{"id":27249,"date":"2024-09-19T18:04:02","date_gmt":"2024-09-19T18:04:02","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=27249"},"modified":"2024-09-30T15:44:31","modified_gmt":"2024-09-30T15:44:31","slug":"protecting-the-internet-in-the-quantum-age-part-1","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/","title":{"rendered":"Protecting the Internet in the Quantum Age \u2013 Part 1"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/blog.lacnic.net\/en\/author\/pablo-casal\/\">Pablo Casal<\/a>, Netlabs Co-founder &amp; CEO<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a><strong>Introduction<\/strong><strong><\/strong><\/h3>\n\n\n\n<p>One of the first questions that comes to mind when talking about quantum computers is this: Is it true that Internet security will no longer exist? While the quick answer is \u2018no\u2019, it&#8217;s difficult to provide a simple, clean answer to this question. However, it is clear where this concern comes from. In 1994, American mathematician <a href=\"https:\/\/en.wikipedia.org\/wiki\/Shor's_algorithm\">&nbsp;<\/a><a href=\"https:\/\/en.wikipedia.org\/wiki\/Shor's_algorithm\">Peter Shor<\/a> demonstrated that his algorithm for quantum computers could find the prime factors of an integer in polynomial time.<\/p>\n\n\n\n<p>Although classical computers have great processing and computational power, certain problems are beyond their reach, such as quickly factorizing very large numbers. Many cryptographic systems leverage this difficulty to protect highly sensitive information on the Internet, for example, our bank accounts.<\/p>\n\n\n\n<p>And while quantum computers are currently in their infancy, it is very likely that the day will come when they become powerful and stable enough to achieve this.<\/p>\n\n\n\n<p>Although a quantum computer with the required size and stability is still 10 to 30 years away, work has already begun on alternatives to traditional algorithms. These alternatives are known as <a href=\"https:\/\/en.wikipedia.org\/wiki\/Post-quantum_cryptography\">&nbsp;<\/a><a href=\"https:\/\/en.wikipedia.org\/wiki\/Post-quantum_cryptography\">Post Quantum<\/a> (PQ) algorithms. One of the organizations leading the standardization of PQ algorithms is the National Institute of Standards and Technology (<a href=\"https:\/\/www.nist.gov\/\">NIST<\/a>). On 13 August 2024\u2014just five days ago\u2014 NIST completed Round 1 of <a href=\"https:\/\/csrc.nist.gov\/Projects\/Post-Quantum-Cryptography\/Post-Quantum-Cryptography-Standardization\">&nbsp;<\/a><a href=\"https:\/\/csrc.nist.gov\/Projects\/Post-Quantum-Cryptography\/Post-Quantum-Cryptography-Standardization\">standardization<\/a>. The winning algorithms were those derived from CRYSTALS-Dilithium, CRYSTALS-KYBER, and SPHINCS.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"904\" height=\"902\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/parte1001.png\" alt=\"\" class=\"wp-image-27236\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/parte1001.png 904w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/parte1001-300x299.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/parte1001-331x330.png 331w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/parte1001-768x766.png 768w\" sizes=\"(max-width: 904px) 100vw, 904px\" \/><\/figure>\n\n\n\n<p>In the parallel universes interpretation, Shor&#8217;s algorithm works because the elements that model quantum states interfere with one another, allowing all possible solutions to be calculated simultaneously \u2013 DALL-E<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a><strong>Description of the Vulnerabilities<\/strong><strong><\/strong><\/h3>\n\n\n\n<p>The Transport Layer Security (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Transport_Layer_Security\">TLS<\/a>) protocol is one of the most widely used security protocols on the Internet today.<\/p>\n\n\n\n<p>It is the security behind the padlock on each secure webpage we visit.<\/p>\n\n\n\n<p>TLS protects every exchange of information between servers and their users. While highly secure in the current context dominated by classical computers, the asymmetric encryption used in TLS is vulnerable to potential attacks from future quantum computers.<\/p>\n\n\n\n<p>Both <a href=\"https:\/\/en.wikipedia.org\/wiki\/RSA_(cryptosystem)\">&nbsp;<\/a><a href=\"https:\/\/en.wikipedia.org\/wiki\/RSA_(cryptosystem)\">RSA<\/a> and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Elliptic-curve_Diffie\u2013Hellman\">&nbsp;<\/a><a href=\"https:\/\/en.wikipedia.org\/wiki\/Elliptic-curve_Diffie\u2013Hellman\">ECDH<\/a> (Elliptic Curve Diffie-Hellman) \u2014some of the algorithms responsible for establishing the master key from which, for instance, the symmetric encryption key is derived\u2014 would be vulnerable to Shor&#8217;s algorithm if run on a sufficiently large and stable quantum computer. The same applies to the authentication phase, when either the server or the client proves its identity to the other using Public Key Infrastructure (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Public_key_infrastructure\">PKI<\/a>), a process that currently involves signature algorithms such as RSA or <a href=\"https:\/\/en.wikipedia.org\/wiki\/Elliptic_Curve_Digital_Signature_Algorithm\">ECDSA<\/a>.<\/p>\n\n\n\n<p>Symmetric cryptography (the algorithm used to encrypt communication in TLS once the parties authenticate themselves with their digital signatures and negotiate the symmetric encryption key) remains relatively unaffected by the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Grover's_algorithm\">\u00a0quantum algorithm proposed by Lov Grover<\/a>, who proved in 1996 that his algorithm could find a brute-force solution to the symmetric key in quadratically fewer steps. Order square root of N. In other words, a 256-bit key would require approximately 2^128 iterations. Thus, to maintain security in symmetric encryption the solution would be to increase the size of the<a href=\"https:\/\/en.wikipedia.org\/wiki\/Advanced_Encryption_Standard\"> AES<\/a> or<a href=\"https:\/\/en.wikipedia.org\/wiki\/SHA-2\"> SHA-2<\/a> key.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"904\" height=\"902\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/parte1002.png\" alt=\"\" class=\"wp-image-27239\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/parte1002.png 904w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/parte1002-300x299.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/parte1002-331x330.png 331w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/parte1002-768x766.png 768w\" sizes=\"(max-width: 904px) 100vw, 904px\" \/><\/figure>\n\n\n\n<p>DALL-E<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a><strong>First Practical Approach to the Challenge<\/strong><strong><\/strong><\/h3>\n\n\n\n<p>Beyond purely theoretical considerations, a more practical analysis of which concrete technological measures might be implemented to transition to this new reality would probably reveal the following:<\/p>\n\n\n\n<p>New quantum-resistant PQ algorithms are required, particularly for authentication and key negotiation. The certificates themselves are not vulnerable, and <a href=\"https:\/\/en.wikipedia.org\/wiki\/X.509\">&nbsp;<\/a><a href=\"https:\/\/en.wikipedia.org\/wiki\/X.509\">X.509<\/a> and the TLS protocol could continue to be used. In principle, only asymmetric encryption algorithms would need to be changed.<\/p>\n\n\n\n<p>NIST and other community initiatives are working on standardizing these quantum-resistant algorithms, which would allow having certificates that use them in the near future. These will be known as Quantum-Resistant Certificates.<\/p>\n\n\n\n<p>A concept increasingly worth becoming familiar with is<a href=\"https:\/\/en.wikipedia.org\/wiki\/Crypto-agility\"> <\/a><a href=\"https:\/\/en.wikipedia.org\/wiki\/Crypto-agility\">crypto-agility<\/a>. An infrastructure is considered crypto-agile if there is a detailed catalog of its cryptographic components, if its encryption algorithms can be easily replaced, and if this replacement process is at least partially automated.<\/p>\n\n\n\n<p>The challenge is estimating the effort needed to migrate the existing structure of the Internet to this new Quantum-Resistant Certificate format. How would this be handled? Would the entire Internet be shut down for a week and then switched back on once all certificates have been migrated? What if half the systems fail to connect due to errors? What if after switching everything back on, half the websites and services no longer work?<\/p>\n\n\n\n<p>At first glance, this \u2018Big Bang\u2019 approach seems far from ideal. Changing the entire Internet security infrastructure \u2014which took more than 25 years to build\u2014 overnight doesn&#8217;t seem possible. However, it is clear that the more crypto-agile the infrastructure is, the easier and more reliable this transition will be.<\/p>\n\n\n\n<p>In some ways, this situation is similar to what we continue to experience with IPv4. The migration to IPv6 did not happen overnight. Instead, it is still happening today and will likely continue in the future.<\/p>\n\n\n\n<p>As with the migration to <a href=\"https:\/\/en.wikipedia.org\/wiki\/IPv6\">&nbsp;<\/a><a href=\"https:\/\/en.wikipedia.org\/wiki\/IPv6\">IPv6<\/a>, the solution seems to lie in supporting both stacks. Today, modern operating systems can handle both <a href=\"https:\/\/en.wikipedia.org\/wiki\/IPv4\">IPv4<\/a> and IPv6 connections, so it doesn&#8217;t matter if the device initiating the connection supports IPv4 or IPv6 only. It will always be able to connect to the server.<\/p>\n\n\n\n<p>Similarly, it would be desirable to have a temporary transition scenario at certificate and Internet security level, where the use of PQ algorithms is not required for connecting to a remote server. If both client and server support PQ algorithms, a quantum-resistant, secure connection to a service or website would be possible. If not, the connection would still be possible using traditional quantum-vulnerable algorithms, which should probably (and ideally) trigger a warning.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"904\" height=\"902\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/parte1003.png\" alt=\"\" class=\"wp-image-27242\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/parte1003.png 904w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/parte1003-300x299.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/parte1003-331x330.png 331w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/parte1003-768x766.png 768w\" sizes=\"(max-width: 904px) 100vw, 904px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>By Pablo Casal, Netlabs Co-founder &amp; CEO Introduction One of the first questions that comes to mind when talking about quantum computers is this: Is it true that Internet security will no longer exist? While the quick answer is \u2018no\u2019, it&#8217;s difficult to provide a simple, clean answer to this question. However, it is clear [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":27245,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[531,1357],"tags":[1304],"archivo":[1345,1451],"taxonomy-authors":[1512],"tipo_autor":[1455],"class_list":["post-27249","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ipv6","category-labs","tag-ipv6","archivo-editions","archivo-highlights-2023","taxonomy-authors-pablo-casal-en","tipo_autor-colaborador"],"acf":{"author":"Pablo Casal","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Protecting the Internet in the Quantum Age \u2013 Part 1<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Protecting the Internet in the Quantum Age \u2013 Part 1\" \/>\n<meta property=\"og:description\" content=\"By Pablo Casal, Netlabs Co-founder &amp; CEO Introduction One of the first questions that comes to mind when talking about quantum computers is this: Is it true that Internet security will no longer exist? While the quick answer is \u2018no\u2019, it&#8217;s difficult to provide a simple, clean answer to this question. However, it is clear [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-19T18:04:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-30T15:44:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/Protegiendo-Internet-en-la-Era-Cuantica-001-1024x1024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mart\u00edn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/\"},\"author\":{\"name\":\"Mart\u00edn\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/3f3117e292d71f4166f765368b0760dc\"},\"headline\":\"Protecting the Internet in the Quantum Age \u2013 Part 1\",\"datePublished\":\"2024-09-19T18:04:02+00:00\",\"dateModified\":\"2024-09-30T15:44:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/\"},\"wordCount\":940,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/Protegiendo-Internet-en-la-Era-Cuantica-001.png\",\"keywords\":[\"IPv6\"],\"articleSection\":[\"IPv6\",\"Labs\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/\",\"name\":\"LACNIC Blog | Protecting the Internet in the Quantum Age \u2013 Part 1\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/Protegiendo-Internet-en-la-Era-Cuantica-001.png\",\"datePublished\":\"2024-09-19T18:04:02+00:00\",\"dateModified\":\"2024-09-30T15:44:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/Protegiendo-Internet-en-la-Era-Cuantica-001.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/Protegiendo-Internet-en-la-Era-Cuantica-001.png\",\"width\":1080,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting the Internet in the Quantum Age \u2013 Part 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/3f3117e292d71f4166f765368b0760dc\",\"name\":\"Mart\u00edn\",\"description\":\"Especialista en imagen institucional\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/sysmartin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Protecting the Internet in the Quantum Age \u2013 Part 1","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Protecting the Internet in the Quantum Age \u2013 Part 1","og_description":"By Pablo Casal, Netlabs Co-founder &amp; CEO Introduction One of the first questions that comes to mind when talking about quantum computers is this: Is it true that Internet security will no longer exist? While the quick answer is \u2018no\u2019, it&#8217;s difficult to provide a simple, clean answer to this question. However, it is clear [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2024-09-19T18:04:02+00:00","article_modified_time":"2024-09-30T15:44:31+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/Protegiendo-Internet-en-la-Era-Cuantica-001-1024x1024.png","type":"image\/png"}],"author":"Mart\u00edn","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/"},"author":{"name":"Mart\u00edn","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/3f3117e292d71f4166f765368b0760dc"},"headline":"Protecting the Internet in the Quantum Age \u2013 Part 1","datePublished":"2024-09-19T18:04:02+00:00","dateModified":"2024-09-30T15:44:31+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/"},"wordCount":940,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/Protegiendo-Internet-en-la-Era-Cuantica-001.png","keywords":["IPv6"],"articleSection":["IPv6","Labs"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/","url":"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/","name":"LACNIC Blog | Protecting the Internet in the Quantum Age \u2013 Part 1","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/Protegiendo-Internet-en-la-Era-Cuantica-001.png","datePublished":"2024-09-19T18:04:02+00:00","dateModified":"2024-09-30T15:44:31+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/Protegiendo-Internet-en-la-Era-Cuantica-001.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/Protegiendo-Internet-en-la-Era-Cuantica-001.png","width":1080,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/protecting-the-internet-in-the-quantum-age-part-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Protecting the Internet in the Quantum Age \u2013 Part 1"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/3f3117e292d71f4166f765368b0760dc","name":"Mart\u00edn","description":"Especialista en imagen institucional","url":"https:\/\/blog.lacnic.net\/en\/author\/sysmartin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/09\/Protegiendo-Internet-en-la-Era-Cuantica-001.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":27234,"post_title":"Protegiendo Internet en la Era Cu\u00e1ntica - Parte 1","slug":"protegiendo-internet-en-la-era-cuantica","href":"https:\/\/blog.lacnic.net\/protegiendo-internet-en-la-era-cuantica\/"},{"locale":"pt_BR","id":27253,"post_title":"Protegendo a Internet na Era Qu\u00e2ntica: Parte 1","slug":"protegendo-a-internet-na-era-quantica-parte-1","href":"https:\/\/blog.lacnic.net\/pt-br\/protegendo-a-internet-na-era-quantica-parte-1\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/27249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=27249"}],"version-history":[{"count":4,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/27249\/revisions"}],"predecessor-version":[{"id":27410,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/27249\/revisions\/27410"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/27245"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=27249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=27249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=27249"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=27249"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=27249"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=27249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}