImageOfPage":{"@id":"https:\/\/scienceblog.com\/horizon\/3183\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\/#primaryimage"},"image":{"@id":"https:\/\/scienceblog.com\/horizon\/3183\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\/#primaryimage"},"thumbnailUrl":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/08\/31-1.jpg","datePublished":"2025-08-01T17:30:05+00:00","breadcrumb":{"@id":"https:\/\/scienceblog.com\/horizon\/3183\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/scienceblog.com\/horizon\/3183\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/scienceblog.com\/horizon\/3183\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\/#primaryimage","url":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/08\/31-1.jpg","contentUrl":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/08\/31-1.jpg","width":900,"height":225,"caption":"Researchers are already working to contain security risks quantum computers will pose for digital communications. \u00a9 sakkmesterke, Shutterstock.com"},{"@type":"BreadcrumbList","@id":"https:\/\/scienceblog.com\/horizon\/3183\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/scienceblog.com\/horizon\/"},{"@type":"ListItem","position":2,"name":"Codemakers race to secure the internet as quantum threat looms"}]},{"@type":"WebSite","@id":"https:\/\/scienceblog.com\/horizon\/#website","url":"https:\/\/scienceblog.com\/horizon\/","name":"Horizon Magazine Blog","description":"The EU Research &amp; Innovation Magazine","publisher":{"@id":"https:\/\/scienceblog.com\/horizon\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/scienceblog.com\/horizon\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/scienceblog.com\/horizon\/#organization","name":"Horizon Magazine Blog","url":"https:\/\/scienceblog.com\/horizon\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/scienceblog.com\/horizon\/#\/schema\/logo\/image\/","url":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2026\/04\/eu-logo.jpg","contentUrl":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2026\/04\/eu-logo.jpg","width":601,"height":283,"caption":"Horizon Magazine Blog"},"image":{"@id":"https:\/\/scienceblog.com\/horizon\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/scienceblog.com\/horizon\/#\/schema\/person\/8f23522ba58f477f04dd574e1034f679","name":"Horizon Magazine","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/407bd816be829798850d5e7f646c4137f70c86c6af6c761b67a6ea80c364ffa4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/407bd816be829798850d5e7f646c4137f70c86c6af6c761b67a6ea80c364ffa4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/407bd816be829798850d5e7f646c4137f70c86c6af6c761b67a6ea80c364ffa4?s=96&d=mm&r=g","caption":"Horizon Magazine"},"sameAs":["https:\/\/www.facebook.com\/horizon.magazine.eu","https:\/\/x.com\/https:\/\/twitter.com\/HorizonMagEU"],"url":"https:\/\/scienceblog.com\/horizon\/author\/horizonmagazine\/"}]}},"jetpack_featured_media_url":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/08\/31-1.jpg","jetpack_shortlink":"https:\/\/wp.me\/pgtNKV-Pl","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":835,"url":"https:\/\/scienceblog.com\/horizon\/835\/quantum-a-double-edged-sword-for-cryptography\/","url_meta":{"origin":3183,"position":0},"title":"Quantum \u2013 a double-edged sword for cryptography","author":"Jon Cartwright","date":"June 11, 2019","format":false,"excerpt":"Quantum computers pose a big threat to the security of modern communications, deciphering cryptographic codes that would take regular computers forever to crack. But drawing on the properties of quantum behaviour could also provide a route to truly secure cryptography. Defence, finance, social networking \u2013 communications everywhere rely on cryptographic\u2026","rel":"","context":"In &quot;ICT&quot;","block_context":{"text":"ICT","link":"https:\/\/scienceblog.com\/horizon\/category\/ict\/"},"img":{"alt_text":"Cryptography that would be impossible for a regular computer to crack, would take a quantum computer just seconds.","src":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/hacking-1685092_1920.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/hacking-1685092_1920.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/hacking-1685092_1920.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/hacking-1685092_1920.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/hacking-1685092_1920.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/hacking-1685092_1920.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":2697,"url":"https:\/\/scienceblog.com\/horizon\/2697\/computings-quantum-shift\/","url_meta":{"origin":3183,"position":1},"title":"Computing\u2019s quantum shift","author":"Horizon Magazine","date":"March 11, 2024","format":false,"excerpt":"With the race to build a new generation of computers heating up, European companies are eyeing the game-changing opportunities. By \u00a0Tom Cassauwers At some point in the future, the medicines that people take for everything from a simple cold to a complex disease like Parkinson\u2019s might result from a discovery\u2026","rel":"","context":"In &quot;ICT&quot;","block_context":{"text":"ICT","link":"https:\/\/scienceblog.com\/horizon\/category\/ict\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/03\/11.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/03\/11.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/03\/11.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/03\/11.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/03\/11.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/03\/11.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":2527,"url":"https:\/\/scienceblog.com\/horizon\/2527\/the-race-is-on-for-a-new-internet\/","url_meta":{"origin":3183,"position":2},"title":"The race is on for a new internet","author":"Horizon Magazine","date":"October 11, 2023","format":false,"excerpt":"Europe is pushing to create a network infrastructure based on quantum physics. By \u00a0Jonathan O\u2019Callaghan In May 2023, Dr Benjamin Lanyon at the University of Innsbruck in Austria took an important step toward creating a new kind of internet: he transferred information along an optical fibre 50 kilometres long using\u2026","rel":"","context":"In &quot;ICT&quot;","block_context":{"text":"ICT","link":"https:\/\/scienceblog.com\/horizon\/category\/ict\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2023\/10\/11.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2023\/10\/11.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2023\/10\/11.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2023\/10\/11.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2023\/10\/11.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2023\/10\/11.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":3149,"url":"https:\/\/scienceblog.com\/horizon\/3149\/cracking-the-quantum-code-light-and-glass-are-set-to-transform-computing\/","url_meta":{"origin":3183,"position":3},"title":"Cracking the quantum code: light and glass are set to transform computing","author":"Horizon Magazine","date":"July 4, 2025","format":false,"excerpt":"European researchers are developing quantum computers using light and glass, in a collaboration that promises breakthroughs in computing power, battery technology and scientific discovery. By Anthony King Giulia Acconcia grew up in the picturesque, historic town of Spoleto, nestled in the foothills of Italy\u2019s Apennine Mountains. Already in secondary school,\u2026","rel":"","context":"In &quot;Frontier Research&quot;","block_context":{"text":"Frontier Research","link":"https:\/\/scienceblog.com\/horizon\/category\/frontier-research\/"},"img":{"alt_text":"Photonic quantum computers, using light and glass, will be much more powerful and faster than today's machines. \u00a9 narong sutinkham, Shutterstock.com","src":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/07\/03.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/07\/03.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/07\/03.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/07\/03.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":827,"url":"https:\/\/scienceblog.com\/horizon\/827\/quantum-computers-will-soon-outperform-classical-machines\/","url_meta":{"origin":3183,"position":4},"title":"\u2018Quantum computers will soon outperform classical machines\u2019","author":"Joanna Roberts","date":"June 4, 2019","format":false,"excerpt":"European scientists have spent 100 years developing the field of quantum mechanics \u2013 a branch of physics dealing with the atomic and subatomic scale \u2013 and we need to reap the profits now that quantum computers and other technologies are becoming a reality, according to Dr Thomas Monz from the\u2026","rel":"","context":"In &quot;ICT&quot;","block_context":{"text":"ICT","link":"https:\/\/scienceblog.com\/horizon\/category\/ict\/"},"img":{"alt_text":"As a quantum computer can be in many states at the time it enables the calculation of many possibilities at once, says Dr Thomas Monz. Image credit - Flickr\/IBM Research, licensed under CC BY-ND 2.0","src":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/header_landscape.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/header_landscape.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/header_landscape.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/header_landscape.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/header_landscape.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/header_landscape.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":842,"url":"https:\/\/scienceblog.com\/horizon\/842\/quantum-simulation-could-help-flights-run-on-time\/","url_meta":{"origin":3183,"position":5},"title":"Quantum simulation could help flights run on time","author":"Richard Gray","date":"June 17, 2019","format":false,"excerpt":"A powerful new form of computing could help scientists design new types of materials\u00a0for nanoelectronics, allow airlines to solve complex logistical problems to ensure flights run on time, and tackle traffic jams to keep cars flowing more freely on busy roads. While modern digital computers are capable of impressive feats\u2026","rel":"","context":"In &quot;ICT&quot;","block_context":{"text":"ICT","link":"https:\/\/scienceblog.com\/horizon\/category\/ict\/"},"img":{"alt_text":"Quantum simulators could help solve logistical challenges, such as making sure planes and airline crew are in the right place in order for flights to run smoothly. Image credit - Pixabay\/ Free-Photos, licensed under pixabay license","src":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/airport-690556_1920.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/airport-690556_1920.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/airport-690556_1920.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/airport-690556_1920.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/airport-690556_1920.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/airport-690556_1920.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/posts\/3183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/users\/298"}],"replies":[{"embeddable":true,"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/comments?post=3183"}],"version-history":[{"count":1,"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/posts\/3183\/revisions"}],"predecessor-version":[{"id":3186,"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/posts\/3183\/revisions\/3186"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/media\/3185"}],"wp:attachment":[{"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/media?parent=3183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/categories?post=3183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/tags?post=3183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}