{"id":26307,"date":"2024-07-26T20:14:40","date_gmt":"2024-07-26T18:14:40","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=26307"},"modified":"2025-10-15T11:45:33","modified_gmt":"2025-10-15T09:45:33","slug":"importance-and-impact-of-quantum-safe-encryption-for-enterprises","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2024\/07\/26\/importance-and-impact-of-quantum-safe-encryption-for-enterprises\/","title":{"rendered":"Importance and Impact of Quantum Safe Encryption for Enterprises"},"content":{"rendered":"\n<p>More than forty years ago Richard Feynman\u2019s paper \u201cSimulating Physics with Computers\u201d was published&nbsp;[1], laying the foundational vision for what we now recognize as quantum computing. Since then, quantum computing has become a fascinating and fast-expanding&nbsp;field at the forefront of technological innovation. With the potential to revolutionize computing power and solve complicated issues that traditional computers cannot currently answer, quantum computing has captured the interest of researchers, scientists, and industry leaders.<\/p>\n\n\n\n<p>The leap in computational power besides many new opportunities brings with it the potential to break current encryption methods, threatening the confidentiality and integrity of sensitive data. As a consequence, the need for quantum-safe encryption \u2013 cryptographic methods designed to withstand the capabilities of quantum algorithms \u2013 has become a pressing matter for enterprises globally.<\/p>\n\n\n\n<p>This article explores the importance and impact of quantum-safe encryption for enterprises focusing on the main considerations that businesses must make to future-proof their security infrastructures. As a basis for this discussion, the key properties of quantum computing are introduced and a summary of the effects of quantum computing on digital security is given.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. Understanding quantum computing through comparison to classical computing<\/h2>\n\n\n\n<p>Quantum computing is an interdisciplinary field combining aspects of quantum mechanics, quantum information theory and computer science.<\/p>\n\n\n\n<p>A quantum computer is defined as a device that leverages the specific properties described by quantum mechanics to perform computation&nbsp;[2, p. 3]. Unlike classical computers, which also function under the principles of quantum mechanics, quantum computers utilize the unique quantum states and phenomena to perform computations more efficiently. This enables them to solve complex problems for which classical systems lack capability. Such properties of quantum states are superposition, entanglement and interference.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1.1 Qubits and superposition<\/h3>\n\n\n\n<p>According to Nielsen and Chuang [3, p. 13], a <em>quantum bit (qubit)<\/em>, similarly to a classical bit, possesses a state, which can be either 0 or 1. Those two states represented as |0\u27e9 and |1\u27e9 in quantum computing are known as computational basis states. However, before measurement a qubit can also exist in linear combinations of multiple states, known as <em>superposition<\/em>:<\/p>\n\n\n\n<p class=\"has-text-align-center has-large-font-size\">|\u03c8\u27e9=\u03b1|0\u27e9+ \u03b2|1\u27e9<\/p>\n\n\n\n<p>The \u201e| \u27e9 \u201c notations are called Dirac notation. The coefficients \u03b1 and \u03b2 are complex numbers, but for practical purposes, they can be thought of as real numbers. When a qubit gets measured, the result we get is either 0 with probability |\u03b1|<sup>2<\/sup> or 1 with probability |\u03b2|<sup>2<\/sup>.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/qubit-superposition.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"483\" data-attachment-id=\"26393\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2024\/07\/26\/importance-and-impact-of-quantum-safe-encryption-for-enterprises\/qubit-superposition\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/qubit-superposition.jpg\" data-orig-size=\"1220,575\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"qubit-superposition\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/qubit-superposition-1024x483.jpg\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/qubit-superposition-1024x483.jpg\" alt=\"\" class=\"wp-image-26393\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/qubit-superposition-1024x483.jpg 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/qubit-superposition-300x141.jpg 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/qubit-superposition-768x362.jpg 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/qubit-superposition.jpg 1220w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Image 1 \u2013 Bit vs. Qubit. Adapted from [4]<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">1.2 Entanglement<\/h3>\n\n\n\n<p>A particular form of quantum superposition where two systems exhibit a correlation in their measurement outcomes that surpasses what can be achieved by classical correlations is called <em>entanglement<\/em> [2, p. 8]. In this special case the states of the two systems become inseparable, and the measurement of one system directly affects the state of the other.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/Entaglement.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"678\" data-attachment-id=\"26394\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2024\/07\/26\/importance-and-impact-of-quantum-safe-encryption-for-enterprises\/entaglement\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/Entaglement.jpg\" data-orig-size=\"1047,693\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Entaglement\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/Entaglement-1024x678.jpg\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/Entaglement-1024x678.jpg\" alt=\"\" class=\"wp-image-26394\" style=\"width:626px;height:auto\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/Entaglement-1024x678.jpg 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/Entaglement-300x199.jpg 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/Entaglement-768x508.jpg 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/Entaglement.jpg 1047w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Image 2 \u2013 Entanglement. Adapted from [5]<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">1.3 Interference<\/h3>\n\n\n\n<p>Interference is a unique quantum phenomenon arising from the wave-like nature of quantum states, where each state has a complex coefficient or amplitude. It allows for the manipulation of probabilities to enhance the likelihood of desired outcomes and suppress unwanted ones. The term refers to the phenomenon where the probabilities of different outcomes can increase or decrease due to the relative phases of the quantum states involved.<\/p>\n\n\n\n<p>When we have a superposition of quantum states, the relative phases (or angles) between these states determine whether the amplitudes add up constructively or destructively:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Constructive interference<\/strong> occurs when the relative phases of the states cause their amplitudes to reinforce each other, leading to a higher probability of a certain outcome.<\/li>\n\n\n\n<li><strong>Destructive interference<\/strong> happens when the relative phases cause the amplitudes to cancel each other out, leading to a lower probability of a certain outcome. [2, pp. 26-27].<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/interferance-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"638\" data-attachment-id=\"26400\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2024\/07\/26\/importance-and-impact-of-quantum-safe-encryption-for-enterprises\/interferance-1\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/interferance-1.jpg\" data-orig-size=\"1061,661\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"interferance-1\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/interferance-1-1024x638.jpg\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/interferance-1-1024x638.jpg\" alt=\"\" class=\"wp-image-26400\" style=\"width:590px;height:auto\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/interferance-1-1024x638.jpg 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/interferance-1-300x187.jpg 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/interferance-1-768x478.jpg 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/interferance-1.jpg 1061w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Image 3 \u2013 Constructive vs. destructive interference. Adapted from [6]<\/figcaption><\/figure>\n\n\n\n<p>By harnessing the collective properties of quantum states, quantum systems can process and manipulate vast amounts of information simultaneously. For example, in classical computing the number of possible states grows linearly with the number of bits, while in quantum computing, the principle of superposition allows the number of states to grow exponentially with the number of qubits. This exponential growth means that the number of possible states that can be investigated at the same time increases dramatically, providing a remarkable advantage over classical computing in domains such as cryptography.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2. Implications of quantum computing for digital security<\/h2>\n\n\n\n<p>The introduction of quantum computing has created both new possibilities and challenges for digital security. Many of the widely-used cryptography mechanisms today rely on the assumption that certain mathematical problems are computationally hard to solve. That assumption was made with only classical computers in mind. The introduction of quantum computers fundamentally challenged our understanding of digital security, creating both new possibilities and difficulties for the field.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2.1 Shor\u2019s algorithm<\/h3>\n\n\n\n<p>In 1994 Peter Shor introduced an algorithm for factoring large numbers and finding discrete logarithms on a quantum computer&nbsp;[7]. The ability to solve those two difficult classical computers problems renders widely used in public-key cryptography algorithms obsolete. That means that attackers could potentially forge digital signatures, compromise encrypted data, and intercept communications.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2.2 Grover\u2019s algorithm<\/h3>\n\n\n\n<p>In 1996 Lov Grover introduced an algorithm that offers a quadratic speedup on unstructured search problems\u00a0[8]. That discovery poses a potential threat to symmetric cryptographic algorithms and hash functions by significantly reducing the time complexity of brute-force search attacks. While the National Institute of Standards and Technology (NIST) finds it unclear, whether Grover&#8217;s algorithm will ever be practically relevant, they still recommend doubling of key sizes for symmetric key systems to preserve security [9].<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/table.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"770\" data-attachment-id=\"26396\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2024\/07\/26\/importance-and-impact-of-quantum-safe-encryption-for-enterprises\/table\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/table.jpg\" data-orig-size=\"1611,1211\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"table\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/table-1024x770.jpg\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/table-1024x770.jpg\" alt=\"\" class=\"wp-image-26396\" style=\"width:647px;height:auto\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/table-1024x770.jpg 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/table-300x226.jpg 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/table-768x577.jpg 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/table-1536x1155.jpg 1536w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/table.jpg 1611w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Table 1 &#8211; Impact of Quantum Computing on Common Cryptographic Algorithms. Adapted from [9]<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">2.3 Quantum-safe encryption<\/h3>\n\n\n\n<p>To address the challenge to cryptography that quantum computing poses, quantum-safe encryption algorithms, also known as post-quantum cryptography (PQC) algorithms are being developed. Those algorithms are resistant to attacks both from classical and quantum computers. PQC includes not only quantum algorithms, that is algorithms that use the principles of quantum mechanics, such as the transmission protocols <em>BB84 <\/em>for Quantum Key Distribution [10], but also classical encryption algorithms that are believed to be quantum safe. Examples of the latter are the lattice-based <em>CRYSTALS-Dilithium<\/em> digital signature algorithm and the code-based <em>Classic McEliece<\/em> public-key encryption algorithm. The German Federal Office for Information Security (BSI) recommends also hybrid solutions where the classical cryptographic algorithms are being enhanced by quantum cryptography (for more information see [11]).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. The Road to a Useful Error-Corrected Quantum Computer<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">3.1 The NISQ era<\/h3>\n\n\n\n<p>In his article \u201cQuantum Computing in the NISQ era and beyond\u201d [12] John Preskill states, that the core of what makes advancements in quantum computing so hard is that it is impossible to observe a quantum system without causing an uncontrollable disturbance in it. He also introduces a name for the era of quantum advancement we are entering &#8211; Noisy Intermediate-Scale Quantum (NISQ):<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>Here \u201cintermediate scale\u201d refers to the size of quantum computers which will be available in the next few years, with a number of qubits ranging from 50 to a few hundred. 50 qubits is a significant milestone, because that\u2019s beyond what can be simulated by brute force using the most powerful existing digital supercomputers. \u201cNoisy\u201d emphasizes that we\u2019ll have imperfect control over those qubits; the noise will place serious limitations on what quantum devices can achieve in the near term.<\/em><\/p>\n<cite>John Preskill [12]<\/cite><\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">3.2 A two-dimensional horse race<\/h3>\n\n\n\n<p>Hidary [2, pp. 65-66] compares the NISQ era to the early stages of classical computing in the 1940s and 1950s and explains that to achieve a fully error-corrected quantum computer, it is necessary to reach a scale of more than 10<sup>6<\/sup> qubits. This perspective aligns with John Martinis&#8217; analogy from his presentation at the HPC User Forum [13], where he describes quantum computing as a \u201ctwo-dimensional horse race\u201d. Martinis emphasizes that progress in the field should be measured with having both quantity (number of qubits) and quality (limiting error rate) in mind.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/horse-race.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"732\" height=\"364\" data-attachment-id=\"26397\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2024\/07\/26\/importance-and-impact-of-quantum-safe-encryption-for-enterprises\/horse-race\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/horse-race.jpg\" data-orig-size=\"732,364\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"horse-race\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/horse-race.jpg\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/horse-race.jpg\" alt=\"\" class=\"wp-image-26397\" style=\"width:762px;height:auto\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/horse-race.jpg 732w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/horse-race-300x149.jpg 300w\" sizes=\"auto, (max-width: 732px) 100vw, 732px\" \/><\/a><figcaption class=\"wp-element-caption\">Image 4 &#8211; Quantum computing as a \u201ctwo-dimensional horse race\u201d. &nbsp;Adapted from [13].<\/figcaption><\/figure>\n\n\n\n<p>To better understand how far we are currently on the way to a useful error corrected QC, we can compare the roadmaps of some of the leading companies in the field of quantum computing \u2013 IBM and Google:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/IBM-Google-roadmap.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"789\" data-attachment-id=\"26398\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2024\/07\/26\/importance-and-impact-of-quantum-safe-encryption-for-enterprises\/ibm-google-roadmap\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/IBM-Google-roadmap.jpg\" data-orig-size=\"1042,803\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"IBM-Google-roadmap\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/IBM-Google-roadmap-1024x789.jpg\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/IBM-Google-roadmap-1024x789.jpg\" alt=\"\" class=\"wp-image-26398\" style=\"width:854px;height:auto\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/IBM-Google-roadmap-1024x789.jpg 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/IBM-Google-roadmap-300x231.jpg 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/IBM-Google-roadmap-768x592.jpg 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/IBM-Google-roadmap.jpg 1042w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">Image 5 &#8211; Comparison of the quantum roadmaps of IBM (in blue) and Google (in red). Adapted from [14] and [15]<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">4. Importance of Quantum Safe Encryption for Enterprises<\/h2>\n\n\n\n<p>Although looking at the roadmaps of quantum leaders it might be easy to speculate that a quantum computer will not be able to reach 10<sup>6<\/sup> qubits any time soon, there are multitude of reasons for enterprises to invest in their quantum readiness today.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4.1  Security risks<\/h3>\n\n\n\n<p><br>Since the security risks that quantum computing poses seem to be a problem for the distant future, people might naturally want to delay taking action in order to focus on other urgent matters. What should be considered though, is whether or not we will be ready for an era with quantum computers. Based on Michele Mosca proposal [16], the answer seems to be highly personalized for each business case:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/problem.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"957\" height=\"392\" data-attachment-id=\"26399\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2024\/07\/26\/importance-and-impact-of-quantum-safe-encryption-for-enterprises\/problem\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/problem.jpg\" data-orig-size=\"957,392\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"problem\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/problem.jpg\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/problem.jpg\" alt=\"\" class=\"wp-image-26399\" style=\"width:815px;height:auto\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/problem.jpg 957w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/problem-300x123.jpg 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/problem-768x315.jpg 768w\" sizes=\"auto, (max-width: 957px) 100vw, 957px\" \/><\/a><figcaption class=\"wp-element-caption\">Image 6 \u2013 Measuring the possibility to delay quantum action. Adapted from [16]<\/figcaption><\/figure>\n\n\n\n<p>To better illustrate this, we can use health information as an example. For personal health information, we typically need long-term security, possibly up to 100 years, to ensure patient confidentiality over an extended period (<em>x=100<\/em>). Migrating to quantum-safe cryptographic tools in a healthcare system might take a considerable amount of time due to the complexity and regulatory requirements involved. Let&#8217;s assume this migration time is around 20 years (<em>y=20<\/em>). The collapse time (<em>z<\/em>) is the estimated period before a quantum computer or another method can break the currently deployed public-key cryptography tools. <\/p>\n\n\n\n<p>That means that in order to guarantee the protection of personal health information against quantum attacks, governments have to be sure that a quantum computer will not be able to break the deployed public-key cryptography tools in the next 120 years. Given the rapid advancements in quantum computing, risking inaction and being wrong in this specific case is something we cannot afford. The consequences of compromised health information could be severe, leading to breaches of patient confidentiality, identity theft, and other security threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4.2 Future-Proofing Security<\/h3>\n\n\n\n<p>As discussed in section 2, with the advancement of quantum computing traditional cryptographic methods like RSA and ECC will become vulnerable to quantum attacks. Sensitive data with long-term confidentiality needs, such as financial records, personal data, and intellectual property, must be protected against <em>future<\/em> quantum decryption capabilities already <em>today<\/em>. That is due to the \u201cHarvest now, decrypt later&#8221; strategy used by cyber criminals, where they intercept and store encrypted data with the intention of decrypting it later when quantum computers that are capable of breaking current encryption methods become available to them. In order to protect their valuable information against such future threats, companies need to start implementing quantum-safe encryption now.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4.3 Compliance<\/h3>\n\n\n\n<p>Organizations around the world are already developing and promoting cryptographic standards and best practices. For example, since 2016, the National Institute of Standards and Technology (NIST) in the United States has been conducting a competition to identify and standardize quantum-resistant cryptographic algorithms (for more information see&nbsp;[17]), while in 2022 the Federal Office for Information Security (BSI) in Germany released guidelines for migrating to quantum-safe cryptography (for more information see [11]).<\/p>\n\n\n\n<p>Although these guidelines and standards are not legally binding on their own, they frequently influence regulatory frameworks and are incorporated into legal requirements and policies. For example, In May 2022 the White House issued a National Security Memorandum [18], according to which the release of quantum-resistant cryptographic algorithm standards by NIST will play a crucial part in the roadmap for transition to quantum-resistant systems of the country. Quantum-safe encryption will be required for both the public and private sector. That means that staying informed about and adopting new quantum-safe encryption standards helps enterprises ensure their cryptographic practices are robust and compliant with future regulations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4.4 Maintaining Trust<\/h3>\n\n\n\n<p>For industries like IT, where customer confidence directly correlates with business success, maintaining trust is key. When organizations put efforts into adhering to guidelines and standards for quantum-safe encryption, they exhibit a commitment to staying ahead of cybersecurity challenges. By regularly updating their practices in response to evolving research, businesses uphold their position as trustworthy entities. That in turn leads to an increase in customer loyalty and a boost of the business\u2019s reputation in the market.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4.5 Competitive Advantage<\/h3>\n\n\n\n<p>Early adoption of quantum-safe encryption helps organizations position themselves as leaders in cybersecurity and sets them apart from competitors. For instance, Zoom\u2019s rollout of post-quantum end-to-end encryption (E2EE) [19] demonstrates a commitment to robust security practices and increases confidence among stakeholders, including customers and partners.<\/p>\n\n\n\n<p>Furthermore, investing in cutting-edge security technologies, like post-quantum cryptography, positions enterprises as pioneers of innovation. That way organizations can attract strategic business partnerships and investments, strengthening their market position and fostering growth opportunities. &nbsp;The collaborative efforts of IBM and industry leaders in telecommunications [20] illustrate their collective commitment towards quantum-safe networks and further emphasize their position as industry leaders.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">5. Impact of Quantum Safe Encryption for Enterprises<\/h2>\n\n\n\n<p>As we already established, quantum safe encryption enhances data security for enterprises by strengthening the resilience against both classical and quantum threats. Beyond this improvement of security, implementing quantum safe encryption will also have additional impacts on businesses.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5.1 Crypto-agility<\/h3>\n\n\n\n<p>As the Post-Quantum Cryptography (PQC) competition announced by NIST is nearing its end, enterprises are in a difficult situation. They must choose between new, unproven encryption algorithms and old, reliable ones that might become obsolete soon. Many of the risks, that the new algorithms bring, might still be unknown, as shown by one finalist of the competition being easily broken with regular computers in 2022 (for more information see&nbsp;[21]). That means that early adopters must be prepared to change or undo updates if needed.<\/p>\n\n\n\n<p>This uncertainty makes <em>crypto-agility<\/em> a necessity. Crypto-agility is a strategy to be flexible and quickly update protocols, keys, and algorithms. It involves using tools and technologies that can easily switch between cryptographic technologies, ensuring that systems built today can accommodate future changes. Companies must focus on crypto-agility to protect their systems and ensure they can continue to operate without interruption as cryptographic standards evolve and new threats like quantum computing appear.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5.2 Technical and Operational Changes<\/h3>\n\n\n\n<p>Some already existing systems might not have been created with crypto-agility in mind. In such cases, implementing quantum-safe encryption might require overcoming common challenges such as outdated algorithms and dependency on long-life data secured by obsolete schemes. Those challenges can make updating cryptographic systems difficult and may require custom solutions. That is why enterprises need a well-planned migration strategy to transition smoothly from classical to quantum safe encryption without disrupting operations.<\/p>\n\n\n\n<p>Another major challenge is that many organizations lack awareness of their cryptographic assets. For instance, 58% of enterprises do not know the number of keys and certificates they use&nbsp;[22, p. 12]. The lack of centralized crypto-management strategies in many organizations also makes it difficult to track, manage, and secure cryptographic keys and certificates. This highlights a pressing need for companies to take comprehensive inventories of their cryptographic keys and to streamline current cryptographic infrastructures. Automation in assessing and evaluating cryptographic systems can aid in prioritizing and executing targeted migrations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5.3 Financial Implications<\/h3>\n\n\n\n<p>Transitioning to quantum-safe encryption entails significant initial financial investment for new technology, staff training, and possibly hiring specialized personnel. However, this investment can lead to long-term savings by preventing costly data breaches and avoiding regulatory fines. Despite those benefits, only 30% of organizations are currently budgeting for post-quantum cryptography (PQC) readiness, and 51% cite a lack of resources as the primary barrier to implementation [22, p. 7].<\/p>\n\n\n\n<p>The lack of budget is closely connected with the lack of awareness in leadership about the significant challenges quantum computing poses to current encryption methods. In their 2023 quantum readiness report Ponemon Institute stated, that nearly half of respondents to their surveys (49%) indicate that their leaders are only somewhat aware or not aware of the security implications of quantum computing [22, p. 3]. That means that there is a further need for teams to highlight the risks and potential financial impacts of quantum threats, demonstrating the urgent need for proactive investment in quantum-safe encryption to protect the enterprise&#8217;s future.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">6. Conclusion<\/h2>\n\n\n\n<p>Driven by its foundational principles of qubits, superposition, and entanglement, quantum computing represents a revolutionary change in technology with profound implications for digital security. The capabilities of algorithms like Shor&#8217;s and Grover&#8217;s highlight the challenges quantum computing will bring and emphasize the urgency of transitioning to quantum-safe encryption methods.<\/p>\n\n\n\n<p>Even though quantum computing is still in its early stages, it is important for enterprises to already start preparing for the challenges this technology will present. This proactive approach will help future-proof their security infrastructures, ensure compliance, maintain trust, and secure a competitive advantage. The transition to quantum-safe encryption will require organizations to ensure crypto-agility, to address technical and operational challenges, and to understand the importance and the financial implications of the transition itself.<\/p>\n\n\n\n<p>Leadership awareness and investment in quantum-safe strategies will be crucial in protecting enterprise data against the looming threat that quantum poses. Moreover, these measures will enable businesses to capitalize on the future benefits of quantum technology without compromising security. Ultimately, proactive investment in quantum-safe encryption will empower organizations to secure their data today and thrive in the quantum-driven future.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">References<\/h2>\n\n\n\n<p>[1] R. Feynman, &#8220;Simulating physics with computers,&#8221; International Journal of Theoretical Physics, no. 21, p. pages467\u2013488, 1982.<br>[2] J. D. Hidary, Quantum Computing: An Applied Approach, 2nd ed., Palo Alto, CA, USA: Springer Cham, 2021.<br>[3] M. A. a. C. I. L. Nielsen, Quantum Computation and Quantum Information: 10th Anniversary Edition, 10th ed., Cambridge University Press, 2010.<br>[4] S. Golestan, M. Habibi, S. Mousazadeh Mousavi, J. Guerrero and J. Vasquez, &#8220;Quantum computation in power systems: An overview of recent advances,&#8221; Energy Reports, vol. 9, no. 2352-4847, pp. 584-596, 2023.<br>[5] &#8220;Quantum Entanglement,&#8221; The Quantum Atlas, [Online]. Available: <a href=\"https:\/\/quantumatlas.umd.edu\/entry\/entanglement\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/quantumatlas.umd.edu\/entry\/entanglement\/<\/a>. [Accessed 23 July 2024].<br>[6] A. Giani and Z. Eldredge, &#8220;Quantum Computing Opportunities in Renewable Energy,&#8221; SN Computer Science, vol. 2, no. 5, 2021.<br>[7] P. Shor, &#8220;Algorithms for quantum computation: discrete logarithms and factoring,&#8221; in Proceedings 35th Annual Symposium on Foundations of Computer Science, IEEE, 1994, pp. 124-134.<br>[8] L. K. Grover, &#8220;A fast quantum mechanical algorithm for database search,&#8221; in Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, Philadelphia, Pennsylvania: Association for Computing Machinery, 1996, p. 212\u2013219.<br>[9] L. Chen, S. Jordan, Y.-K. Liu, D. Moody, R. Peralta, R. Perlner and D. Smith-Tone, &#8220;Report on Post-Quantum Cryptography,&#8221; National Institute of Standards and Technology , 2016.<br>[10] R. Ciesla, Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography, Apress Berkeley, 2020.<br>[11] F. O. f. I. S. (BSI), &#8220;Quantum-safe cryptography \u2013 fundamentals, current developments and recommendations,&#8221; Federal Office for Information Security (BSI), Bonn, 2022.<br>[12] J. Preskill, &#8220;Quantum Computing in the NISQ era and beyond,&#8221; Quantum, vol. 2, p. 79, 2018.<br>[13] J. Martinis, &#8220;Quantum Computing and Quantum Supremacy,&#8221; 22 April 2018. [Online]. Available: <a href=\"https:\/\/www.youtube.com\/watch?v=nycwc-wXuuw&amp;ab_channel=InsideHPCReport\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.youtube.com\/watch?v=nycwc-wXuuw&amp;ab_channel=InsideHPCReport<\/a>. [Accessed 19 July 2024].<br>[14] &#8220;Quantum technology,&#8221; IBM, [Online]. Available: <a href=\"https:\/\/www.ibm.com\/quantum\/technology\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.ibm.com\/quantum\/technology<\/a>. [Accessed 26 July 2024].<br>[15] &#8220;Explore,&#8221; Google, [Online]. Available: <a href=\"https:\/\/quantumai.google\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/quantumai.google\/<\/a>. [Accessed 26 July 2024].<br>[16] M. Mosca, &#8220;Cybersecurity in an Era with Quantum Computers: Will We Be Ready?,&#8221; IEEE Security &amp; Privacy, vol. 16, no. 5, pp. 38-41, 2018.<br>[17] &#8220;Post-Quantum Cryptography,&#8221; National Institute of Standards and Technology, [Online]. Available: <a href=\"https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography<\/a>. [Accessed 19 July 2024].<br>[18] J. R. Biden, &#8220;National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems,&#8221; 2 May 2022. [Online]. Available: <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2022\/05\/04\/national-security-memorandum-on-promoting-united-states-leadership-in-quantum-computing-while-mitigating-risks-to-vulnerable-cryptographic-systems\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2022\/05\/04\/national-security-memorandum-on-promoting-united-states-leadership-in-quantum-computing-while-mitigating-risks-to-vulnerable-cryptographic-systems\/<\/a>. [Accessed 19 July 2024].<br>[19] &#8220;Zoom bolsters security offering with the inclusion of post-quantum end-to-end encryption in Zoom Workplace,&#8221; Zoom, 21 May 2024. [Online]. Available: <a href=\"https:\/\/news.zoom.us\/post-quantum-e2ee\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/news.zoom.us\/post-quantum-e2ee\/<\/a>. [Accessed 19 July 2024].<br>[20] R. Harishankar, &#8220;How IBM is helping make the world\u2019s networks quantum safe,&#8221; IBM, 29 September 2022. [Online]. Available: <a href=\"https:\/\/research.ibm.com\/blog\/quantum-safe-crypto-for-telco\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/research.ibm.com\/blog\/quantum-safe-crypto-for-telco<\/a>. [Accessed 19 July 2024].<br>[21] C. Q. Choi, &#8220;\u201cQuantum-Safe\u201d Crypto Hacked by 10-Year-Old PC,&#8221; IEEE Spectrum, 19 August 2022. [Online]. Available: <a href=\"https:\/\/spectrum.ieee.org\/quantum-safe-encryption-hacked\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/spectrum.ieee.org\/quantum-safe-encryption-hacked<\/a>. [Accessed 20 July 2024].<br>[22] Ponemon Institute LLC, &#8220;Preparing for a Safe Post Quantum,&#8221; 2023.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Images<\/h3>\n\n\n\n<p>Image 1 \u2013 Bit vs. Qubit. Adapted from [4]<br>Image 2 \u2013 Entanglement. Adapted from [5]<br>Image 3 \u2013 Constructive vs. destructive interference. Adapted from [6]<br>Image 4 &#8211; Quantum computing as a \u201ctwo-dimensional horse race\u201d. &nbsp;Adapted from [13].<br>Image 5 &#8211; Comparison of the quantum roadmaps of IBM and Google. Adapted from [14] and [15]<br>Image 6 \u2013 Measuring the possibility to delay quantum action. Adapted from [16]<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Tables<\/h3>\n\n\n\n<p>Table 1 &#8211; Impact of Quantum Computing on Common Cryptographic Algorithms. Adapted from [9]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>More than forty years ago Richard Feynman\u2019s paper \u201cSimulating Physics with Computers\u201d was published&nbsp;[1], laying the foundational vision for what we now recognize as quantum computing. Since then, quantum computing has become a fascinating and fast-expanding&nbsp;field at the forefront of technological innovation. With the potential to revolutionize computing power and solve complicated issues that traditional [&hellip;]<\/p>\n","protected":false},"author":1200,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"[]"},"categories":[1,26],"tags":[170,1031,171,960,27],"ppma_author":[1025],"class_list":["post-26307","post","type-post","status-publish","format-standard","hentry","category-allgemein","category-secure-systems","tag-cryptography","tag-enterprise-it","tag-quantum-computing","tag-quantum-cryptography","tag-security"],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":25278,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/09\/10\/the-impact-of-quantum-computing-on-cybersecurity\/","url_meta":{"origin":26307,"position":0},"title":"The Impact of Quantum Computing on Cybersecurity","author":"Nadine Weber","date":"10. September 2023","format":false,"excerpt":"The future has arrived: Welcome to the second quantum revolution. But what does this mean for Cybersecurity?","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"Quantum Computer by IBM on dark background","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/quantum_computer_ibm.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/quantum_computer_ibm.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/quantum_computer_ibm.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/quantum_computer_ibm.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/quantum_computer_ibm.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":3811,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/02\/quantum-and-post-quantum-cryptography\/","url_meta":{"origin":26307,"position":1},"title":"Quantum and Post-Quantum Cryptography","author":"Oliver Hummel","date":"2. August 2018","format":false,"excerpt":"In a world where political activists and dissidents get persecuted by authoritarian governments, strong cryptography is more necessary than ever. But the general public benefits from it as well. Identity theft, banking fraud and cyber bullying can happen to anybody. The most effective protection is to not make sensitive material\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"BB84 Protocol key generation","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":27524,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2025\/02\/28\/der-einfluss-von-quantencomputing-auf-die-unternehmens-it-potenzial-und-aktuelle-limitationen\/","url_meta":{"origin":26307,"position":2},"title":"Der Einfluss von Quantencomputing auf die Unternehmens-IT: Potenzial und aktuelle Limitationen","author":"Joel Starkov","date":"28. February 2025","format":false,"excerpt":"Anmerkung:\u00a0Dieser Blogpost wurde f\u00fcr das Modul Enterprise IT (113601a) verfasst.Aus Gr\u00fcnden der besseren Lesbarkeit wird in dieser Arbeit auf eine geschlechtsneutrale Differenzierung verzichtet. S\u00e4mtliche Personenbezeichnungen gelten gleicherma\u00dfen f\u00fcr alle Geschlechter. Kurzfassung Quantencomputing ist eine aufstrebende Technologie, die die Prinzipien der Quantenmechanik verwendet und damit neue M\u00f6glichkeiten f\u00fcr die Informationsverarbeitung bietet.\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":24065,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/06\/06\/are-grids-dead\/","url_meta":{"origin":26307,"position":3},"title":"Grids are Dead &#8211; or are they?","author":"Nadine Weber","date":"6. June 2023","format":false,"excerpt":"Huge datasets \u2013 not enough computing power. What to do? Don\u2019t worry! The supercomputer concept Grid Computing is here to save you! With the rise of cloud computing, fewer companies decide upon using Grid Computing \u2013 and even less know what the latter really is or how it can be\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"Colourful Grid Structure","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/02\/grid_structure.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/02\/grid_structure.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/02\/grid_structure.jpeg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":24051,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/02\/27\/fog-computing-solving-the-limitations-of-cloud-and-edge-computing\/","url_meta":{"origin":26307,"position":4},"title":"Fog Computing: Solving the limitations of Cloud and Edge Computing","author":"Andreas Nicklaus","date":"27. February 2023","format":false,"excerpt":"Fog computing offers a compromise between cloud and edge computing for real-time, scalable data analysis. Ideal for regional applications and IoT. However, authentication and privacy issues must be addressed.","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/edge-computing-diagram-1024x512.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/edge-computing-diagram-1024x512.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/edge-computing-diagram-1024x512.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/edge-computing-diagram-1024x512.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":4005,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/20\/cloud-security-tools-and-recommendations-for-devops-in-2018\/","url_meta":{"origin":26307,"position":5},"title":"Cloud security tools and recommendations for DevOps in 2018","author":"Immanuel Haag","date":"20. August 2018","format":false,"excerpt":"Introduction Over the last five years, the use of cloud computing services has increased rapidly, in German companies. According to a statistic from Bitkom Research in \u00a02018, the acceptance of cloud-computing services is growing. Cloud-computing brings many advantages for a business. For example, expenses for the internal infrastructure and its\u2026","rel":"","context":"In &quot;DevOps&quot;","block_context":{"text":"DevOps","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/scalable-systems\/devops\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/19AAsLm7ATw8Fl8aVbJQdYw.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/19AAsLm7ATw8Fl8aVbJQdYw.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/19AAsLm7ATw8Fl8aVbJQdYw.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":1025,"user_id":1200,"is_guest":0,"slug":"aleksandra_gidionova","display_name":"Aleksandra Gidionova","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/a15ea15b5e4f3de4c8e1a919efd6fae020e2ce1af927f0610b1d8fd406f5e80b?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/26307","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/1200"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=26307"}],"version-history":[{"count":9,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/26307\/revisions"}],"predecessor-version":[{"id":28115,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/26307\/revisions\/28115"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=26307"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=26307"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=26307"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=26307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}