seQUcom 2025

VDE Press Release on the “seQUcom” Con­fe­rence published:

Quan­tum Com­pu­ting and Arti­fi­ci­al Intel­li­gence offer many advan­ta­ges – but they also under­mi­ne the secu­ri­ty of tra­di­tio­nal cryp­to­gra­phic methods and are res­ha­ping the rules of cyber­se­cu­ri­ty. What prac­ti­cal solu­ti­ons are available for users and exe­cu­ti­ves? The­se will be pre­sen­ted by experts at the user con­fe­rence seQUcom – Secu­ring Enter­pri­se Com­mu­ni­ca­ti­ons 2025: From Quan­tum Risk to Resi­li­ence”, taking place on 16 and 17 Octo­ber 2025, in Frank­furt am Main.

Data is the gold of the 21st cen­tu­ry – and must be pro­tec­ted accor­din­gly. Until now, this has pri­ma­ri­ly been achie­ved through cryp­to­gra­phic methods. Howe­ver, Quan­tum Com­pu­ting and the gro­wing power of Arti­fi­ci­al Intel­li­gence are incre­asing­ly threa­tening the­se estab­lished sys­tems – it won’t be long befo­re they can break cur­rent encryp­ti­ons and access sen­si­ti­ve infor­ma­ti­on. What was once con­side­red secu­re may soon no lon­ger pro­vi­de suf­fi­ci­ent pro­tec­tion. For busi­nesses, this means they must tran­si­ti­on to quan­tum-safe cryp­to­gra­phic methods ear­ly if they want to avo­id data leaks in the future. But which tech­no­lo­gies are sui­ta­ble? What steps need to be taken? And how can infra­struc­tures be secu­red against the­se new chal­lenges?

Con­fe­rence pres­ents prac­ti­cal solu­ti­ons
The con­fe­rence “seQUcom – Secu­ring Enter­pri­se Com­mu­ni­ca­ti­ons 2025: From Quan­tum Risk to Resi­li­ence”, taking place on 16 and 17 Octo­ber 2025, in Frank­furt am Main, pres­ents prac­ti­cal solu­ti­ons. “This is not just a con­fe­rence for rese­ar­chers – our goal is to spe­ci­fi­cal­ly enga­ge IT secu­ri­ty lea­ders and exe­cu­ti­ves,” says Imran Khan, Mana­ging Direc­tor of KEE­Quant GmbH. The event was initia­ted by KEE­Quant in col­la­bo­ra­ti­on with the Phy­si­ka­lisch-Tech­ni­sche Bun­des­an­stalt (PTB) as part of the BMFTR-fun­ded umbrel­la pro­ject for Quan­tum Com­mu­ni­ca­ti­on in Ger­ma­ny, the Ver­band der Elek­tro­tech­nik Elek­tro­nik Infor­ma­ti­ons­tech­nik (VDE), the Deut­sche Indus­trie­ver­bund für Quan­ten­si­cher­heit (DIVQ­Sec), the manage­ment and tech­no­lo­gy con­sul­tancy Bea­ring­Point, and Quan­tum Optics Jena GmbH.

Par­ti­ci­pan­ts will gain stra­te­gic insights into the thre­at land­scape shaped by Quan­tum Com­pu­ting and Arti­fi­ci­al Intel­li­gence, under­stand regu­la­to­ry deve­lo­p­ments, and recei­ve an over­view of con­cre­te solu­ti­ons for orga­niza­tio­nal chal­lenges, risk assess­ments, and the inte­gra­ti­on of Post-Quan­tum Cryp­to­gra­phy (PQC) and Quan­tum Key Dis­tri­bu­ti­on (QKD). A net­wor­king recep­ti­on and a tech­ni­cal exhi­bi­ti­on will also pro­vi­de oppor­tu­ni­ties to con­nect with key decis­i­on-makers and renow­ned experts from indus­try, govern­ment, and rese­arch, and to direct­ly address indi­vi­du­al tech­ni­cal chal­lenges. Why do Quan­tum Com­pu­ting and AI pose an imme­dia­te and con­cre­te thre­at to cur­rent cyber­se­cu­ri­ty? Which tech­no­lo­gies can ensu­re cyber­se­cu­ri­ty in the future, and how can exis­ting sys­tems be migra­ted? How will upco­ming regu­la­ti­ons impact ope­ra­ti­ons?

Post-Quan­tum Cryp­to­gra­phy and Quan­tum Key Dis­tri­bu­ti­on
One of the two key tech­no­lo­gies for future IT secu­ri­ty is Post-Quan­tum Cryp­to­gra­phy. The­se algo­rith­ms are capa­ble of with­stan­ding effi­ci­ent attacks by Quan­tum Com­pu­ters – and they also run on clas­si­cal com­pu­ters. The key advan­ta­ge: they are based on mathe­ma­ti­cal pro­blems for which neither clas­si­cal algo­rith­ms nor Quan­tum Algo­rith­ms are known to pro­vi­de effi­ci­ent solu­ti­ons. The­re are seve­ral clas­ses of post-quan­tum cryp­to­gra­phic sche­mes. For exam­p­le, lat­ti­ce-based cryp­to­gra­phy is known for its high effi­ci­en­cy; code-based cryp­to­gra­phy offers strong theo­re­ti­cal secu­ri­ty gua­ran­tees; and hash-based cryp­to­gra­phy enables digi­tal signa­tures who­se secu­ri­ty can be con­trol­led through the pro­per­ties of hash func­tions. Both code-based and hash-based approa­ches are alre­a­dy well rese­ar­ched.

The second fun­da­men­tal pil­lar of Quan­tum Cyber­se­cu­ri­ty is Quan­tum Key Dis­tri­bu­ti­on (QKD). “Here, the secret key is gene­ra­ted using the phy­si­cal pro­per­ties of indi­vi­du­al par­tic­les of light,” explains Khan. In this case, secu­ri­ty does not rely sole­ly on mathe­ma­ti­cal algo­rith­ms but is ins­tead groun­ded in the prin­ci­ples of Quan­tum Mecha­nics – such as Quan­tum Ent­an­gle­ment or the Hei­sen­berg uncer­tain­ty prin­ci­ple. This means that keys which are secu­re at the time of their crea­ti­on can­not later be cal­cu­la­ted through mathe­ma­ti­cal ope­ra­ti­ons. Seve­ral manu­fac­tu­r­ers  inclu­ding the Ger­man com­pa­nies Quan­tum Optics Jena and KEE­Quant  have alre­a­dy brought cor­re­spon­ding modu­les to mar­ket.

Aut­hor: Ver­band der Elek­tro­tech­nik Elek­tro­nik Infor­ma­ti­ons­tech­nik (VDE)

Click here for addi­tio­nal infor­ma­ti­on on the con­fe­rence.

Source refe­rence: https://www.vde.com/resource/blob/2392918/8a6b2a662bd75820242338d423fc573b/press-release-sequcom2025-data.pdf