m (Danieldomingo moved page Review 449294723710 to Pacheco et al 2024b)
 
(3 intermediate revisions by 2 users not shown)
Line 1: Line 1:
==1 Title, abstract and keywords<!-- Your document should start with a concise and informative title. Titles are often used in information-retrieval systems. Avoid abbreviations and formulae where possible. Capitalize the first word of the title.
+
==Abstract ==
  
Provide a maximum of 6 keywords, and avoiding general and plural terms and multiple concepts (avoid, for example, 'and', 'of'). Be sparing with abbreviations: only abbreviations firmly established in the field should be used. These keywords will be used for indexing purposes.
+
Ensuring confidentiality in the transmission of digital data is a globally significant challenge. When necessary, data can be transmitted securely using cryptographic keys based on algorithms such as the RSA schemes. Even supercomputers lack the computational power to decrypt these keys. However, there is no guarantee that vulnerabilities won’t emerge. In fact, one vulnerability is already known: a sufficiently powerful quantum computer, when available, will render all RSA-based encryption systems vulnerable, affecting data transmitted worldwide.
  
An abstract is required for every document; it should succinctly summarize the reason for the work, the main findings, and the conclusions of the study. Abstract is often presented separately from the article, so it must be able to stand alone. For this reason, references and hyperlinks should be avoided. If references are essential, then cite the author(s) and year(s). Also, non-standard or uncommon abbreviations should be avoided, but if essential they must be defined at their first mention in the abstract itself. -->==
+
Quantum and post-quantum communications represent the next steps in securing data. Quantum Key Distribution (QKD) is a technology that offers absolute security by leveraging the fundamental properties of quantum physics. Post-quantum techniques rely on sophisticated algorithms beyond RSA, even resistant to future quantum computers.
  
  
  
 +
While the timing of cryptographic vulnerabilities remains uncertain, it’s certain that unprepared systems will become vulnerable overnight. Recognizing this challenge, Europe is constructing the “European Quantum Communication Infrastructure.” This ambitious project aims to design, develop, and deploy a QKD network to protect critical European infrastructure (government institutions, data centers, hospitals, energy grids, etc.) as a first step toward a complete European Quantum Internet. Catalonia has the opportunity to pioneer this field, starting with a quantum network in the Barcelona metropolitan area. This initiative will create a positive economic and business impact, making it an innovative and competitive reference within the Catalan, Spanish, and European ecosystems.The project, named Qollserola, has support from the Generalitat de Catalunya, the Spanish government, the Barcelona City Council, and the European Commission. It will contribute to fostering a national quantum ecosystem and is led by ICFO and Cellnex.
  
==2 The main text<!-- You can enter and format the text of this document by selecting the ‘Edit’ option in the menu at the top of this frame or next to the title of every section of the document. This will give access to the visual editor. Alternatively, you can edit the source of this document (Wiki markup format) by selecting the ‘Edit source’ option.
 
  
Most of the documents in Scipedia are written in English (write your manuscript in American or British English, but not a mixture of these). Anyhow, specific publications in other languages can be published in Scipedia. In any case, the documents published in other languages must have an abstract written in English.
 
  
 +
==Resum==
  
2.1 Subsections
+
Garantir la confidencialitat en la transmissió de dades digitals és un desafiament d’importància global. Quan cal, les dades es poden transmetre de manera xifrada mitjançant claus criptogràfiques, que es basen en algoritmes, com ara els esquemes anomenats RSA, que ni tant sols els superordinadors tenen potència suficient per desxifrar. No obstant, no hi ha res que garanteixi que no hi hagi maneres de fer-ho.  De fet, ja se’n coneix una: Se sap que un ordinador quàntic suficientment potent – el dia que n’hi hagi – farà vulnerables tots els sistemes RSA i per tant totes les dades transmeses amb aquests sistemes d’encriptació al món.
  
Divide your article into clearly defined and numbered sections. Subsections should be numbered 1.1, 1.2, etc. and then 1.1.1, 1.1.2, ... Use this numbering also for internal cross-referencing: do not just refer to 'the text'. Any subsection may be given a brief heading. Capitalize the first word of the headings.
 
  
  
2.2 General guidelines
+
Les anomenades comunicacions quàntiques i post-quàntiques són el següent pas per  mantenir les dades segures. Per una banda, la distribució quàntica de claus o “Quantum Key Distribution” (QKD) és una tecnologia que ofereix un nivell de seguretat absoluta, ja que es basa en les propietats fonamentals de la física, concretament de la física quàntica. Per altra banda, les tècniques post-quàntiques es basen en el descobriment de nous algoritmes, més sofisticats que RSA, que fins i tot els futurs ordinadors quàntics no puguin trencar.
  
Some general guidelines that should be followed in your manuscripts are:
 
  
*  Avoid hyphenation at the end of a line.
 
  
* Symbols denoting vectors and matrices should be indicated in bold type. Scalar variable names should normally be expressed using italics.
+
Si el risc de desxifrar els algoritmes criptogràfics actuals es materialitzarà aviat o no, no se sap, però el que si és del tot segur és que el dia que el risc es materialitzi, qui no estigui preparat serà vulnerable. D’un dia per l’altre. Conscient d’aquest repte, Europa està construint la “European Quantum Communication Infrastructure”. Aquest ambiciós projecte te com a objectiu el disseny, desenvolupament i desplegament d’una xarxa QKD destinada a protegir les infraestructures crítiques d’Europa (institucions governamentals, centres de dades, hospitals, xarxes d’energia, etc.), com a primer pas cap a la futura Internet Quàntica Europea completa. Catalunya te l’oportunitat de posicionar-se com a pionera en l’àmbit, començant amb una xarxa quàntica a l’àrea metropolitana de Barcelona i amb la conseqüent externalitat positiva de crear un vector d’activitat econòmica i empresarial innovador i competitiu, també referent en l’ecosistema català, espanyol i europeu. El projecte, plurianual, te recolzament de la Generalitat de Catalunya, del Gobierno de España, de l’Ajuntament de Barcelona i de la Comissió Europea,. La iniciativa s’anomena Qollserola, contribuirà a promoure un ecosistema quàntic nacional i està liderada per l’ICFO i per Cellnex.
 
+
* Use decimal points (not commas); use a space for thousands (10 000 and above).
+
 
+
*  Follow internationally accepted rules and conventions. In particular use the international system of units (SI). If other quantities are mentioned, give their equivalent in SI.
+
 
+
 
+
2.3 Tables, figures, lists and equations
+
 
+
Please insert tables as editable text and not as images. Tables should be placed next to the relevant text in the article. Number tables consecutively in accordance with their appearance in the text and place any table notes below the table body. Be sparing in the use of tables and ensure that the data presented in them do not duplicate results described elsewhere in the article.
+
 
+
Graphics may be inserted directly in the document and positioned as they should appear in the final manuscript.
+
 
+
Number the figures according to their sequence in the text. Ensure that each illustration has a caption. A caption should comprise a brief title. Keep text in the illustrations themselves to a minimum but explain all symbols and abbreviations used. Try to keep the resolution of the figures to a minimum of 300 dpi. If a finer resolution is required, the figure can be inserted as supplementary material
+
 
+
For tabular summations that do not deserve to be presented as a table, lists are often used. Lists may be either numbered or bulleted. Below you see examples of both.
+
 
+
1. The first entry in this list
+
 
+
2. The second entry
+
 
+
2.1. A subentry
+
 
+
3. The last entry
+
 
+
* A bulleted list item
+
 
+
* Another one
+
 
+
You may choose to number equations for easy referencing. In that case they must be numbered consecutively with Arabic numerals in parentheses on the right hand side of the page. Below is an example of formulae that should be referenced as eq. (1].
+
 
+
 
+
2.4 Supplementary material
+
 
+
Supplementary material can be inserted to support and enhance your article. This includes video material, animation sequences, background datasets, computational models, sound clips and more. In order to ensure that your material is directly usable, please provide the files with a preferred maximum size of 50 MB. Please supply a concise and descriptive caption for each file. -->==
+
 
+
 
+
 
+
 
+
==3 Bibliography<!--
+
Citations in text will follow a citation-sequence system (i.e. sources are numbered by order of reference so that the first reference cited in the document is [1], the second [2], and so on) with the number of the reference in square brackets. Once a source has been cited, the same number is used in all subsequent references. If the numbers are not in a continuous sequence, use commas (with no spaces) between numbers. If you have more than two numbers in a continuous sequence, use the first and last number of the sequence joined by a hyphen
+
 
+
You should ensure that all references are cited in the text and that the reference list. References should preferably refer to documents published in Scipedia. Unpublished results should not be included in the reference list, but can be mentioned in the text. The reference data must be updated once publication is ready. Complete bibliographic information for all cited references must be given following the standards in the field (IEEE and ISO 690 standards are recommended). If possible, a hyperlink to the referenced publication should be given. See examples for Scipedia’s articles [1], other publication articles [2], books [3], book chapter [4], conference proceedings [5], and online documents [6], shown in references section below. -->==
+
 
+
 
+
 
+
 
+
==4 Acknowledgments<!-- Acknowledgments should be inserted at the end of the document, before the references section. -->==
+
 
+
 
+
 
+
 
+
==5 References<!--[1] Author, A. and Author, B. (Year) Title of the article. Title of the Publication. Article code. Available: http://www.scipedia.com/ucode.
+
 
+
[2] Author, A. and Author, B. (Year) Title of the article. Title of the Publication. Volume number, first page-last page.
+
 
+
[3] Author, C. (Year). Title of work: Subtitle (edition.). Volume(s). Place of publication: Publisher.
+
 
+
[4] Author of Part, D. (Year). Title of chapter or part. In A. Editor & B. Editor (Eds.), Title: Subtitle of book (edition, inclusive page numbers). Place of publication: Publisher.
+
 
+
[5] Author, E. (Year, Month date). Title of the article. In A. Editor, B. Editor, and C. Editor. Title of published proceedings. Paper presented at title of conference, Volume number, first page-last page. Place of publication.
+
 
+
[6] Institution or author. Title of the document. Year. [Online] (Date consulted: day, month and year). Available: http://www.scipedia.com/document.pdf.
+
-->==
+

Latest revision as of 14:16, 9 October 2024

Abstract

Ensuring confidentiality in the transmission of digital data is a globally significant challenge. When necessary, data can be transmitted securely using cryptographic keys based on algorithms such as the RSA schemes. Even supercomputers lack the computational power to decrypt these keys. However, there is no guarantee that vulnerabilities won’t emerge. In fact, one vulnerability is already known: a sufficiently powerful quantum computer, when available, will render all RSA-based encryption systems vulnerable, affecting data transmitted worldwide.

Quantum and post-quantum communications represent the next steps in securing data. Quantum Key Distribution (QKD) is a technology that offers absolute security by leveraging the fundamental properties of quantum physics. Post-quantum techniques rely on sophisticated algorithms beyond RSA, even resistant to future quantum computers.


While the timing of cryptographic vulnerabilities remains uncertain, it’s certain that unprepared systems will become vulnerable overnight. Recognizing this challenge, Europe is constructing the “European Quantum Communication Infrastructure.” This ambitious project aims to design, develop, and deploy a QKD network to protect critical European infrastructure (government institutions, data centers, hospitals, energy grids, etc.) as a first step toward a complete European Quantum Internet. Catalonia has the opportunity to pioneer this field, starting with a quantum network in the Barcelona metropolitan area. This initiative will create a positive economic and business impact, making it an innovative and competitive reference within the Catalan, Spanish, and European ecosystems.The project, named Qollserola, has support from the Generalitat de Catalunya, the Spanish government, the Barcelona City Council, and the European Commission. It will contribute to fostering a national quantum ecosystem and is led by ICFO and Cellnex.


Resum

Garantir la confidencialitat en la transmissió de dades digitals és un desafiament d’importància global. Quan cal, les dades es poden transmetre de manera xifrada mitjançant claus criptogràfiques, que es basen en algoritmes, com ara els esquemes anomenats RSA, que ni tant sols els superordinadors tenen potència suficient per desxifrar. No obstant, no hi ha res que garanteixi que no hi hagi maneres de fer-ho. De fet, ja se’n coneix una: Se sap que un ordinador quàntic suficientment potent – el dia que n’hi hagi – farà vulnerables tots els sistemes RSA i per tant totes les dades transmeses amb aquests sistemes d’encriptació al món.


Les anomenades comunicacions quàntiques i post-quàntiques són el següent pas per mantenir les dades segures. Per una banda, la distribució quàntica de claus o “Quantum Key Distribution” (QKD) és una tecnologia que ofereix un nivell de seguretat absoluta, ja que es basa en les propietats fonamentals de la física, concretament de la física quàntica. Per altra banda, les tècniques post-quàntiques es basen en el descobriment de nous algoritmes, més sofisticats que RSA, que fins i tot els futurs ordinadors quàntics no puguin trencar.


Si el risc de desxifrar els algoritmes criptogràfics actuals es materialitzarà aviat o no, no se sap, però el que si és del tot segur és que el dia que el risc es materialitzi, qui no estigui preparat serà vulnerable. D’un dia per l’altre. Conscient d’aquest repte, Europa està construint la “European Quantum Communication Infrastructure”. Aquest ambiciós projecte te com a objectiu el disseny, desenvolupament i desplegament d’una xarxa QKD destinada a protegir les infraestructures crítiques d’Europa (institucions governamentals, centres de dades, hospitals, xarxes d’energia, etc.), com a primer pas cap a la futura Internet Quàntica Europea completa. Catalunya te l’oportunitat de posicionar-se com a pionera en l’àmbit, començant amb una xarxa quàntica a l’àrea metropolitana de Barcelona i amb la conseqüent externalitat positiva de crear un vector d’activitat econòmica i empresarial innovador i competitiu, també referent en l’ecosistema català, espanyol i europeu. El projecte, plurianual, te recolzament de la Generalitat de Catalunya, del Gobierno de España, de l’Ajuntament de Barcelona i de la Comissió Europea,. La iniciativa s’anomena Qollserola, contribuirà a promoure un ecosistema quàntic nacional i està liderada per l’ICFO i per Cellnex.

Back to Top

Document information

Published on 09/10/24
Submitted on 02/07/24

Licence: CC BY-NC-SA license

Document Score

0

Views 17
Recommendations 0

Share this document

claim authorship

Are you one of the authors of this document?