Codemakers race to secure the internet as quantum threat looms

That is where cryptographers come in. They study, design and test new methods for protecting data. Their role will take on added importance in the context of quantum computing.

According to Curty, upgrading the digital infrastructure that protects communications could take five to seven years, making early preparation and improvements in cryptography essential.

Evolving Tools for Evolving Technology
Codes are not new. Julius Caesar used a simple alphabet-based cipher to conceal military information. Over time, these simple systems have evolved into the complex cryptographic methods we rely on today, protecting everything from online payments to personal health records. 

“Protecting company secrets from foreign digital spying will become even more relevant in future,” said Curty. “And concerns about personal privacy have become more prominent, especially following recent whistleblower revelations about mass surveillance.”

Today’s encryption systems rely on mathematical puzzles that are easy to solve with a private key, but extremely difficult without one. These puzzles form the backbone of secure online communication. But as quantum computing capabilities develop, they may become easier to crack.

There are two possible solutions: quantum cryptography, based on quantum mechanics, and post-quantum cryptography, relying on advanced mathematical algorithms.

The Quantum Puzzle
Another member of the QSI team is Alex Grilo, an experienced cryptography researcher with the French National Centre for Scientific Research based at the Sorbonne University in Paris, France. He specializes in constructing quantum public-key encryption and secret-sharing protocols, and warns of the potential dangers. 

“If a malicious party breaks our current cryptography using a quantum computer, all our private information is suddenly vulnerable,” he said.

That’s the bad news. The good side to quantum is that it can also offer solutions to this problem.

Quantum cryptography uses the principles of quantum mechanics to enable secure communication. One advantage of quantum systems is that information cannot be measured or copied without changing it, meaning eavesdropping attempts are detectable.

“Any attempt by an eavesdropper to access information encoded in a quantum state will inevitably disturb the state,” said Curty. 

The method uses a string of light pulses which act like an advanced Morse code that cannot be intercepted without being disrupted.

“If you try to copy a quantum particle, you will disturb the particle,” explained Alessandro Marcomini, a PhD student at the University of Vigo. His research focuses on using quantum systems to securely share cryptographic keys, rather than the message itself.

Post-quantum cryptography, on the other hand, does not rely on quantum physics, but instead develops new mathematical algorithms designed to be difficult for quantum computers to solve. This is the area where Ritsch has focused her doctoral research.

“Quantum computers work very differently from classical computers, so it requires that we really think differently about the problems,” she said. This involves designing non-linear problems and paradigm shifts that puzzle quantum computers.

Building a Global Defense
Clearly, this is an issue of global concern, and international exchange and collaboration are central to the work of the QSI team, not just within Europe, but also beyond.

Ritsch recently visited the University of Amsterdam to deepen her cryptography expertise. In 2024, Marcomini spent three months at the University of Toyama in Japan, where he worked alongside Japanese experts in quantum communication. A further exchange is planned in 2025.

Both Marcomini and Grilo will team up with Japanese partners to present their work at Expo 2025 in Osaka, Japan. Through talks in Japanese and English, interactive demonstrations and games for children, they aim to raise awareness about quantum threats and showcase the creative minds working to counter them.

Quantum computers may still be a decade away from widespread use, but the race to secure the internet has already begun. 

Anthony King is an author at Horizon Magazine Blog. This article is published courtesy of Horizon, the EU research and innovation magazine.Research in this article was funded by the Marie Skłodowska-Curie Actions (MSCA). The views of the interviewees don’t necessarily reflect those of the European Commission.

Leave a comment

Register for your own account so you may participate in comment discussion. Please read the Comment Guidelines before posting. By leaving a comment, you agree to abide by our Comment Guidelines, our Privacy Policy, and Terms of Use. Please stay on topic, be civil, and be brief. Names are displayed with all comments. Learn more about Joining our Web Community.