{"id":835,"date":"2019-06-11T08:03:15","date_gmt":"2019-06-11T08:03:15","guid":{"rendered":"http:\/\/horizon.peachpuff-wolverine-566518.hostingersite.com\/?p=835"},"modified":"2019-06-11T08:03:15","modified_gmt":"2019-06-11T08:03:15","slug":"quantum-a-double-edged-sword-for-cryptography","status":"publish","type":"post","link":"https:\/\/scienceblog.com\/horizon\/835\/quantum-a-double-edged-sword-for-cryptography\/","title":{"rendered":"Quantum \u2013 a double-edged sword for cryptography"},"content":{"rendered":"<h3 class=\"dotted\"><strong>Quantum computers pose a big threat to the security of modern communications, deciphering cryptographic codes that would take regular computers forever to crack. But drawing on the properties of quantum behaviour could also provide a route to truly secure cryptography.<\/strong><\/h3>\n<div class=\"field field-name-body field-type-text-with-summary field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\">\n<p class=\"selectionShareable\">Defence, finance, social networking \u2013 communications everywhere rely on cryptographic security. Cryptography involves jumbling up messages according to a code, or key, that has too many combinations for even very powerful computers to try out.<\/p>\n<p class=\"selectionShareable\">But quantum computers have an advantage. Unlike regular computers, which process information in \u2018bits\u2019 of definite ones and zeros, quantum computers process information in \u2018qubits\u2019, the states of which remain uncertain until the final calculation.<\/p>\n<p class=\"selectionShareable\">The result is that a quantum computer can effectively try out many different keys in parallel. Cryptography that would be impenetrable to regular computers could take a quantum computer\u00a0mere seconds\u00a0to crack.<\/p>\n<p class=\"selectionShareable\">Practical quantum computers that can be used to break encryption are expected to be years, if not decades, away. But that should not be of any reassurance: even if a hacker cannot decipher confidential information now, they could save it and simply wait until a quantum computer is available.<\/p>\n<p class=\"selectionShareable\">\u2018The problem already exists,\u2019 said Professor Valerio Pruneri of the Institute of Photonic Sciences in Barcelona, Spain, and the coordinator of a quantum security project called\u00a0<a href=\"https:\/\/cordis.europa.eu\/project\/rcn\/218554\/factsheet\/en\" target=\"_blank\" rel=\"noopener noreferrer\">CiViQ<\/a>. \u2018A hacker can take what is stored now, and break its key at a later date.\u2019<\/p>\n<p class=\"selectionShareable\">The answer, says Prof. Pruneri, is another quantum technology. Known as quantum key distribution (QKD), it is a set of rules for encrypting information \u2013 known as a cryptography protocol \u2013 that is almost impossible to crack, even by quantum computers.<\/p>\n<p class=\"selectionShareable\"><strong>Eavesdrop<\/strong><\/p>\n<p class=\"selectionShareable\">QKD involves two parties sharing a random quantum key, according to which some separate information is encoded. Because in quantum theory it is impossible to observe something without corrupting it, the two parties will know whether someone else has eavesdropped on the key \u2013 and therefore whether it is safe, or not, to share their coded information.<\/p>\n<p class=\"selectionShareable\">Until now, QKD has usually involved specialist technology, such as single-photon detectors and emitters, which are difficult for people outside labs to implement. In the CiViQ project, however, Prof. Pruneri and his team are developing a variant of QKD that works with conventional telecommunications technology.<\/p>\n<p class=\"selectionShareable\">They have already created prototypes, and performed some field demonstrations. Now, the researchers are working with industry telecoms clients including Telef\u00f3nica in Spain, Orange in France and Deutsche Telekom in Germany to create systems that work to their respective requirements, with the hope that the first systems could be online within three years.<\/p>\n<p class=\"selectionShareable\">Prof. Pruneri\u2019s hope is to create highly secure communication systems up to 100 km in size suitable for governmental, finance, medical and other high-risk sectors within cities. It could even be used by\u00a0everyday consumers, although Prof. Pruneri says that QKD currently reaches shorter distances and lower speed than regular\u00a0communication.<\/p>\n<p class=\"selectionShareable\"><strong>Random<\/strong><\/p>\n<p class=\"selectionShareable\">Like normal cryptography, QKD needs random keys \u2013 strings of numbers \u2013 to be generated in the first place. The more random these keys are, the greater the security of the system, as there is less chance of the keys being guessed. But the problem is that the numbers generated with traditional methods often aren\u2019t totally random.<\/p>\n<p class=\"selectionShareable\">Here, quantum mechanics can again come to the rescue. The behaviour of atoms, photons and electrons is believed to be truly random and this can be used as a way of generating numbers that cannot be predicted.<\/p>\n<p class=\"selectionShareable\">Professor Hugo Zbinden of the University of Geneva in Switzerland said: \u2018Quantum random-number generators profit from the intrinsic randomness of quantum physics, whereas classical true random number generators are based on chaotic systems, which are deterministic and, in theory, to some extent predictable.\u2019<\/p>\n<div class=\"quote-view quotesBlock quote_horizontal\">\n<blockquote>\n<p class=\"selectionShareable\">\u200b&#8217;Quantum computers threaten classical cryptography.&#8217;<\/p>\n<p class=\"selectionShareable\">Hugo Zbinden, University of Geneva, Switzerland<\/p>\n<\/blockquote>\n<\/div>\n<p class=\"selectionShareable\">Quantum random-number generators already exist, but to\u200b make them more widely applicable Prof. Zbinden and his colleagues working on a project called\u00a0<a href=\"https:\/\/cordis.europa.eu\/project\/rcn\/218463\/factsheet\/en\" target=\"_blank\" rel=\"noopener noreferrer\">QRANGE<\/a>\u00a0are improving their speed and reliability, as well as reducing their cost. Currently, they are trying to develop prototypes with a \u2018high technology readiness level\u2019 \u2013 in other words, prototypes that demonstrate that the technology is ripe for use in the real world.<\/p>\n<p class=\"selectionShareable\">The work is an important step in ensuring that, while being a threat to the security of our current communications, quantum approaches also provide a path to more secure systems.<\/p>\n<p class=\"selectionShareable\">\u200b\u2018Quantum computers threaten classical cryptography,\u2019 says Prof. Zbinden. \u2018Quantum cryptography can be a solution, (but) it needs high-quality random numbers.\u2019<\/p>\n<p class=\"selectionShareable\"><em>The research in this article was funded by the EU. If you liked this article, please consider sharing it on social media.<\/em><\/p>\n<p>Originally published on <a href=\"https:\/\/horizon-magazine.eu\/\">Horizon<\/a>.<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Quantum computers pose a big threat to the security of modern communications, deciphering cryptographic codes that would take regular computers forever to crack. But drawing on the properties of quantum behaviour could also provide a route to truly secure cryptography. Defence, finance, social networking \u2013 communications everywhere rely on cryptographic security. Cryptography involves jumbling up &#8230; <a title=\"Quantum \u2013 a double-edged sword for cryptography\" class=\"read-more\" href=\"https:\/\/scienceblog.com\/horizon\/835\/quantum-a-double-edged-sword-for-cryptography\/\" aria-label=\"Read more about Quantum \u2013 a double-edged sword for cryptography\">Read more<\/a><\/p>\n","protected":false},"author":311,"featured_media":836,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"generate_page_header":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[112],"tags":[277,276,275,79,24],"class_list":["post-835","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ict","tag-communication","tag-cryptography","tag-quantum","tag-research","tag-science"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Quantum \u2013 a double-edged sword for cryptography - Horizon Magazine Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/scienceblog.com\/horizon\/835\/quantum-a-double-edged-sword-for-cryptography\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quantum \u2013 a double-edged sword for cryptography\" \/>\n<meta property=\"og:description\" content=\"Quantum computers pose a big threat to the security of modern communications, deciphering cryptographic codes that would take regular computers forever to crack. But drawing on the properties of quantum behaviour could also provide a route to truly secure cryptography. Defence, finance, social networking \u2013 communications everywhere rely on cryptographic security. Cryptography involves jumbling up ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/scienceblog.com\/horizon\/835\/quantum-a-double-edged-sword-for-cryptography\/\" \/>\n<meta property=\"og:site_name\" content=\"Horizon Magazine Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-11T08:03:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/hacking-1685092_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1439\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jon Cartwright\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jon Cartwright\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/835\\\/quantum-a-double-edged-sword-for-cryptography\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/835\\\/quantum-a-double-edged-sword-for-cryptography\\\/\"},\"author\":{\"name\":\"Jon Cartwright\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#\\\/schema\\\/person\\\/e46ce6c2573e7e2e6293fb35a31a87b9\"},\"headline\":\"Quantum \u2013 a double-edged sword for cryptography\",\"datePublished\":\"2019-06-11T08:03:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/835\\\/quantum-a-double-edged-sword-for-cryptography\\\/\"},\"wordCount\":775,\"publisher\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/835\\\/quantum-a-double-edged-sword-for-cryptography\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2019\\\/06\\\/hacking-1685092_1920.jpg\",\"keywords\":[\"communication\",\"cryptography\",\"quantum\",\"research\",\"science\"],\"articleSection\":[\"ICT\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2019\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/835\\\/quantum-a-double-edged-sword-for-cryptography\\\/\",\"url\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/835\\\/quantum-a-double-edged-sword-for-cryptography\\\/\",\"name\":\"Quantum \u2013 a double-edged sword for cryptography - Horizon Magazine Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/835\\\/quantum-a-double-edged-sword-for-cryptography\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/835\\\/quantum-a-double-edged-sword-for-cryptography\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2019\\\/06\\\/hacking-1685092_1920.jpg\",\"datePublished\":\"2019-06-11T08:03:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/835\\\/quantum-a-double-edged-sword-for-cryptography\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/835\\\/quantum-a-double-edged-sword-for-cryptography\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/835\\\/quantum-a-double-edged-sword-for-cryptography\\\/#primaryimage\",\"url\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2019\\\/06\\\/hacking-1685092_1920.jpg\",\"contentUrl\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2019\\\/06\\\/hacking-1685092_1920.jpg\",\"width\":1920,\"height\":1439,\"caption\":\"Cryptography that would be impossible for a regular computer to crack, would take a quantum computer just seconds.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/835\\\/quantum-a-double-edged-sword-for-cryptography\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Quantum \u2013 a double-edged sword for cryptography\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#website\",\"url\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/\",\"name\":\"Horizon Magazine Blog\",\"description\":\"The EU Research &amp; Innovation Magazine\",\"publisher\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#organization\",\"name\":\"Horizon Magazine Blog\",\"url\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2026\\\/04\\\/eu-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2026\\\/04\\\/eu-logo.jpg\",\"width\":601,\"height\":283,\"caption\":\"Horizon Magazine Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/#\\\/schema\\\/person\\\/e46ce6c2573e7e2e6293fb35a31a87b9\",\"name\":\"Jon Cartwright\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/639fdb95ff34581e15fbc64f36881a045bb2057ef25c3710e9a63eee1126dd52?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/639fdb95ff34581e15fbc64f36881a045bb2057ef25c3710e9a63eee1126dd52?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/639fdb95ff34581e15fbc64f36881a045bb2057ef25c3710e9a63eee1126dd52?s=96&d=mm&r=g\",\"caption\":\"Jon Cartwright\"},\"url\":\"https:\\\/\\\/scienceblog.com\\\/horizon\\\/author\\\/joncartwright\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Quantum \u2013 a double-edged sword for cryptography - Horizon Magazine Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/scienceblog.com\/horizon\/835\/quantum-a-double-edged-sword-for-cryptography\/","og_locale":"en_US","og_type":"article","og_title":"Quantum \u2013 a double-edged sword for cryptography","og_description":"Quantum computers pose a big threat to the security of modern communications, deciphering cryptographic codes that would take regular computers forever to crack. But drawing on the properties of quantum behaviour could also provide a route to truly secure cryptography. Defence, finance, social networking \u2013 communications everywhere rely on cryptographic security. Cryptography involves jumbling up ... Read more","og_url":"https:\/\/scienceblog.com\/horizon\/835\/quantum-a-double-edged-sword-for-cryptography\/","og_site_name":"Horizon Magazine Blog","article_published_time":"2019-06-11T08:03:15+00:00","og_image":[{"width":1920,"height":1439,"url":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/hacking-1685092_1920.jpg","type":"image\/jpeg"}],"author":"Jon Cartwright","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jon Cartwright","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/scienceblog.com\/horizon\/835\/quantum-a-double-edged-sword-for-cryptography\/#article","isPartOf":{"@id":"https:\/\/scienceblog.com\/horizon\/835\/quantum-a-double-edged-sword-for-cryptography\/"},"author":{"name":"Jon Cartwright","@id":"https:\/\/scienceblog.com\/horizon\/#\/schema\/person\/e46ce6c2573e7e2e6293fb35a31a87b9"},"headline":"Quantum \u2013 a double-edged sword for cryptography","datePublished":"2019-06-11T08:03:15+00:00","mainEntityOfPage":{"@id":"https:\/\/scienceblog.com\/horizon\/835\/quantum-a-double-edged-sword-for-cryptography\/"},"wordCount":775,"publisher":{"@id":"https:\/\/scienceblog.com\/horizon\/#organization"},"image":{"@id":"https:\/\/scienceblog.com\/horizon\/835\/quantum-a-double-edged-sword-for-cryptography\/#primaryimage"},"thumbnailUrl":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/hacking-1685092_1920.jpg","keywords":["communication","cryptography","quantum","research","science"],"articleSection":["ICT"],"inLanguage":"en-US","copyrightYear":"2019","copyrightHolder":{"@id":"https:\/\/scienceblog.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/scienceblog.com\/horizon\/835\/quantum-a-double-edged-sword-for-cryptography\/","url":"https:\/\/scienceblog.com\/horizon\/835\/quantum-a-double-edged-sword-for-cryptography\/","name":"Quantum \u2013 a double-edged sword for cryptography - Horizon Magazine Blog","isPartOf":{"@id":"https:\/\/scienceblog.com\/horizon\/#website"},"primaryImageOfPage":{"@id":"https:\/\/scienceblog.com\/horizon\/835\/quantum-a-double-edged-sword-for-cryptography\/#primaryimage"},"image":{"@id":"https:\/\/scienceblog.com\/horizon\/835\/quantum-a-double-edged-sword-for-cryptography\/#primaryimage"},"thumbnailUrl":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/hacking-1685092_1920.jpg","datePublished":"2019-06-11T08:03:15+00:00","breadcrumb":{"@id":"https:\/\/scienceblog.com\/horizon\/835\/quantum-a-double-edged-sword-for-cryptography\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/scienceblog.com\/horizon\/835\/quantum-a-double-edged-sword-for-cryptography\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/scienceblog.com\/horizon\/835\/quantum-a-double-edged-sword-for-cryptography\/#primaryimage","url":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/hacking-1685092_1920.jpg","contentUrl":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/hacking-1685092_1920.jpg","width":1920,"height":1439,"caption":"Cryptography that would be impossible for a regular computer to crack, would take a quantum computer just seconds."},{"@type":"BreadcrumbList","@id":"https:\/\/scienceblog.com\/horizon\/835\/quantum-a-double-edged-sword-for-cryptography\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/scienceblog.com\/horizon\/"},{"@type":"ListItem","position":2,"name":"Quantum \u2013 a double-edged sword for cryptography"}]},{"@type":"WebSite","@id":"https:\/\/scienceblog.com\/horizon\/#website","url":"https:\/\/scienceblog.com\/horizon\/","name":"Horizon Magazine Blog","description":"The EU Research &amp; Innovation Magazine","publisher":{"@id":"https:\/\/scienceblog.com\/horizon\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/scienceblog.com\/horizon\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/scienceblog.com\/horizon\/#organization","name":"Horizon Magazine Blog","url":"https:\/\/scienceblog.com\/horizon\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/scienceblog.com\/horizon\/#\/schema\/logo\/image\/","url":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2026\/04\/eu-logo.jpg","contentUrl":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2026\/04\/eu-logo.jpg","width":601,"height":283,"caption":"Horizon Magazine Blog"},"image":{"@id":"https:\/\/scienceblog.com\/horizon\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/scienceblog.com\/horizon\/#\/schema\/person\/e46ce6c2573e7e2e6293fb35a31a87b9","name":"Jon Cartwright","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/639fdb95ff34581e15fbc64f36881a045bb2057ef25c3710e9a63eee1126dd52?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/639fdb95ff34581e15fbc64f36881a045bb2057ef25c3710e9a63eee1126dd52?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/639fdb95ff34581e15fbc64f36881a045bb2057ef25c3710e9a63eee1126dd52?s=96&d=mm&r=g","caption":"Jon Cartwright"},"url":"https:\/\/scienceblog.com\/horizon\/author\/joncartwright\/"}]}},"jetpack_featured_media_url":"https:\/\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/hacking-1685092_1920.jpg","jetpack_shortlink":"https:\/\/wp.me\/pgtNKV-dt","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":3183,"url":"https:\/\/scienceblog.com\/horizon\/3183\/codemakers-race-to-secure-the-internet-as-quantum-threat-looms\/","url_meta":{"origin":835,"position":0},"title":"Codemakers race to secure the internet as quantum threat looms","author":"Horizon Magazine","date":"August 1, 2025","format":false,"excerpt":"With quantum computing on the horizon, cryptographers are working to secure digital communications against a new generation of potential threats. By Anthony King How do you outsmart a computer that could soon eclipse anything we have ever built? That is the challenge facing researchers who are working to build up\u2026","rel":"","context":"In &quot;Frontier Research&quot;","block_context":{"text":"Frontier Research","link":"https:\/\/scienceblog.com\/horizon\/category\/frontier-research\/"},"img":{"alt_text":"Researchers are already working to contain security risks quantum computers will pose for digital communications. \u00a9 sakkmesterke, Shutterstock.com","src":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/08\/31-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/08\/31-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/08\/31-1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/08\/31-1.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":2697,"url":"https:\/\/scienceblog.com\/horizon\/2697\/computings-quantum-shift\/","url_meta":{"origin":835,"position":1},"title":"Computing\u2019s quantum shift","author":"Horizon Magazine","date":"March 11, 2024","format":false,"excerpt":"With the race to build a new generation of computers heating up, European companies are eyeing the game-changing opportunities. By \u00a0Tom Cassauwers At some point in the future, the medicines that people take for everything from a simple cold to a complex disease like Parkinson\u2019s might result from a discovery\u2026","rel":"","context":"In &quot;ICT&quot;","block_context":{"text":"ICT","link":"https:\/\/scienceblog.com\/horizon\/category\/ict\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/03\/11.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/03\/11.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/03\/11.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/03\/11.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/03\/11.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2024\/03\/11.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":3191,"url":"https:\/\/scienceblog.com\/horizon\/3191\/from-medieval-stronghold-to-cyber-fortress-shielding-europes-digital-future\/","url_meta":{"origin":835,"position":2},"title":"From medieval stronghold to cyber fortress: shielding Europe\u2019s digital future","author":"Horizon Magazine","date":"August 8, 2025","format":false,"excerpt":"Czech and Estonian researchers are joining forces to build a cross-border cybersecurity hub that will strengthen Europe\u2019s digital defences in the face of growing cyber threats. By Michaela Nesvarova The unmistakable silhouette of \u0160pilberk Castle towers over Brno, the largest city in Czechia\u2019s South Moravia region. From this medieval stronghold,\u2026","rel":"","context":"In &quot;ICT&quot;","block_context":{"text":"ICT","link":"https:\/\/scienceblog.com\/horizon\/category\/ict\/"},"img":{"alt_text":"A new cybersecurity hub led by EU-funded researchers aims to boost Europe\u2019s resilience against cyber-attacks. \u00a9 Thapana_Studio, Shutterstock.com","src":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/08\/07.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/08\/07.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/08\/07.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/08\/07.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":2527,"url":"https:\/\/scienceblog.com\/horizon\/2527\/the-race-is-on-for-a-new-internet\/","url_meta":{"origin":835,"position":3},"title":"The race is on for a new internet","author":"Horizon Magazine","date":"October 11, 2023","format":false,"excerpt":"Europe is pushing to create a network infrastructure based on quantum physics. By \u00a0Jonathan O\u2019Callaghan In May 2023, Dr Benjamin Lanyon at the University of Innsbruck in Austria took an important step toward creating a new kind of internet: he transferred information along an optical fibre 50 kilometres long using\u2026","rel":"","context":"In &quot;ICT&quot;","block_context":{"text":"ICT","link":"https:\/\/scienceblog.com\/horizon\/category\/ict\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2023\/10\/11.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2023\/10\/11.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2023\/10\/11.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2023\/10\/11.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2023\/10\/11.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2023\/10\/11.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":3149,"url":"https:\/\/scienceblog.com\/horizon\/3149\/cracking-the-quantum-code-light-and-glass-are-set-to-transform-computing\/","url_meta":{"origin":835,"position":4},"title":"Cracking the quantum code: light and glass are set to transform computing","author":"Horizon Magazine","date":"July 4, 2025","format":false,"excerpt":"European researchers are developing quantum computers using light and glass, in a collaboration that promises breakthroughs in computing power, battery technology and scientific discovery. By Anthony King Giulia Acconcia grew up in the picturesque, historic town of Spoleto, nestled in the foothills of Italy\u2019s Apennine Mountains. Already in secondary school,\u2026","rel":"","context":"In &quot;Frontier Research&quot;","block_context":{"text":"Frontier Research","link":"https:\/\/scienceblog.com\/horizon\/category\/frontier-research\/"},"img":{"alt_text":"Photonic quantum computers, using light and glass, will be much more powerful and faster than today's machines. \u00a9 narong sutinkham, Shutterstock.com","src":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/07\/03.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/07\/03.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/07\/03.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2025\/07\/03.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":827,"url":"https:\/\/scienceblog.com\/horizon\/827\/quantum-computers-will-soon-outperform-classical-machines\/","url_meta":{"origin":835,"position":5},"title":"\u2018Quantum computers will soon outperform classical machines\u2019","author":"Joanna Roberts","date":"June 4, 2019","format":false,"excerpt":"European scientists have spent 100 years developing the field of quantum mechanics \u2013 a branch of physics dealing with the atomic and subatomic scale \u2013 and we need to reap the profits now that quantum computers and other technologies are becoming a reality, according to Dr Thomas Monz from the\u2026","rel":"","context":"In &quot;ICT&quot;","block_context":{"text":"ICT","link":"https:\/\/scienceblog.com\/horizon\/category\/ict\/"},"img":{"alt_text":"As a quantum computer can be in many states at the time it enables the calculation of many possibilities at once, says Dr Thomas Monz. Image credit - Flickr\/IBM Research, licensed under CC BY-ND 2.0","src":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/header_landscape.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/header_landscape.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/header_landscape.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/header_landscape.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/header_landscape.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/scienceblog.com\/horizon\/wp-content\/uploads\/sites\/4\/2019\/06\/header_landscape.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/posts\/835","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/users\/311"}],"replies":[{"embeddable":true,"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/comments?post=835"}],"version-history":[{"count":0,"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/posts\/835\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/media\/836"}],"wp:attachment":[{"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/media?parent=835"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/categories?post=835"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scienceblog.com\/horizon\/wp-json\/wp\/v2\/tags?post=835"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}