{"id":3128,"date":"2018-06-15T15:49:10","date_gmt":"2018-06-15T15:49:10","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29051\/Quantum-Cryptography-Demo-Shows-No-Need-For-New-Infrastructure.html"},"modified":"2018-06-15T15:49:10","modified_gmt":"2018-06-15T15:49:10","slug":"quantum-cryptography-demo-shows-no-need-for-new-infrastructure","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\/","title":{"rendered":"Quantum Cryptography Demo Shows No Need For New Infrastructure"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2016\/01\/14\/photon_image_via_shutterstock.jpg?x=1200&amp;y=794\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>Telef\u00f3nica and Huawei have carried out a successful field trial of quantum cryptography on commercial optical networks.<\/p>\n<p>Other teams, notably a Toshiba Research and Cambridge University Engineering Department, have made great strides in Quantum Key Distribution (QKD), a technology that promises unprecedented secrecy.<\/p>\n<p>While previous efforts have concentrated on dummy networks and the lab, Telef\u00f3nica and Huawei&#8217;s tests were carried out over existing optical networks. Others have focused on getting the performance or speed of quantum cryptography systems up while Telef\u00f3nica and Huawei grappled with getting the tech to work over existing fibre networks, overcoming problems created by signal degradation and other difficulties.<\/p>\n<p>The <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.telefonica.com\/en\/web\/press-office\/-\/telefonica-huawei-and-upm-perform-a-grounbreaking-field-trial-applying-quantum-cryptography-on-commercial-optical-networks-to-provide-secure-communica\">demo<\/a>, which also involved Universidad Polit\u00e9cnica de Madrid (UPM), incorporated use of software-defined networking (SDN) technologies.<\/p>\n<p>The field trial employed optical infrastructure provided by Telef\u00f3nica Spain, connecting three sites within the Madrid metropolitan area where software-controlled CV-QKD devices, developed by the Huawei Research Lab in Munich in collaboration with UPM, are installed, together with SDN-based management modules developed by Telef\u00f3nica&#8217;s GCTIO Network Innovation team and the components required to integrate QKD with network functions virtualization (NFV) and SDN technologies developed by UPM.<\/p>\n<h3 class=\"crosshead\"><span>Quantum flux<\/span><\/h3>\n<p>Current cryptographic techniques for key generation are based on complex mathematical problems and one-way functions, which require heavy computing horsepower to resolve. As computational capacity grows, the time required to solve these problems becomes shorter, reducing the security of the keys and the communications they protect.<\/p>\n<p>This is always going to be a problem with all forms of public key cryptography. An alternative cryptographic technique is based on one-time keypads. The problem of this approach is exchanging a one-time key between two parties without an eavesdropper or hacker getting a hold of it.<\/p>\n<p>QKD\u00a0promises a key exchange system that is theoretically uncrackable but still subject to potential implementation flaws. Secret keys for one-time keypads are transmitted with one photon encoding one bit.<\/p>\n<p>Any attempt by an eavesdropper to intercept and measure the photons alters their encoding, thanks to fundamental principles of quantum physics. This means that\u00a0eavesdropping on quantum keys can be detected.\u00a0Compromised key exchanges can be dropped and the process repeated until a theoretically unbreakable key is exchanged.<\/p>\n<p>QKD not only provides protection against the threat posed by quantum computing to current cryptographic algorithms, but it can also provide a much higher security level for the exchange of data.<\/p>\n<h3 class=\"crosshead\"><span>QKD that won&#8217;t break the bank<\/span><\/h3>\n<p>Professor Alan Woodward, a computer scientist at the University of Surrey in England, commented: &#8220;The reason that the Telef\u00f3nica QKD system is getting attention is that they have developed a way of using existing networks over which they can apply QKD.<\/p>\n<p>&#8220;The BT\/Toshiba network is effectively a dedicated fibre network with repeaters, all of which are committed to supporting QKD. If the Telef\u00f3nica system works then it means one of the big stumbling blocks of QKD might be avoided i.e. the significant cost of putting in new fibre networks to support QKD. If you can use existing networks, maybe even interleaved with traditional data traffic, that would really be a step forward. QKD en masse so to speak rather than having to use dedicated networks.<\/p>\n<p>&#8220;Of course, even the existing networks would need a bit of retrofitting as you need the QKD equipment on the end points of those networks, but still cheaper than specific fibre networks just for QKD.&#8221;<\/p>\n<p>Those involved in the trial echo Woodward&#8217;s point that the field trial takes us one step closer to allowing next-generation encryption to security-conscious businesses without breaking the bank. It&#8217;ll be less costly, though no one is putting a price tag or timeline on delivery of QKD services just yet.<\/p>\n<p>Vicente Martin, head of the Centre for Computational Simulation at UPM, told <em>The Register<\/em>: &#8220;The ability to use new network technologies like SDN, designed to increase the flexibility of the network, together with new QKD technology is what allows us to really converge quantum and classical networks on the existing optical fibre infrastructure. Now we have, for the first time, the capability to deploy quantum communications in an incremental way, avoiding large upfront costs, and using the same infrastructure.&#8221;<\/p>\n<p>Momtchil Peev, Huawei project leader of the Quantum Communication Project in Munich, added: &#8220;The test CV-QKD devices that we present here have the inherent CV advantages: they do not need (ultra) low-temperature (bulky) Single Photon Avalanche Detectors and can (potentially) reuse classical optical coherent communication technology. Moreover, instead of addressing performance records alone we have chosen a flexible design focusing on control and key delivery interfaces, showing the feasibility of more seamless future integration into modern networks.&#8221; \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1759\/shttp:\/\/www.mcubed.london\/\">Minds Mastering Machines &#8211; Call for papers now open<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29051\/Quantum-Cryptography-Demo-Shows-No-Need-For-New-Infrastructure.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":3129,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[1342],"class_list":["post-3128","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinesciencecryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Quantum Cryptography Demo Shows No Need For New Infrastructure 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quantum Cryptography Demo Shows No Need For New Infrastructure 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-15T15:49:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"794\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Quantum Cryptography Demo Shows No Need For New Infrastructure\",\"datePublished\":\"2018-06-15T15:49:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\\\/\"},\"wordCount\":798,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure.jpg\",\"keywords\":[\"headline,science,cryptography\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\\\/\",\"name\":\"Quantum Cryptography Demo Shows No Need For New Infrastructure 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure.jpg\",\"datePublished\":\"2018-06-15T15:49:10+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure.jpg\",\"width\":1200,\"height\":794},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,science,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinesciencecryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Quantum Cryptography Demo Shows No Need For New Infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quantum Cryptography Demo Shows No Need For New Infrastructure 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"Quantum Cryptography Demo Shows No Need For New Infrastructure 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-15T15:49:10+00:00","og_image":[{"width":1200,"height":794,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Quantum Cryptography Demo Shows No Need For New Infrastructure","datePublished":"2018-06-15T15:49:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\/"},"wordCount":798,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure.jpg","keywords":["headline,science,cryptography"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\/","url":"https:\/\/www.threatshub.org\/blog\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\/","name":"Quantum Cryptography Demo Shows No Need For New Infrastructure 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure.jpg","datePublished":"2018-06-15T15:49:10+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure.jpg","width":1200,"height":794},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/quantum-cryptography-demo-shows-no-need-for-new-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,science,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinesciencecryptography\/"},{"@type":"ListItem","position":3,"name":"Quantum Cryptography Demo Shows No Need For New Infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/3128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=3128"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/3128\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/3129"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=3128"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=3128"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=3128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}