{"id":25278,"date":"2023-09-10T17:00:00","date_gmt":"2023-09-10T15:00:00","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=25278"},"modified":"2024-09-05T23:05:46","modified_gmt":"2024-09-05T21:05:46","slug":"the-impact-of-quantum-computing-on-cybersecurity","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/09\/10\/the-impact-of-quantum-computing-on-cybersecurity\/","title":{"rendered":"The Impact of Quantum Computing on Cybersecurity"},"content":{"rendered":"\n<p>Before quantum technologies, there was darkness \u2013 now, there is light. Small quantums with huge amounts of processing power. It seems like the future has arrived: Welcome to the second quantum revolution!<\/p>\n\n\n\n<p>The interdisciplinary field of quantum computing surely is amongst the hot topics of scientific research at the moment. Initiatives rise, groups are formed, standards are built \u2013 a lot of money is being invested. But where does the idea of using quantums for computing come from? Why should computer scientists be interested? And what impact does it have on our understanding of Cybersecurity? Let\u2019s find out.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Second Quantum Revolution<\/h3>\n\n\n\n<p>Over 40 years ago, It was proposed by Richard Feynman in one of his famous talks in 1981 (\u2018Simulating physics with computers\u2019) that quantum physics may be &#8216;the way&#8217; to build a very powerful computer. This computer could be used to simulate quantum systems which are too hard to simulate with conventional computers. [1]<\/p>\n\n\n\n<p>Why simulate quantum systems you ask? Because their properties are unique and can be used for specific problems.<\/p>\n\n\n\n<p>Having this perspective on computing with quantum mechanics, Feynman is remembered for launching<strong> <\/strong><em>Quantum Computing<\/em> as a field of study. Exploring the possibilities of quantum technologies in a wide range of applications is one of the biggest challenges of the 21st century. This is why the second <a href=\"https:\/\/www.nist.gov\/physics\/introduction-new-quantum-revolution\" target=\"_blank\" rel=\"noopener\" title=\"\">quantum revolution<\/a> seemingly has begun. [2]&nbsp;<\/p>\n\n\n\n<p>Looking back, the <em>first revolution<\/em> in quantum physics enabled inventions like lasers and transistors, which are the basic building blocks of computers and all technology we are using today. [2]&nbsp;<\/p>\n\n\n\n<p>The <em>second quantum revolution<\/em> is about controlling individual quantum systems, where in example charged molecules belong to. Using quantum logic, highly complex systems can be built and \u2013 with the power of engineering \u2013 used to serve applications. The combination of quantum physics and computing theory is thereby also known as <em>quantum information<\/em>. [2]<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-1_quantum_technologies.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" data-attachment-id=\"25739\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/09\/10\/the-impact-of-quantum-computing-on-cybersecurity\/quantum_computing-1_quantum_technologies\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-1_quantum_technologies.png\" data-orig-size=\"1200,628\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"quantum_computing-1_quantum_technologies\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-1_quantum_technologies-1024x536.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-1_quantum_technologies-1024x536.png\" alt=\"Quantum Technology Overview\" class=\"wp-image-25739\" style=\"width:768px;height:402px\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-1_quantum_technologies-1024x536.png 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-1_quantum_technologies-300x157.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-1_quantum_technologies-768x402.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-1_quantum_technologies.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Picture 1 | Quantum Technologies<\/figcaption><\/figure>\n\n\n\n<p>Quantum Technologies are more than just Quantum Computers. They have an influence on research in many fields from health to high-energy physics. But as they are indeed most interesting for Cybersecurity, let\u2019s keep the focus on them. [3]<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Basic Rules of Quantum Systems<\/h3>\n\n\n\n<p>Without the understanding of some physics, you can\u2019t wrap your head around quantum computers. Computer Scientists therefore need to learn physics as well for this technology. So let\u2019s set the basics in order to understand what makes them so powerful.&nbsp;<\/p>\n\n\n\n<p>As already described quantum systems have unique properties due to quantum mechanics. What seems like a mystery in behavior, nowadays can be described with the help of physics.<\/p>\n\n\n\n<p>There are two main rules for quantum systems. [1]<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>It can be in multiple states simultaneously.<\/li>\n\n\n\n<li>It only works, when you don&#8217;t look.<\/li>\n<\/ol>\n\n\n\n<p>This is what makes quantum technologies super fascinating. As described in the particle-wave dualism or with Schr\u00f6dingers cat, we can assume a system in multiple probable states. Therefore you can only derive results when looking at multiple results, because quantums have their own movements and behave differently each test. This works through statistical methods on a high scale. [3,4]<\/p>\n\n\n\n<p>The highly statistical and therefore mathematical approach makes Quantum Computing drawn to the engineering field, physics and computer science. [3]&nbsp;<\/p>\n\n\n\n<p>Alright. Small physics lesson done. Back to the computing aspect.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How does a Quantum Computer work?<\/h3>\n\n\n\n<p>In classical computing, simple operations are made by addressing the block of <em>bits<\/em>. Having the state 0 or 1, the operations take place via simple electrical fields. The bits are joined together by logical gates such as AND, OR and NOT. [4,5]<\/p>\n\n\n\n<p>Computing with quantums is different. The quantum computer works with quantum bits, the so-called <em>qubits<\/em>. Qubits can also have a value of either 0 or 1. So far so good, this is what we know already. But they can also represent both 0 and 1 at the same time. Why is that? [4,5]<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-2_bit_and_qubit.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" data-attachment-id=\"25740\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/09\/10\/the-impact-of-quantum-computing-on-cybersecurity\/quantum_computing-2_bit_and_qubit\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-2_bit_and_qubit.png\" data-orig-size=\"1200,628\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"quantum_computing-2_bit_and_qubit\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-2_bit_and_qubit-1024x536.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-2_bit_and_qubit-1024x536.png\" alt=\"Difference between Bit and Qubit\" class=\"wp-image-25740\" style=\"width:768px;height:402px\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-2_bit_and_qubit-1024x536.png 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-2_bit_and_qubit-300x157.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-2_bit_and_qubit-768x402.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-2_bit_and_qubit.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Picture 2 | Difference between Bit and Qubit, adapted by [18]<\/figcaption><\/figure>\n\n\n\n<p>Physics kicks in again with the main two principles of quantum mechanics:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Superposition<\/strong>: Famously introduced with the double-slit experiment, a particle such as an electron or photon can be in different states simultaneously. Known as \u2018superposition\u2019, this means that qubits can represent both 1 and 0 at the same time (i.e. 0, 1 and 10). Quantum computers use this characteristic by processing the states as possibilities of results, exploring multiple solutions to a problem simultaneously.&nbsp; This means that the software developer can take both cases (1 and 0) simultaneously, making a quantum computer faster than the classical one. [4,5]<br><\/li>\n\n\n\n<li><strong>Entanglement<\/strong>: Quantums seem to be connected with some force, no matter how far apart they may be. Changing one state instantly affects the other. This principle known as \u2018entanglement\u2019 was proposed by Albert Einstein in 1945. It can be compared to a wire connection without any wires. If one quantum moves, the other one moves. This means that information can be encoded and manipulated in different ways, that would have been to unsolvable with classical bits. In reverse a new way of proramming is needed, presented in the form of a Hamiltonian. [5,6]<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-3_qubit_states.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" data-attachment-id=\"25741\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/09\/10\/the-impact-of-quantum-computing-on-cybersecurity\/quantum_computing-3_qubit_states\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-3_qubit_states.png\" data-orig-size=\"1200,628\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"quantum_computing-3_qubit_states\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-3_qubit_states-1024x536.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-3_qubit_states-1024x536.png\" alt=\"Multiple States of a Qubit\" class=\"wp-image-25741\" style=\"width:768px;height:402px\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-3_qubit_states-1024x536.png 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-3_qubit_states-300x157.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-3_qubit_states-768x402.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-3_qubit_states.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Picture 3 | Multiple States of a Qubit, adapted by [19]<\/figcaption><\/figure>\n\n\n\n<p>Adding qubits, the possibilities of computing power increases exponentially instead of linearly (i.e. N qubits = 2<sup>N<\/sup> bits). They can theoretically compute faster than any classical supercomputer already built (&gt;100 qubits == supercomputer). Let\u2019s talk numbers. The current record of qubits, in August 2023, is held by IBM with the quantum processor \u201cEagle\u201d with 433 qubits. The aim for IBM currently is a quantum computer with 100,000 qubits. [7,8]<\/p>\n\n\n\n<blockquote class=\"wp-block-quote has-text-align-right is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cQuantum computing is a rapidly-emerging technology that harnesses the laws of quantum mechanics to solve problems too complex for classical computers.\u201d<\/em><\/p>\n<cite>&#8211; IBM [9]<\/cite><\/blockquote>\n\n\n\n<h4 class=\"wp-block-heading\">The Perfect Environment<\/h4>\n\n\n\n<p>Handling the fine states of a qubit is a challenge. They are extremely sensitive to any form of disturbance such as light, heat or radiation inside the quantum computer. And the qubits as well interact with each other, making their manipulation extremely difficult. In order for the quantum system to work correctly, different measures need to be applied. [4,5]<\/p>\n\n\n\n<p>Note: <em>Different conditions apply to Photonic Quantum Computers. They are based on a photonic approach without the need of superconducting materials. They will not be discussed within this blog entry.<\/em><\/p>\n\n\n\n<p>To be able to manipulate the qubits, they need to be trapped in a <strong>high-vacuum chamber <\/strong>at a <strong>temperature near absolute zero<\/strong>. Only this way, electrical and magnetical fields work at their best. And we need the quantums themselves to be trapped inside the chamber, with different laser beams to change the particles into qubits, setting them in superposition and entanglement state. Attention please: The more qubits, the more noise of atom entanglement! It\u2019s not that easy. [4,5]<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-4_helium_dewars.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" data-attachment-id=\"25742\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/09\/10\/the-impact-of-quantum-computing-on-cybersecurity\/quantum_computing-4_helium_dewars\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-4_helium_dewars.png\" data-orig-size=\"1200,628\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"quantum_computing-4_helium_dewars\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-4_helium_dewars-1024x536.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-4_helium_dewars-1024x536.png\" alt=\"Liquid Helium Dewars in front of a building\" class=\"wp-image-25742\" style=\"width:768px;height:402px\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-4_helium_dewars-1024x536.png 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-4_helium_dewars-300x157.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-4_helium_dewars-768x402.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/09\/quantum_computing-4_helium_dewars.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Picture 4 | Liquid Helium Dewars for Physical Cooling, Picture by Nadine Weber<\/figcaption><\/figure>\n\n\n\n<p>The stability of the qubits can only be achieved by \u2018cooling down\u2019 the atoms with physical and laser cooling. <strong>Physically cooling<\/strong> down magnets is extremely important for the characteristic of superconductivity. When cooled down, certain materials conduct electricity without energy loss (which basically means they are non-resistant). [4]<\/p>\n\n\n\n<p><strong>Laser Cooling<\/strong> is a concept of slowing down atoms to stabilize them. \u2018Cooling\u2019 refers to the process of slowing down a large amount of atoms, which will have an associated temperature that gets reduced. [10]<\/p>\n\n\n\n<p>This is just a small insight in what it takes to built a quantum computer. You can imagine that there is a lot more precision and expertise needed.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">State of Research<\/h4>\n\n\n\n<p>Just thinking about the electrical and material costs, internal and external factors that are invested in the construction of a quantum computer might lead to the fact that quantum computers are <em>far away<\/em> from being a personal computer. Billions of dollars are need for such a system. Huge computing power &#8211; but at what cost?<\/p>\n\n\n\n<p>the need for superconducting materials. Therefore initiatives in collaboration between industry and research institutions arise for future innovations. Organizations like IBM, Google, Microsoft, and academic institutions are at the forefront of quantum computing research and often publish their latest breakthroughs. Small breakthroughs thereby accumulate and add to the \u2018Second Revolution\u2019 of Quantum Computing and its usage for real life applications. [6]<\/p>\n\n\n\n<p>With this basic understanding of quantum computers, let\u2019s have a look at what it means for the world of cybersecurity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Being Quantum-Safe<\/h3>\n\n\n\n<p>With the release of massive computing power through quantum computers, conventional cryptography protecting our systems is in danger. The RSA-Cryptosystem, the Diffie-Hellman key exchange or the algorithm of Elliptic Curve Cryptography (ECC) will be broken, because the underlying security lays in the way that discrete algorithms such as linear factorization cannot be solved in polynomial time. Quantum Computers could easily solve that. [4,11]<\/p>\n\n\n\n<p>Asymmetric cryptography, which we are using on a daily basis, is threatened by quantum computers. This is why they are a threat to convential cybersecurity. Maybe a diversification of our understanding of cybersecurity is needed. It definitely requires a change of encryption. [12]<\/p>\n\n\n\n<blockquote class=\"wp-block-quote has-text-align-right is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cThe quantum security market was valued at just under 500 million U.S. dollars in 2022, with forecasts suggesting that this is likely to rise to 9.8 billion U.S. dollars by 2030. The majority of quantum security revenue is generated by the post quantum security or cryptography (PQC) method&#8221;<\/em><\/p>\n<cite>&#8211; Statista [13]<\/cite><\/blockquote>\n\n\n\n<p>Knowing about the power of quantum computers, Peter Shor proposed a quantum algorithm in 1994, which will break regular encryption. The challenge of developing quantum-safe encryption algorithms is currently faced by the new field of <strong>Post-Quantum Cryptography<\/strong> research. [8]<\/p>\n\n\n\n<p class=\"has-text-align-left\">In the following blog article, you can find more information on <a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/02\/quantum-and-post-quantum-cryptography\/\" title=\"Quantum and Post-Quantum Cryptography\">Quantum and Post-Quantum Cryptography<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-computer-science-blog-hdm-stuttgart wp-block-embed-computer-science-blog-hdm-stuttgart\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"THwivJYD5t\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/02\/quantum-and-post-quantum-cryptography\/\">Quantum and Post-Quantum Cryptography<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&#8220;Quantum and Post-Quantum Cryptography&#8221; &#8212; Computer Science Blog @ HdM Stuttgart\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/02\/quantum-and-post-quantum-cryptography\/embed\/#?secret=tCv6NIk8e4#?secret=THwivJYD5t\" data-secret=\"THwivJYD5t\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">The Overall Impact on Cybersecurity<\/h3>\n\n\n\n<p>Looking at the overall cybersecurity and number of attacks, people are starting to worry. Being resistant to attacks that could be launched from quantum computers is a goal that need to be achieved in the near future. Or is it still rather distant in 10-20 years?&nbsp;<\/p>\n\n\n\n<p>Breakthroughs like the number of 127 qubits developed by IBM are suggesting that it might happen faster than expected. IBM already claims to have developed quantum-safe algorithms. Quantum Computers aren\u2019t strong enough to break current forms of encryption \u2013 yet. But the impact when they will just from the encryption perspective is profound. [8,14]<\/p>\n\n\n\n<p>Technology is expensive, research is complicated. The private sector will probably not see the inner workings of a quantum computer for a while \u2013 let alone use it. But thinking about what can happened and what can be applied to hinder possible security breaches is needed. [14]<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">From \u201cSafe\u201d to \u201cQuantum Safe\u201d<\/h3>\n\n\n\n<p>As new challenges arise in maintaining the CIA principles (confidentiality, integrity, authentication), society must take action to get on a common ground of awareness. One of the ways of making sure that everyone is on the same page, are some guidelines and a suite of tools helping being resilient to quantum computers. [15]<\/p>\n\n\n\n<blockquote class=\"wp-block-quote has-text-align-right is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cPlanning and preparing is critical. A new suite of tools resilient to quantum computers must be standardized and deployed in order to maintain the availability and reliability of cyber systems and protect confidentiality and integrity.\u201d<\/em><\/p>\n<cite>&#8211; ETSI, 9th ETSI\/IQC Quantum Safe Cryptography Event [15]<\/cite><\/blockquote>\n\n\n\n<p>ETSI is a European Standards Organization, which recognizes standards regarding telecommunications, broadcasting and other electronic communication networks and services. Having a global perspective, they have initiated a \u2018Quantum Safe Event\u2019 dedicated to plan an prepare for tools resilient to quantum computers and the transition into quantum computers when becoming more commercial. [15]<\/p>\n\n\n\n<p>IBM and NIST (National Institute of Standards and Technology) work together on quantum-safe cryptography protocol standards for cybersecurity, that are just the start for new standards involving industry. The express the importance of setting standards in a long path of adoption. Because the entire software industry need to change their software inventory and quantum-safe solutions. The expertise of building quantum computers and the need for change in encryption is the perfect combination for development. [8]<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Impact<\/h3>\n\n\n\n<p>Let\u2019s look at some positive and negative impacts of Quantum Computing regarding Cybersecurity in detail. [9,12,14]<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Positive Impacts<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Stronger Encryption: <\/strong>Encryption methods such as RSA and ECC rely on the difficulty of factoring large numbers or solving other mathematical problems. With quantum computing the encryption could be performed much easier in less time, making systems harder to break. This is also a negative impact at the same time.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Quantum Key Distribution (QKD)<\/strong>: Enhancing security through new technologies built on the principles of quantum mechanics, QKD opens up a secure communication channel. The security is in the idea of the quantum state changing when the communication is being eavesdropped. This could alert the sender and receiver, making a break in security obvious.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Optimization and Simulation<\/strong>: Quantum Computer could help solve complex optimization and simulation problems. These are relevant for various cybersecurity applications such as risk assessment, network security and threat modeling. Overall this could lead to improved defense strategies and more effective vulnerability assessments.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Negative Impacts<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Breaking Encryption<\/strong>: There is a high potential of breaking widely used encryption methods, making current cryptographic systems vulnerable. This leads to the compromise of sensitive data such as personal information (i.e. medical records), confidential communication (i.e. private messaging) and financial records. A new kind of cryptography therefore is needed.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cryptographic Vulnerabilities<\/strong>: Quantum computers may introduce new vulnerabilities. Cyber attackers with access to quantum computing power might exploit these vulnerabilities to breach systems in novel ways. Because these vulnerabilities are not known, no defense strategy or plan can be implemented.<br><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Threat to Blockchain<\/strong>: Many cryptocurrencies and blockchain technologies rely on cryptographics algorithms. Quantum computers could undermine the security of these systems, producing a need to develop new technologies.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Conclusion: What impact has Quantum Computing on Cybersecurity?<\/h3>\n\n\n\n<p>Bringing all input together, Quantum Computing can be summarized as <strong>ground-breaking<\/strong> for Cybersecurity. Quantum Technologies overall have a tremendous impact on the world in different disciplines from science to engineering.&nbsp;<\/p>\n\n\n\n<p>To really know the impact, it is important to be acquainted with this new technology and the concepts that lay beyond it. <strong>Research and market values rise<\/strong>, as well as many companies start to understand the importance of Quantum Computing because of the possible breach of security. The impact therefore gains more weight and is not to be underestimated.<\/p>\n\n\n\n<p>Important standards for <strong>Quantum-safe algorithms<\/strong> already have been formed, making the transition into a quantum-safe era existent. Preparation is being made, and the impact of the new technology is recognised. The implementation of new strategies and multiple layers of quantum-safe algorithms is needed.<\/p>\n\n\n\n<p>However, the threat for Cybersecurity is dependent on having the <em>Quantum Computing Power<\/em> itself. Although research is on top of their plans on how to realize the next supercomputer, most probably quantum computers still need a few decades to be built <strong>small, reliable and affordable for everyone<\/strong>. In reverse this means that any cyber criminal most likely will not have access to new security methods for quite some time. The impact to be a current issue for applications and personal usages therefore is less high. Regarding big companies, this might be an issue for the next five years, as they could afford the power.<\/p>\n\n\n\n<p>As a final statement, <strong>Quantum Computing has an impact on Cybersecurity<\/strong>. The question is: How long will it take to build affordable Quantum Computers opening up new kinds of security breaches for everyone \u2013 not just the big players, but the cyber criminals as well?<\/p>\n\n\n\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Outlook: The General Impact of Quantum Technologies<\/h3>\n\n\n\n<p>Quantum technologies not only play a role in computing, which this article has focused on. Other <strong>fields of usages<\/strong> are communication, imaging, AI and sensors in scientific and engineering fields like physics, chemistry, material science, biology, and information science. Especially medical research could vastly benefit from these technologies. Quantum sensors in example could detect new ways of brain functions. Quantum imaging could help in diagnostic procedures. And quantum computers themselves could help compute molecular chemistry. [3]<\/p>\n\n\n\n<p>The major impact of quantum science on technology, culture and our understanding of the world has resulted in publicity. It is becoming increasingly important to gain awareness as part of the society for this meaningful concept. Therefore, currently a resolution is prepared for the 2023 General Conference of the United Nations Educational, Scientific and Cultural Organization (UNESCO) and the 2023 General Assembly of the United Nations (UN), to proclaim 2025 as the <strong>International Year of Quantum Science and Technology<\/strong>. The year-long initiative would celebrate the profound impacts of quantum science. It suits the year of 2025, because it is 100 years after the initial development of quantum mechanics. [16]<\/p>\n\n\n\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>If you\u2019re interested in learning more about Quantum Science and Technology, this is a list of useful resources where to get started.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Series by Caltech University Experts on Quantum Science and Technology <a href=\"https:\/\/scienceexchange.caltech.edu\/topics\/quantum-science-explained\">https:\/\/scienceexchange.caltech.edu\/topics\/quantum-science-explained<\/a>&nbsp;<\/li>\n\n\n\n<li>Introduction to A New Quantum Revolution by NIST <br><a href=\"https:\/\/www.nist.gov\/physics\/introduction-new-quantum-revolution\">https:\/\/www.nist.gov\/physics\/introduction-new-quantum-revolution<\/a><\/li>\n\n\n\n<li>For trying out programming (first circuits) with Quantum Computers, IBM has officially launched a IBM Quantum channel, which can be accessed by the Qiskit package <a href=\"https:\/\/qiskit.org\/\">https:\/\/qiskit.org\/<\/a> and <a href=\"https:\/\/quantum-computing.ibm.com\/\">https:\/\/quantum-computing.ibm.com\/<\/a><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Literature<\/h3>\n\n\n\n<p>[1] R. P. Feynman, \u201cSimulating physics with computers,\u201d International Journal of Theoretical Physics, vol. 21, no. 6\u20137, pp. 467\u2013488, Jun. 1982, doi: https:\/\/doi.org\/10.1007\/bf02650179.<\/p>\n\n\n\n<p>[2] Robin Materese, \u201cIntroduction: A New Quantum Revolution,\u201d NIST, Mar. 21, 2018. https:\/\/www.nist.gov\/physics\/introduction-new-quantum-revolution (accessed Aug. 31, 2023).<\/p>\n\n\n\n<p>[3] \u201cQuantum technologies,\u201d Fraunhofer-Gesellschaft, Apr. 01, 2019. https:\/\/www.fraunhofer.de\/en\/research\/current-research\/quantum-technologies.html (accessed Aug. 08, 2023).<\/p>\n\n\n\n<p>[4] R. Jindal, \u201cFuture With Quantum Computers,\u201d www.c-sharpcorner.com, 2023. https:\/\/www.c-sharpcorner.com\/article\/future-with-quantum-computers\/ (accessed Aug. 31, 2023).<\/p>\n\n\n\n<p>[5] J. Goldstein and C. Monroe, \u201cQuantum Computers Could Change Everything (Podcast),\u201d Spotify, Aug. 03, 2023. https:\/\/open.spotify.com\/episode\/2q7smFVzbH8QZtgIvzsPdg?si=FWxeIAusSvi54IRgPUVRng (accessed Aug. 08, 2023).<\/p>\n\n\n\n<p>[6] IBM, \u201cIBM Quantum Computing | IBM,\u201d www.ibm.com, Oct. 01, 2015. https:\/\/www.ibm.com\/quantum (accessed Aug. 08, 2023).<\/p>\n\n\n\n<p>[7] M. Brooks, \u201cIBM wants to build a 100,000-qubit quantum computer,\u201d MIT Technology Review, May 25, 202AD. https:\/\/www.technologyreview.com\/2023\/05\/25\/1073606\/ibm-wants-to-build-a-100000-qubit-quantum-computer\/ (accessed Aug. 31, 2023).<\/p>\n\n\n\n<p>[8] \u201cNIST\u2019s quantum-safe standards,\u201d IBM Research Blog, Feb. 09, 2021. https:\/\/research.ibm.com\/blog\/nist-quantum-safe-protocols (accessed Aug. 08, 2023).<\/p>\n\n\n\n<p>[9] IBM, \u201cWhat is Quantum Computing? | IBM,\u201d www.ibm.com, 2022. https:\/\/www.ibm.com\/topics\/quantum-computing (accessed Aug. 08, 2023).<\/p>\n\n\n\n<p>[10] \u201cLaser Cooling (Be+) | ALPHA Experiment,\u201d alpha.web.cern.ch, Aug. 2020. https:\/\/alpha.web.cern.ch\/science\/laser-cooling-be (accessed Aug. 31, 2023).<\/p>\n\n\n\n<p>[11] S. Dahmen-Lhuissier, \u201cQuantum-Safe Cryptography (QSC),\u201d ETSI, 2023. https:\/\/www.etsi.org\/technologies\/quantum-safe-cryptography (accessed Aug. 08, 2023).<\/p>\n\n\n\n<p>[12] \u201cQuantum computing and cybersecurity: How to capitalize on opportunities and sidestep risks,\u201d IBM, Jul. 2018. https:\/\/www.ibm.com\/thought-leadership\/institute-business-value\/en-us\/report\/quantumsecurity (accessed Aug. 08, 2023).<\/p>\n\n\n\n<p>[13] T. Alsop, \u201cQuantum security market size 2021-2030,\u201d Statista, Jun. 05, 2023. https:\/\/www.statista.com\/statistics\/1332857\/quantum-security-market-revenue\/ (accessed Aug. 10, 2023).<\/p>\n\n\n\n<p>[14] \u201cThe Quantum Computing Impact on Cybersecurity,\u201d QuantumXC, Jan. 24, 2020. https:\/\/quantumxc.com\/blog\/quantum-computing-impact-on-cybersecurity\/ (accessed Aug. 08, 2023).<\/p>\n\n\n\n<p>[15] S. Dahmen-Lhuissier, \u201c9th ETSI\/IQC Quantum Safe Cryptography Event,\u201d ETSI, 2023. https:\/\/www.etsi.org\/events\/2117-2023-02-9th-etsi-iqc-quantum-safe-cryptography-workshop (accessed Aug. 08, 2023).<\/p>\n\n\n\n<p>[16] \u201cInternational Year of Quantum Science and Technology,\u201d quantum2025.org, 2023. https:\/\/quantum2025.org\/ (accessed Aug. 08, 2023).<\/p>\n\n\n\n<p>[17] \u201cIBM Q Dilution Refrigerator by Graham Carlow,\u201d IBM Newsroom | Image Gallery, 2023. https:\/\/newsroom.ibm.com\/media-quantum-innovation?keywords=quantum&amp;l=100 (accessed Aug. 08, 2023).<\/p>\n\n\n\n<p>[18] \u201cQubit vs bit. States of classical bit compare to quantum bit superposition, Vector concept Stock-Vektorgrafik,\u201d Adobe Stock. https:\/\/stock.adobe.com\/de\/images\/qubit-vs-bit-states-of-classical-bit-compare-to-quantum-bit-superposition-vector-concept\/469735494 (accessed Aug. 31, 2023).<\/p>\n\n\n\n<p>[19] P. Patel, \u201cQubit,\u201d Devopedia, Jan. 05, 2022. https:\/\/devopedia.org\/qubit (accessed Aug. 31, 2023).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Pictures<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Picture 1 | Quantum Technologies<\/li>\n\n\n\n<li>Picture 2 | Difference between Bit and Qubit, adapted by [18]<\/li>\n\n\n\n<li>Picture 3 | Multiple States of a Qubit, adapted by [19]&nbsp;<\/li>\n\n\n\n<li>Picture 4 | Liquid Helium Dewars for Physical Cooling, Picture by Nadine Weber<\/li>\n\n\n\n<li>Title Picture | First Quantum Computer in Europe by IBM [17]<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The future has arrived: Welcome to the second quantum revolution. But what does this mean for Cybersecurity?<\/p>\n","protected":false},"author":1133,"featured_media":25580,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1,664,26],"tags":[961,171,960,959],"ppma_author":[904],"class_list":["post-25278","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-allgemein","category-ethics","category-secure-systems","tag-cybersecurity","tag-quantum-computing","tag-quantum-cryptography","tag-quantum-technology"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/quantum_computer_ibm.png","jetpack-related-posts":[{"id":26307,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2024\/07\/26\/importance-and-impact-of-quantum-safe-encryption-for-enterprises\/","url_meta":{"origin":25278,"position":0},"title":"Importance and Impact of Quantum Safe Encryption for Enterprises","author":"Aleksandra Gidionova","date":"26. July 2024","format":false,"excerpt":"More than forty years ago Richard Feynman\u2019s paper \u201cSimulating Physics with Computers\u201d was published\u00a0[1], laying the foundational vision for what we now recognize as quantum computing. Since then, quantum computing has become a fascinating and fast-expanding\u00a0field at the forefront of technological innovation. With the potential to revolutionize computing power and\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/problem.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/problem.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/problem.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/problem.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":3811,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/02\/quantum-and-post-quantum-cryptography\/","url_meta":{"origin":25278,"position":1},"title":"Quantum and Post-Quantum Cryptography","author":"Oliver Hummel","date":"2. August 2018","format":false,"excerpt":"In a world where political activists and dissidents get persecuted by authoritarian governments, strong cryptography is more necessary than ever. But the general public benefits from it as well. Identity theft, banking fraud and cyber bullying can happen to anybody. The most effective protection is to not make sensitive material\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"BB84 Protocol key generation","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":27524,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2025\/02\/28\/der-einfluss-von-quantencomputing-auf-die-unternehmens-it-potenzial-und-aktuelle-limitationen\/","url_meta":{"origin":25278,"position":2},"title":"Der Einfluss von Quantencomputing auf die Unternehmens-IT: Potenzial und aktuelle Limitationen","author":"Joel Starkov","date":"28. February 2025","format":false,"excerpt":"Anmerkung:\u00a0Dieser Blogpost wurde f\u00fcr das Modul Enterprise IT (113601a) verfasst.Aus Gr\u00fcnden der besseren Lesbarkeit wird in dieser Arbeit auf eine geschlechtsneutrale Differenzierung verzichtet. S\u00e4mtliche Personenbezeichnungen gelten gleicherma\u00dfen f\u00fcr alle Geschlechter. Kurzfassung Quantencomputing ist eine aufstrebende Technologie, die die Prinzipien der Quantenmechanik verwendet und damit neue M\u00f6glichkeiten f\u00fcr die Informationsverarbeitung bietet.\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":24065,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/06\/06\/are-grids-dead\/","url_meta":{"origin":25278,"position":3},"title":"Grids are Dead &#8211; or are they?","author":"Nadine Weber","date":"6. June 2023","format":false,"excerpt":"Huge datasets \u2013 not enough computing power. What to do? Don\u2019t worry! The supercomputer concept Grid Computing is here to save you! With the rise of cloud computing, fewer companies decide upon using Grid Computing \u2013 and even less know what the latter really is or how it can be\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"Colourful Grid Structure","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/02\/grid_structure.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/02\/grid_structure.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/02\/grid_structure.jpeg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":24051,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/02\/27\/fog-computing-solving-the-limitations-of-cloud-and-edge-computing\/","url_meta":{"origin":25278,"position":4},"title":"Fog Computing: Solving the limitations of Cloud and Edge Computing","author":"Andreas Nicklaus","date":"27. February 2023","format":false,"excerpt":"Fog computing offers a compromise between cloud and edge computing for real-time, scalable data analysis. Ideal for regional applications and IoT. However, authentication and privacy issues must be addressed.","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/edge-computing-diagram-1024x512.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/edge-computing-diagram-1024x512.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/edge-computing-diagram-1024x512.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/edge-computing-diagram-1024x512.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":3864,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/07\/server-less-computing-vs-security\/","url_meta":{"origin":25278,"position":5},"title":"Server \u201cless\u201d Computing vs. Security","author":"Merve Uzun","date":"7. August 2018","format":false,"excerpt":"Summary about Serverless Computing with Security aspects.","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/Funktionsweise-300x98.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":904,"user_id":1133,"is_guest":0,"slug":"nadine_weber","display_name":"Nadine Weber","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/e3e4f9c8c8e3d36033c6946d8f9bc74bdb3e14f7741c5abae82b2d7c61232118?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/25278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/1133"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=25278"}],"version-history":[{"count":20,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/25278\/revisions"}],"predecessor-version":[{"id":26606,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/25278\/revisions\/26606"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media\/25580"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=25278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=25278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=25278"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=25278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}