{"id":2266,"date":"2026-04-07T10:20:30","date_gmt":"2026-04-07T08:20:30","guid":{"rendered":"https:\/\/www.milq.info\/?page_id=2266"},"modified":"2026-04-07T13:04:27","modified_gmt":"2026-04-07T11:04:27","slug":"myth2","status":"publish","type":"page","link":"https:\/\/www.milq.info\/en\/qti\/qmyths\/myth2\/","title":{"rendered":"Quantum Myths &#8211; Myth 2"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div><p>This course is an audio course. This means that the content of the audio file and the content of the text are identical. It is up to you if you only listen to the audio file, only read the text or if you do both listening to the audio file and reading the text.<br \/>\nAdditionally, you are allowed to download the audio file. This way you can listen to it without an internet connection. Alternatively, you are allowed to listen it here on the website of course.<\/p>\n<hr \/>\n<p style=\"text-align: center;\"><a class=\"button\" href=\"\/QTIndu\/Myths\/en-0-f.mp3\" download=\"Audio Myths f\"> Download audio quantum myths course (female voice-over)<\/a><\/p>\n<p style=\"text-align: center;\"><a class=\"button\" href=\"\/QTIndu\/Myths\/en-0-m.mp3\" download=\"Audio Myths m\"> Download audio quantum myths course (male voice-over)<\/a><\/p>\n<p style=\"text-align: center;\"><a class=\"button\" href=\"\/QTIndu\/Myths\/en-2-f.mp3\" download=\"Audio Myth 2 f\"> Download audio myth 2 (female voice-over) <\/a><\/p>\n<p style=\"text-align: center;\"><a class=\"button\" href=\"\/QTIndu\/Myths\/en-2-m.mp3\" download=\"Audio Myth 2 m\"> Download audio myth 2 (male voice-over) <\/a><\/p>\n<hr \/>\n<h2>Female voice-over:<\/h2>\n<p><audio src=\"\/QTIndu\/Myths\/en-2-f.mp3\" controls=\"controls\"> Dein Browser unterst\u00fctzt dieses Audioformat nicht. Your browser does not support the audio. <\/audio><\/p>\n<h2>Male voice-over:<\/h2>\n<p><audio src=\"\/QTIndu\/Myths\/en-2-m.mp3\" controls=\"controls\"> Dein Browser unterst\u00fctzt dieses Audioformat nicht. Your browser does not support the audio. <\/audio><\/p>\n<hr \/>\n<h2><strong>Myth #2:<\/strong> &#8220;Quantum computers can decrypt everything.&#8221;<\/h2>\n<p>The rapid progress in quantum computing has sparked both enthusiasm and concern, particularly in the field of cryptography. The question arose as to what impact a quantum computer would have and whether the security of all encrypted data could be maintained. This concerns everyone because we all want our data, communication channels, and documents to be encrypted and inaccessible to others. In this context, a myth has spread, claiming that quantum computers can decrypt everything. According to this, all forms of encrypted data would be decryptable, and our current security systems would be obsolete.<\/p>\n<p>&nbsp;<\/p>\n<h3>The Basis of the Myth<\/h3>\n<p>The myth primarily stems from the possibility that quantum computers might solve certain problems much faster than classical computers. One example is Shor&#8217;s Algorithm, which can efficiently factor large numbers and thus poses a significant threat to many cryptographic protocols. The security of many encryption methods, such as RSA, is based on the difficulty of factoring large numbers. A classical computer has little chance of decrypting them. However, a sufficiently powerful and fault-tolerant quantum computer could theoretically break these encryption methods and decrypt data that was previously considered secure. From these considerations arises the myth that quantum computers will be able to decrypt everything.<\/p>\n<p>Contrary to widespread belief, quantum computers do not have the ability to decrypt everything. Although fault-tolerant quantum computers could theoretically use Shor&#8217;s Algorithm to factor large numbers and break certain encryption protocols, it&#8217;s important to note that there are several crucial considerations to counter this issue.<\/p>\n<p>&nbsp;<\/p>\n<h3>Post-Quantum Cryptography<\/h3>\n<p>One of these considerations is the active pursuit of so-called post-quantum algorithms. Post-quantum algorithms are cryptographic algorithms considered secure against quantum computing&#8217;s potential. Post-quantum cryptography is unique because it involves classical approaches\u2014meaning it is not quantum cryptography but classical cryptography. This allows it to be used on our current systems without the need for any kind of quantum upgrade. Intensive research is underway to develop post-quantum algorithms for which no efficient quantum algorithm for decryption is currently known.<\/p>\n<p>Notable efforts in post-quantum cryptography include:<\/p>\n<ul>\n<li>Lattice-based cryptography: This approach relies on the complexity of lattice problems, for which there are currently no efficient quantum solutions. Protocols like the Learning With Errors (LWE) problem are fundamental in this area.<\/li>\n<li>Hash-based cryptography: Techniques such as Merkle trees offer digital signatures deemed secure against quantum attacks.<\/li>\n<li>Code-based cryptography: McEliece and other code-based cryptographic systems rely on the difficulty of decoding random linear codes, another problem that quantum computers cannot solve efficiently.<\/li>\n<li>Multivariate quadratic polynomials: These involve solving systems of multivariate quadratic equations, which are also considered resistant to quantum attacks.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Quantum-Secure Encryption Protocols<\/h3>\n<p>Several quantum-secure encryption protocols have already been proposed and are being considered for standardization by organizations such as the National Institute of Standards and Technology (NIST). Notable protocols include:<\/p>\n<ul>\n<li>NewHope protocol: NewHope is based on lattice problems and is an example of a key exchange algorithm that offers security against quantum attacks.<\/li>\n<li>Bit Flipping Key Encapsulation (BIKE) and Supersingular Isogeny Key Encapsulation (SIKE) protocol: BIKE and SIKE also offer mechanisms for secure key exchange in the presence of quantum threats; however, they do not rely on lattice problems but represent other approaches.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Quantum Cryptography<\/h3>\n<p>Quantum cryptography provides new ways to secure data. A prominent example is Quantum Key Distribution (QKD), which uses the principles of quantum mechanics to enable two parties to generate a shared random secret key used to encrypt and decrypt messages. The security of QKD relies on the fundamental principles of quantum mechanics, like superposition and entanglement, ensuring that any eavesdropping attempt is detectable.<\/p>\n<p>&nbsp;<\/p>\n<h3>Overgeneralization by the Myth<\/h3>\n<p>The deeper we delve into the subject, the quicker it becomes apparent that the belief that quantum computers can decrypt everything is an exaggerated overgeneralization. This myth seems to overlook several critical aspects:<\/p>\n<ul>\n<li>Practical challenges: Building scalable, fault-tolerant quantum computers capable of efficiently executing algorithms like Shor presents enormous challenges to science. Current quantum computers are far from possessing the capabilities required for such tasks. It remains uncertain if and when such devices will be realized.<\/li>\n<li>Diverse encryption methods: Not all cryptographic methods are susceptible to quantum attacks. Symmetric key algorithms, such as AES (Advanced Encryption Standard), remain secure with adequately large keys. Quantum computers could reduce the time to break encryption using search algorithms like Grover&#8217;s. However, this is far less effective than Shor&#8217;s Algorithm, as Grover&#8217;s offers a quadratic speedup, while Shor&#8217;s offers an exponential speedup. AES would thus remain secure, assuming sufficiently large keys are used.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Conclusion<\/h3>\n<ul>\n<li>The notion that quantum computers can decrypt everything is simply an oversimplification.<\/li>\n<li>Ongoing research in post-quantum cryptography and the development of quantum-secure protocols pave the way for a secure future in a quantum age.<\/li>\n<li>The inherent difficulties in building advanced quantum computers also offer an additional layer of security, ensuring that our current cryptographic methods do not become obsolete overnight.<\/li>\n<\/ul>\n<p>The proactive efforts of the cryptographic community ensure that we stay ahead of potential threats and maintain the confidentiality and integrity of our data in the face of advancing technology.<\/p>\n<hr \/>\n<h2>Exercises:<\/h2>\n<div class=\"h5p-iframe-wrapper\"><iframe id=\"h5p-iframe-148\" class=\"h5p-iframe\" data-content-id=\"148\" style=\"height:1px\" src=\"about:blank\" frameBorder=\"0\" scrolling=\"no\" title=\"QTI-EN-Myths-2-1\"><\/iframe><\/div>\n<p style=\"text-align: right;\"><a href=\"https:\/\/www.milq.info\/en\/qti\/qmyths\/myth3\/\" class=button>Continue to Myth 3<\/a><\/p>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>This course is an audio course. This means that the content of the audio file and the content of the text are identical. It is up to you if you only listen to the audio file, only read the text or if you do both listening to the audio file and reading the text. Additionally,&hellip; <a href=\"https:\/\/www.milq.info\/en\/qti\/qmyths\/myth2\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Quantum Myths &#8211; Myth 2<\/span><\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"parent":2256,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2266","page","type-page","status-publish","hentry","without-featured-image"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Quantum Myths - Myth 2 - milq<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.milq.info\/qti\/qmyths\/myth2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quantum Myths - Myth 2 - milq\" \/>\n<meta property=\"og:description\" content=\"This course is an audio course. This means that the content of the audio file and the content of the text are identical. It is up to you if you only listen to the audio file, only read the text or if you do both listening to the audio file and reading the text. Additionally,&hellip; Continue reading Quantum Myths &#8211; Myth 2\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.milq.info\/qti\/qmyths\/myth2\/\" \/>\n<meta property=\"og:site_name\" content=\"milq\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-07T11:04:27+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.milq.info\\\/qti\\\/qmyths\\\/myth2\\\/\",\"url\":\"https:\\\/\\\/www.milq.info\\\/qti\\\/qmyths\\\/myth2\\\/\",\"name\":\"Quantum Myths - Myth 2 - milq\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.milq.info\\\/#website\"},\"datePublished\":\"2026-04-07T08:20:30+00:00\",\"dateModified\":\"2026-04-07T11:04:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.milq.info\\\/qti\\\/qmyths\\\/myth2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.milq.info\\\/qti\\\/qmyths\\\/myth2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.milq.info\\\/qti\\\/qmyths\\\/myth2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.milq.info\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"QTIndu &#8211; Quantum Technologies Courses for Industry\",\"item\":\"https:\\\/\\\/www.milq.info\\\/qti\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Quantenmythen\",\"item\":\"https:\\\/\\\/www.milq.info\\\/qti\\\/qmyths\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Quantenmythen &#8211; Mythos 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.milq.info\\\/#website\",\"url\":\"https:\\\/\\\/www.milq.info\\\/\",\"name\":\"milq\",\"description\":\"Quantenphysik in der Schule\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.milq.info\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quantum Myths - Myth 2 - milq","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.milq.info\/qti\/qmyths\/myth2\/","og_locale":"en_US","og_type":"article","og_title":"Quantum Myths - Myth 2 - milq","og_description":"This course is an audio course. This means that the content of the audio file and the content of the text are identical. It is up to you if you only listen to the audio file, only read the text or if you do both listening to the audio file and reading the text. Additionally,&hellip; Continue reading Quantum Myths &#8211; Myth 2","og_url":"https:\/\/www.milq.info\/qti\/qmyths\/myth2\/","og_site_name":"milq","article_modified_time":"2026-04-07T11:04:27+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.milq.info\/qti\/qmyths\/myth2\/","url":"https:\/\/www.milq.info\/qti\/qmyths\/myth2\/","name":"Quantum Myths - Myth 2 - milq","isPartOf":{"@id":"https:\/\/www.milq.info\/#website"},"datePublished":"2026-04-07T08:20:30+00:00","dateModified":"2026-04-07T11:04:27+00:00","breadcrumb":{"@id":"https:\/\/www.milq.info\/qti\/qmyths\/myth2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.milq.info\/qti\/qmyths\/myth2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.milq.info\/qti\/qmyths\/myth2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.milq.info\/"},{"@type":"ListItem","position":2,"name":"QTIndu &#8211; Quantum Technologies Courses for Industry","item":"https:\/\/www.milq.info\/qti\/"},{"@type":"ListItem","position":3,"name":"Quantenmythen","item":"https:\/\/www.milq.info\/qti\/qmyths\/"},{"@type":"ListItem","position":4,"name":"Quantenmythen &#8211; Mythos 2"}]},{"@type":"WebSite","@id":"https:\/\/www.milq.info\/#website","url":"https:\/\/www.milq.info\/","name":"milq","description":"Quantenphysik in der Schule","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.milq.info\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.milq.info\/en\/wp-json\/wp\/v2\/pages\/2266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.milq.info\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.milq.info\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.milq.info\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.milq.info\/en\/wp-json\/wp\/v2\/comments?post=2266"}],"version-history":[{"count":7,"href":"https:\/\/www.milq.info\/en\/wp-json\/wp\/v2\/pages\/2266\/revisions"}],"predecessor-version":[{"id":2367,"href":"https:\/\/www.milq.info\/en\/wp-json\/wp\/v2\/pages\/2266\/revisions\/2367"}],"up":[{"embeddable":true,"href":"https:\/\/www.milq.info\/en\/wp-json\/wp\/v2\/pages\/2256"}],"wp:attachment":[{"href":"https:\/\/www.milq.info\/en\/wp-json\/wp\/v2\/media?parent=2266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}