{"id":3811,"date":"2018-08-02T18:46:19","date_gmt":"2018-08-02T16:46:19","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=3811"},"modified":"2023-06-08T18:03:23","modified_gmt":"2023-06-08T16:03:23","slug":"quantum-and-post-quantum-cryptography","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/02\/quantum-and-post-quantum-cryptography\/","title":{"rendered":"Quantum and Post-Quantum Cryptography"},"content":{"rendered":"<p>In a world where political activists and dissidents get persecuted by authoritarian governments, strong cryptography is more necessary than ever. But the general public benefits from it as well. Identity theft, banking fraud and cyber bullying can happen to anybody. The most effective protection is to not make sensitive material available to anybody. Unfortunately some people have an \u201cI have nothing to hide\u201d mentality. But would you post your opened mail to your garden fence? Just because most people are not doing illegal activities, some information is better kept private to stay safe from the aforementioned crimes.<\/p>\n<p><!--more--><\/p>\n<p>In times where government agencies but also black hat hackers have access to a wide variety of personal information, the best protections are transparent and mathematically proven encryption algorithms. Currently we have two main forms of encryption:<\/p>\n<h2>Symmetric Cryptography<\/h2>\n<p>Two parties (in cryptography usually called Alice and Bob) want to secretly share information between them. Alice encrypts the data with a secret key and Bob can decrypt the data with the same key. The data that is sent between them is called <i>ciphertext<\/i>. A good encryption algorithm can produce ciphertext that looks pretty much random. Changing a single bit in the data should completely change the ciphertext as well. This makes sure that an attacker that eavesdrops on the communication channel cannot determine the secret key, even if they might know parts of the unencrypted message. So far so good, or is it? The main problem is how to share the key between the communicating parties. They might sit on the opposite sides of the world. To&nbsp; overcome this issue, we have to make use of another form of encryption.<\/p>\n<h2>Asymmetric Cryptography<\/h2>\n<p>It uses not only one, but a public and a private key. The names already imply the secrecy of these keys. To encrypt a message, Alice uses Bob\u2019s public key which is known to everybody. Once the message is encrypted, it can only be decrypted with the private key, which is only known to Bob. This is enforced through trapdoor functions. These are mathematical functions that can be computed easily in one direction, but not in the reverse direction. However, with enough computational power, it is still possible! Since asymmetric encryption is generally slower than symmetric encryption, it is only used to share a secret key, which is then used for symmetric encryption algorithms.<\/p>\n<p>This has worked really well for the past decades. But although many researchers are working on keeping encryption safe and accessible for everybody, just as many work on breaking currently used algorithms. That is why ideally we want a way of encrypting data, which is not only safe from our current most powerful computers, but from any possible computer in the future. Here <i>Quantum Cryptography<\/i> comes into play. Correctly implemented it is unbreakable because it is protected by the laws of physics.<\/p>\n<h2>Quantum Cryptography<\/h2>\n<p>Before we learn more about this highly anticipated encryption wonderland, we have to dive a little bit into the world of quantum physics. Now a famous quote, widely attributed to Richard Feynman, says, \u201cIf you think you understand quantum mechanics, you don&#8217;t understand quantum mechanics.\u201d Luckily we only really need to understand one simple law of quantum mechanics. Heisenberg\u2019s uncertainty principle states that \u201cthe more precisely the position is determined, the less precisely the momentum is known, and conversely\u201d. This is in regards to quantum particles, where any form of measuring them will inevitably result in a change of their quantum state. Going a bit further, we arrive at the <i>No-Cloning Theorem<\/i>. Because our measurement of quantum particles will alter them, we cannot make an identical copy of their quantum state. We simply don\u2019t know what the particle was like, before we interacted with it. This is the fundamental principle behind quantum cryptography.<\/p>\n<h2>Quantum Key Distribution<\/h2>\n<p>Quantum cryptography has many different applications. The most important one and sometimes even used synonymously to quantum cryptography, is called <i>Quantum Key Distribution<\/i>. It still uses regular symmetric encryption but the secret key is shared with quantum mechanics.<\/p>\n<h3>BB84 Protocol<\/h3>\n<p>Named after the inventors Charles Bennett and Gilles Brassard, it makes use of the polarization of light. Light consists of photons which can be sent out individually from an emitter. They can also be given a polarization, which is the direction in which they oscillate. When they travel through a polarized filter, they interact with it depending on their orientation.<\/p>\n<p><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig1_bb84_intro.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"3812\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/02\/quantum-and-post-quantum-cryptography\/quantum_crypto_fig1_bb84_intro\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig1_bb84_intro.png\" data-orig-size=\"1363,573\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Interaction between polarized photons and filters\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig1_bb84_intro-1024x430.png\" class=\"alignnone wp-image-3812 size-large\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig1_bb84_intro-1024x430.png\" alt=\"BB84 Protocol photon and filter polarizations\" width=\"656\" height=\"275\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig1_bb84_intro-1024x430.png 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig1_bb84_intro-300x126.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig1_bb84_intro-768x323.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig1_bb84_intro.png 1363w\" sizes=\"auto, (max-width: 656px) 100vw, 656px\" \/>Figure 1. Interaction between polarized photons and filters<\/a><\/p>\n<p>Figure 1 shows four ways of polarized photons and two different filter orientations. Photons which are aligned with the filter can pass through and be seen as light by a detector. This is registered as a 1. When the orientations are perpendicular to each other, no light will pass through. The result is a 0. But if the orientations are at a 45\u00b0 angle to each other, the output cannot be previously determined. The photon will randomly pass through with a 50% chance. This property of photons can be used to generate a secret key between two parties.<\/p>\n<p><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"3816\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/02\/quantum-and-post-quantum-cryptography\/quantum_crypto_fig2_bb84_keygen\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen.png\" data-orig-size=\"1445,483\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Key generation with the BB84 Protocol\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen-1024x342.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen-1024x342.png\" alt=\"BB84 Protocol key generation\" width=\"656\" height=\"219\" class=\"alignnone size-large wp-image-3816\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen-1024x342.png 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen-300x100.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen-768x257.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen.png 1445w\" sizes=\"auto, (max-width: 656px) 100vw, 656px\" \/>Figure 2. Key generation with the BB84 protocol<\/a><\/p>\n<p>Alice sends photons to Bob which are polarized in a random direction (out of the possible variants). Bob chooses a random filter orientation and measures the outcome. He tells Alice which filters he used and she answers with the positions where he used the correct ones (marked in green). These have an orientation to the photon where the output is deterministic. All other photons produce a random output and are therefore worthless. The key consists of the bits that were measured by the correct filter. Alice can also calculate the key since she knows which photons she sent and what filters Bob used. An attacker cannot calculate the key because he doesn\u2019t know the polarization of the original photons sent by Alice.<\/p>\n<p><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig3_bb84_eavesdropping.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"3817\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/02\/quantum-and-post-quantum-cryptography\/quantum_crypto_fig3_bb84_eavesdropping\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig3_bb84_eavesdropping.png\" data-orig-size=\"1179,303\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Eavesdropping on the quantum channel\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig3_bb84_eavesdropping-1024x263.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig3_bb84_eavesdropping-1024x263.png\" alt=\"BB84 Protocol Eavesdropping on quantum channel\" width=\"656\" height=\"168\" class=\"alignnone size-large wp-image-3817\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig3_bb84_eavesdropping-1024x263.png 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig3_bb84_eavesdropping-300x77.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig3_bb84_eavesdropping-768x197.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig3_bb84_eavesdropping.png 1179w\" sizes=\"auto, (max-width: 656px) 100vw, 656px\" \/>Figure 3. Eavesdropping on the quantum channel<\/a><\/p>\n<p>Figure 3 shows an eavesdropper (Eve) on the quantum channel. Eve will use a random filter and send a photon to Bob, which is polarized according to the output she measured and the filter she used. Now Bob has a 75% chance to receive the outcome that was originally intended by Alice. But in 25% of the cases, the measured bit will differ between Alice and Bob. To find an eavesdropper on the channel, they have to compare parts of the key, which can then obviously not be used anymore. The quantum channel also has to be authenticated. Otherwise a Man-In-The-Middle attack is possible.<\/p>\n<h3>Ekert Protocol<\/h3>\n<p>The Ekert protocol uses quantum entanglement to distribute a key. Two quantum particles can be created in such a way that they have an entangled property, like their spin. If one particle is measured to be spin up, we know that the other one is spin down. By measuring probabilities, it can be proven that the state of an entangled property will only collapse into a fixed value once one particle is measured. Then the other particle will immediately show the opposite value, even if the particles are light years apart. This does not violate Einstein\u2019s postulate that information cannot be transmitted faster than the speed of light, since it is not possible to transmit data via quantum entanglement. But it can be used to share a random key between two parties. This is the principle of the Ekert protocol.<\/p>\n<h3>Applications<\/h3>\n<p>Quantum key exchange has been achieved through optical fibre over a distance of 400 km and through the air over 144 km. It was also tested with a satellite connection, where the satellite sent out entangled photons. More practical applications include a bank transfer in Vienna in 2004 and the transmission of election results in Switzerland in 2007. But the main problem with using this technology over long distances is the fact that the signal cannot be repeated or routed. A direct connection between the communicating partners is necessary. This makes it difficult to use on a global scale.<\/p>\n<h2>Post-Quantum Cryptography<\/h2>\n<p>Properly implemented, our current ways of using cryptography on the internet are sufficient for today\u2019s technology. But in the future, asymmetric cryptography is threatened by quantum computers. This form of cryptography mainly relies on three mathematical problems that are currently unsolvable in polynomial time: Integer factorization, the discrete logarithm and the elliptic-curve discrete logarithm. But Peter Shor already proposed a quantum algorithm in 1994 that can factorize integers in polynomial time. Once powerful enough quantum computers exist, current asymmetric cryptography algorithms like RSA or the Diffie-Hellman key exchange can be broken. This is a major threat to the current way the internet works. Therefore, a lot of research has already been invested into quantum safe encryption algorithms or <i>Post-Quantum Cryptography<\/i>.<\/p>\n<h3>Hash-Based Signature Systems<\/h3>\n<p>Digital signatures rely on asymmetric cryptography and are therefore also not future-proof. Hash functions however are safe from quantum computers, based on the current understanding. Using hashing for digital signatures was already invented by Ralph Merkle in 1979, but there are major disadvantages to currently used signature schemes, which is why it never became popular.<\/p>\n<p><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig4_hash_signatures.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"3818\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/02\/quantum-and-post-quantum-cryptography\/quantum_crypto_fig4_hash_signatures\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig4_hash_signatures.png\" data-orig-size=\"1464,508\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Hash-Based Signatures\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig4_hash_signatures-1024x355.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig4_hash_signatures-1024x355.png\" alt=\"Hash-Based Signatures\" width=\"656\" height=\"227\" class=\"alignnone size-large wp-image-3818\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig4_hash_signatures-1024x355.png 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig4_hash_signatures-300x104.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig4_hash_signatures-768x266.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig4_hash_signatures.png 1464w\" sizes=\"auto, (max-width: 656px) 100vw, 656px\" \/>Figure 4. Hash-Based Signatures<\/a><\/p>\n<p>To use this signature scheme securely, the private key can only be used once, since parts of the key are revealed to the receivers. The public key is a hashed version of the private key. To sign a message, parts of the private key are sent with the message data. The receiver of the message also hashes the private key and compares it to the public key and the original message data.<\/p>\n<h3>Code-Based Encryption Systems<\/h3>\n<p>Robert McEliece invented a code-based encryption system in 1978. It uses error correcting codes. Encryption data with the public key adds errors to the ciphertext, which can be reverted with the private key. The main disadvantages are the very large key sizes of 512 kilobit in the standard configuration. There are endeavours to reduce the key size, to make this the main public-key encryption system for post-quantum cryptography.<\/p>\n<h2>Conclusion<\/h2>\n<p>Quantum cryptography makes use of the No-Cloning theorem, which postulates that quantum states cannot be identically copied. This makes it physically safe from eavesdroppers. Quantum Key Exchange allows the distribution of keys for classic symmetric encryption algorithms like the <i>One-Time Pad<\/i>. Unfortunately, a direct connection between the communicating partners is always necessary. This makes it difficult to implement on a global scale.<\/p>\n<p>But quantum cryptography is not necessary to achieve encryption, which is safe from quantum computers. Although classic asymmetric encryption algorithms can be broken by quantum computers, new algorithms for encryption and digital signatures are already worked upon.<\/p>\n<h2>Research Questions<\/h2>\n<p>Quantum and post-quantum cryptography still require a lot of research to overcome their problems. Quantum computers are just now starting to become a thing, and many things are still unclear about them. These questions came to mind when researching this topic:<\/p>\n<ul>\n<li>How can a global quantum cryptography network be implemented?<\/li>\n<li>Can photons be propelled without interacting with them?<\/li>\n<li>Which algorithms can quantum computers implement better than conventional computers?<\/li>\n<li>Can hashing be broken by quantum computers?<\/li>\n<\/ul>\n<h2>Further Reading<\/h2>\n<ol>\n<li>Bernstein, D. et al (2009). <i>Post-Quantum Cryptography<\/i>. Springer-Verlag Berlin Heidelberg<\/li>\n<li><a href=\"https:\/\/www.technologyreview.com\/s\/601787\/quantum-cryptographers-set-400k-distance-record\/\" rel=\"noopener\" target=\"_blank\">https:\/\/www.technologyreview.com\/s\/601787\/quantum-cryptographers-set-400k-distance-record\/<\/a> [Accessed 2018-08-01]<\/li>\n<li><a href=\"https:\/\/www.sciencenews.org\/article\/global-quantum-communication-top-science-stories-2017-yir\" rel=\"noopener\" target=\"_blank\">https:\/\/www.sciencenews.org\/article\/global-quantum-communication-top-science-stories-2017-yir<\/a> [Accessed 2018-08-01]<\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=ZuvK-od647c\" rel=\"noopener\" target=\"_blank\">https:\/\/www.youtube.com\/watch?v=ZuvK-od647c<\/a> [Accessed 2018-08-01]<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>In a world where political activists and dissidents get persecuted by authoritarian governments, strong cryptography is more necessary than ever. But the general public benefits from it as well. Identity theft, banking fraud and cyber bullying can happen to anybody. The most effective protection is to not make sensitive material available to anybody. Unfortunately some [&hellip;]<\/p>\n","protected":false},"author":882,"featured_media":3816,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[26,651],"tags":[170,171],"ppma_author":[755],"class_list":["post-3811","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-systems","category-system-designs","tag-cryptography","tag-quantum-computing"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/quantum_crypto_fig2_bb84_keygen.png","jetpack-related-posts":[{"id":26307,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2024\/07\/26\/importance-and-impact-of-quantum-safe-encryption-for-enterprises\/","url_meta":{"origin":3811,"position":0},"title":"Importance and Impact of Quantum Safe Encryption for Enterprises","author":"Aleksandra Gidionova","date":"26. July 2024","format":false,"excerpt":"More than forty years ago Richard Feynman\u2019s paper \u201cSimulating Physics with Computers\u201d was published\u00a0[1], laying the foundational vision for what we now recognize as quantum computing. Since then, quantum computing has become a fascinating and fast-expanding\u00a0field at the forefront of technological innovation. With the potential to revolutionize computing power and\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/problem.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/problem.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/problem.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/problem.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":25278,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/09\/10\/the-impact-of-quantum-computing-on-cybersecurity\/","url_meta":{"origin":3811,"position":1},"title":"The Impact of Quantum Computing on Cybersecurity","author":"Nadine Weber","date":"10. September 2023","format":false,"excerpt":"The future has arrived: Welcome to the second quantum revolution. But what does this mean for Cybersecurity?","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"Quantum Computer by IBM on dark background","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/quantum_computer_ibm.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/quantum_computer_ibm.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/quantum_computer_ibm.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/quantum_computer_ibm.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/quantum_computer_ibm.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":27524,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2025\/02\/28\/der-einfluss-von-quantencomputing-auf-die-unternehmens-it-potenzial-und-aktuelle-limitationen\/","url_meta":{"origin":3811,"position":2},"title":"Der Einfluss von Quantencomputing auf die Unternehmens-IT: Potenzial und aktuelle Limitationen","author":"Joel Starkov","date":"28. February 2025","format":false,"excerpt":"Anmerkung:\u00a0Dieser Blogpost wurde f\u00fcr das Modul Enterprise IT (113601a) verfasst.Aus Gr\u00fcnden der besseren Lesbarkeit wird in dieser Arbeit auf eine geschlechtsneutrale Differenzierung verzichtet. S\u00e4mtliche Personenbezeichnungen gelten gleicherma\u00dfen f\u00fcr alle Geschlechter. Kurzfassung Quantencomputing ist eine aufstrebende Technologie, die die Prinzipien der Quantenmechanik verwendet und damit neue M\u00f6glichkeiten f\u00fcr die Informationsverarbeitung bietet.\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4241,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/09\/06\/blockchain-risks-and-chances-2018-overview\/","url_meta":{"origin":3811,"position":3},"title":"Blockchain Risks and Chances \u2013 An 2018 Overview on Public and Private Blockchain, Smart Contracts, DAOs and ICOs","author":"Pirmin Rehm","date":"6. September 2018","format":false,"excerpt":"A few years ago, talking about Blockchain was largely consistent with talking about the technology behind Bitcoin. In contrast, Blockchain nowadays comprises a whole technology branch, whereby the Blockchain itself can be implemented in lots of various ways. Not a year ago, on December 17, 2018, the peak of the\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/09\/bc-layers.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/09\/bc-layers.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/09\/bc-layers.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/09\/bc-layers.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/09\/bc-layers.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/09\/bc-layers.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":6664,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2019\/07\/24\/crypto-trading-securing-million-worth-api-keys-in-a-distributed-system\/","url_meta":{"origin":3811,"position":4},"title":"Crypto-Trading: Securing Million Worth API-Keys in a Distributed System","author":"Patrick Bohm","date":"24. July 2019","format":false,"excerpt":"The teaching of IT security is often about trust boundaries - these are drawn at the interface of the system to the outside world. While this view is dangerous even with a monolithic system, it is simply wrong with a distributed system. Especially when the system\u2019s data is so delicate\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/07\/security-2.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/07\/security-2.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/07\/security-2.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/07\/security-2.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":7381,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2019\/08\/31\/how-does-tor-work\/","url_meta":{"origin":3811,"position":5},"title":"How does Tor work?","author":"tt031","date":"31. August 2019","format":false,"excerpt":"Written by Tim Tenckhoff - tt031 | Computer Science and Media 1. Introduction The mysterious dark part of the internet - hidden in depths of the world wide web, is well known as a lawless space for shady online drug deals or other criminal activities. But in times of continuous\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/08\/tor-onion-services-6.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/08\/tor-onion-services-6.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/08\/tor-onion-services-6.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":755,"user_id":882,"is_guest":0,"slug":"oh021","display_name":"Oliver Hummel","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/3be40511689c9e36cd4000f8850b71d3c0675f4d9144f620801dc5b762fbfaf1?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/3811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/882"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=3811"}],"version-history":[{"count":5,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/3811\/revisions"}],"predecessor-version":[{"id":24766,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/3811\/revisions\/24766"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media\/3816"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=3811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=3811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=3811"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=3811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}