The Quantum Internet Could Be Immune To Cyber Attack

We have become used to the current state of the Internet and most users have a general understanding about how things work online. But the Internet is not always secure and the risk of falling victim to cyber attacks is increasing daily, especially for those users not taking adequate precautions.

The quantum computing age is coming and with it a serious threat to encrypted communications. Current cryptography protocols used to secure our data can be swiftly decoded by a quantum computer.

A new type of computer, based on quantum physics rather than standard electronics, could break most modern cryptography. The effect would be to render communications as insecure as if they weren’t encoded at all - meaning that state secrets, medical records and banking systems would all be vulnerable once the quantum computer becomes a reality.

But the power of quantum technologies could also be used against quantum technologies, with the aim of protecting our data against quantum hacking and researchers have now discovered a new quantum computing method that will allow for safer and more secure connections in many applications.

Eindhoven University of Technology is currently setting up a unique testbed to validate this technology in several societal settings, thus paving the way for a fast and unhackable quantum Internet. 

Taking autonomous driving as the first use case, the researchers aim to have the world’s first quantum-secured autonomous driving car ready by next year. Idelfonso Tafur Monroy, TU/e Professor at the Electro-Optical Communication group and the Center for Quantum Materials and Technology Eindhoven (QT/e) recognises the particular threat to systems that require a lot of accurate control, such as autonomous driving. “For example, a hack could trick others into thinking your car is in a different location, slowing down, or changing direction,” he says. “It is even possible that your car is hacked and commandeered by someone external to the vehicle.”

The immense computing power of quantum is especially useful in calculations with many different outcomes: these can be done in one operation at the same time. 

To crack current encryption, a conventional computer takes an unacceptable length of time to test every possible solution. A quantum computer tries them all at once and cracks it in the blink of an eye. In Quantum Key Distribution (QKD), quantum properties of photons such as polarisation state and entanglement can be used to create crypto-graphic keys. These keys can be seen as recipes that tell the recipient of some secret data what measurements of the photons are needed to properly decode and access the data.

The current problem is that, right now, there is no existing infrastructure to determine if a QKD system is actually safe when integrated into existing telecommunication infrastructure. 

Hence, the new testbed will help ascertain if a QKD system is viable and safe for societal use and a number of existing research projects at TU/e are already conducting tests with autonomous driving cars, on the campus and its environments. 

The promise for quantum technology is enormous. But it will require significant development before we reach the potential of a totally secure quantum Internet connecting everyone around the globe.

Eindhoven TU/e:    QuantumXC:    NIST:   American Scientist:    I-HLS:   Investment Monitor:   Vista Insurance:  

You Might Also Read: 

Special Measures To Deal With Quantum Technology:

 

« VPN Configuration: Understanding DNS Leaks & How to Prevent Them
Locking Down Cyber Security »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Device Authority

Device Authority

Device Authority specialises in security automation for the Internet of Things (IoT).

Wooxo

Wooxo

Wooxo provides business security and continuity solutions to protect business data for organisation of all sizes.

Guidewire

Guidewire

Guidewire Cyence™ Risk Analytics is a cloud-native economic cyber risk modeling solution built to help the insurance industry quantify cyber risk exposures.

Protectimus

Protectimus

Affordable two factor authentication (2FA) provider. Protect your data from theft with multi factor authentication service from Protectimus.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

Nok Nok Labs

Nok Nok Labs

Nok Nok is a market leader in next generation authentication for cloud, mobile and IoT applications.

Vicarius

Vicarius

Vicarius’ mission is to revolutionize vulnerability management from problem detection to proactive problem resolution.

Ignyte Assurance Platform

Ignyte Assurance Platform

Ignyte Assurance Platform™ is a leader in collaborative security and integrated GRC solutions for global corporations in Healthcare, Defense, and Technology.

CyberSec Hub - The Kosciuszko Institute

CyberSec Hub - The Kosciuszko Institute

The goal of CyberSec Hub is to create a centre of excellence for cybersecurity in Krakow, a new European “Cyber-Silicon Valley”.

Spamhaus

Spamhaus

Spamhaus is the world leader in supplying realtime highly accurate threat intelligence to the Internet's major networks.

Glocomms

Glocomms

Glocomms is a leading specialist recruitment agency for the tech sector, providing permanent, contract, and multi-hire recruitment from our global hubs in San Francisco, New York, London and Berlin.

Vala Secure

Vala Secure

Vala Secure is a cybersecurity and compliance consultancy that always stays ahead of regulations, future threats and ever-changing security environments.

CyberHub

CyberHub

CyberHub is an educational platform that offers professional courses and knowledge sharing through articles and videos to help students discover their potential in cybersecurity.

Smile Identity

Smile Identity

Smile Identity helps businesses confirm the true identity of their users in real-time using any smartphone or computer.

RAD Security

RAD Security

RAD Security (formerly KSOC) is a cloud native security company that empowers engineering and security teams to drive innovation so they can focus on growth versus security problems.

Novera

Novera

Novera offer security assessment and advisory services to help businesses manage risks from AI, cyber and privacy.