25.03.2026
Quantum computers call today's encryption into question. Post-quantum cryptography and QKD will physically secure data in the future. Find out more about the future of digital security at the Beyond Silicon 2026 forum.
When we send data today, numerous processes run in the background to ensure that only the intended recipient can read the message. The encryption methods used for this are based on mathematical problems such as the factorization of large numbers or the discrete logarithm. While these methods are extremely difficult for classical computers to solve, the so-called Shor algorithm has existed since the 1990s, which could break many of the encryption methods used today with a sufficiently large quantum computer.
The BSI has been warning about the risks that powerful quantum computers pose for cyber security for several years. In its latest report, the authority also points out that long-term secure protection of digital data can only be guaranteed if suitable measures are taken at an early stage.
Post Quantum Cryptography (PQC): The quantum-safe asymmetric procedures for key agreement that have already been standardized or are currently being standardized are based either on lattices or on binary codes. As these approaches are still relatively new compared to established mathematical methods, a hybrid approach makes sense. Here, classic asymmetric methods and quantum-safe software algorithms are used in parallel to ensure compatibility and increased security at the same time. Progress in quantum computing has increased noticeably in recent years, which is why the German Federal Office for Information Security (BSI) only recommends traditional asymmetric methods until 2031. As the changeover requires long lead times, companies and public authorities should start taking stock of their IT infrastructure without delay in order to ensure that their systems are converted to quantum security in good time.
Cryptographic procedures: Recommendations and key lengths, version 2026-01
Particularly in critical infrastructure, switching to quantum-safe algorithms alone is not enough. Quantum mechanical principles can be used directly to reliably ward off attacks in the long term and, in particular, to make "man in the middle" attacks visible. Quantum Key Distribution (QKD) is central to this. It enables a physically secured key exchange via hardware. Any attempt to intercept or modify quantum-based signals leads to measurable interference and makes an attack immediately recognizable. This creates a level of security that is not based on mathematical assumptions, but is directly secured by physical laws.
The market for QKD is growing and is increasingly gaining industrial significance. The first pilot networks show that QKD can be operated under real conditions in the telecommunications environment. The limited range of quantum-based signals remains a key challenge. Without special amplifiers, only short distances can be bridged. A future nationwide quantum network will therefore require powerful quantum repeaters, which are currently undergoing intensive development and are considered a key technology.
Recent developments by the company KEEQuant show that the industrialization and widespread use of QKD is becoming realistic, especially in critical infrastructure. The company has presented a QKD system that has been integrated on a compact chip, thus enabling a significant step towards industrial scalability. The miniaturization of optical components on a single integrated photonic chip not only reduces costs, but also facilitates integration into existing network structures.
KEEQuant Unveils Commercial-Grade Chip-Scale QKD
Advances in quantum-safe communication highlight the extent to which quantum physical technologies are already shaping industrial applications. At the same time, we are facing the transition to a new generation of computers. In the coming years, a mix of different new technologies will take over computing processes: These include quantum computers for complex and previously unsolvable tasks, photonic computers that significantly increase energy efficiency and speed in data centers, and biological/neuromorphiccomputer architectures that map neuronal artificial intelligence structures directly onto chips.
If you want to learn about these technological developments first-hand, the Beyond Silicon forum on April 28, 2026 is an excellent opportunity to do so. The event brings together leading companies, research institutions and innovators and shows what computing will look like beyond traditional silicon architectures. From quantum computers to photonic systems and biologically inspired concepts, participants will gain a comprehensive insight into the next generation of computing.
Register here and secure your place:
Beyond Silicon 2026: The Future of Computing: Bayern Innovativ