Skip to main content ITU
Logo
  • Programmes
    • BSc Programmes
    • BSc in Global Business Informatics
    • BSc in Digital Design and Interactive Technologies
    • BSc in Software Development
    • BSc in Data Science
    • Applying for a BSc programme
    • MSc Programmes
    • MSc in Digital Innovation & Management
    • MSc in Digital Design and Interactive Technologies
    • MSc in Software Design
    • MSc in Data Science
    • MSc in Computer Science
    • MSc in Games
    • Master's reform
    • Applying for an MSc programme
    • Student Life
    • Practical information for international students
    • Ask a student
    • Women in tech
    • Student organisations at ITU
    • Study start
    • Labs for students
    • Special Educational Support (SPS)
    • Study and Career Guidance
    • Exchange student
    • Become an exchange student
    • Guest Students
    • Who can be a guest student?
    • ITU Summer University
    • Open House
    • Open House - BSc programmes
    • Open House - MSc programmes
  • Professional Education
    • Master in IT Management
    • Master in IT Management
    • Admission and entry requirements
    • Contact
    • Single Subjects
    • About single subjects
    • Admission and entry requirements
    • Contact
    • Short courses | ITU Professional Courses
    • See all short courses
    • Contact
    • Contact
    • Contact us here
  • Research
    • Sections
    • Data Science
    • Data, Systems, and Robotics
    • Digital Business Innovation
    • Digitalization Democracy and Governance
    • Human-Computer Interaction and Design
    • Play Culture and AI
    • Software Engineering
    • Technologies in Practice
    • Theoretical Computer Science
    • Research Centres
    • Centre for Digital Play
    • Center for Climate IT
    • Center for Computing Education Research
    • Centre for Digital Welfare
    • Centre for Information Security and Trust
    • Research Centre for Government IT
    • Danish Institute for IT Program Management
    • Research entities
    • Research centers
    • Sections
    • Research groups
    • Labs
    • ITU Research Portal
    • Find Researcher
    • Find Research
    • Research Ethics and Integrity
    • Good Scientific Practice
    • Technical Reports
    • Technical Reports
    • PhD Programme
    • About the PhD Programme
    • PhD Courses
    • PhD Defences
    • PhD Positions
    • Types of Enrolment
    • PhD Admission Requirements
    • PhD Handbook
    • PhD Support
  • Collaboration
    • Collaboration with students
    • Project collaboration
    • Project Market
    • Student worker
    • Project postings
    • Job and Project bank
    • Employer Branding
    • IT Match Making
    • Hiring an ITU student or graduate
    • Make a post in the job bank
    • Research collaboration
    • Read more about research collaboration at ITU
    • Industrial PhD
    • Hire an Industrial PhD
    • Maritime Hub
    • Innovation and entrepreneurship
    • ITU Business Development
    • ITU NextGen
  • About ITU
    • About ITU
    • Press
    • Vacancies
    • Contact
  • DK
How to prepare for the threat of quantum computers
ITU  /  Press  /  News from ITU  /  How to prepare for the threat of quantum computers

How to prepare for the threat of quantum computers

The dawn of quantum computers threatens to break the security we have relied on for decades. To counter this, Bernardo David, associate professor at the IT University of Copenhagen, is developing information-theoretic cryptography schemes.

Written 30 November, 2025 17:22 by Jari Kickbusch

In 1994, mathematician Peter Shor introduced an algorithm that could crack RSA encryption by factoring large numbers at lightning speed. For decades, RSA and similar systems have been the backbone of digital security, but with Shor’s algorithm, a sufficiently powerful quantum computer could break RSA, ECC, and other widely used cryptographic schemes.

"They first quantum computers already exist, but they are not big and powerful enough to be a real threat yet. However, we better prepare for them to be. It will take many years for us to update the security of all our critical IT systems, and there is a risk that quantum computers will be able to crack the encryption before we are post-quantum secure. That could be a catastrophe because with a powerful quantum computer, you could get access to a lot of very sensitive data," says associate professor at the IT University of Copenhagen, Bernardo David.

The Race for Post-Quantum Security

Governments and tech giants are investing billions in post-quantum security. The U.S. National Institute of Standards and Technology (NIST) finalized new quantum-resistant algorithms in 2024. These standards are now being integrated into products by companies like Microsoft and Google. Europe is moving aggressively too. The EU Quantum Technology Flagship programme, backed by €1 billion, is funding research into quantum-safe networks and cryptography, while the Quantum Secure Networks Partnership is developing secure communication systems for critical infrastructure.

The very foundation of post-quantum security, however, is research. Hence, researchers all over the world are racing to develop post-quantum secure protocols. One of them is Bernardo David.

"Essentially, there are two main approaches to constructing post-quantum secure cryptographic schemes. The first approach builds on computational problems that are assumed to be hard even for a quantum computer. The second approach is using information theoretical techniques that do not rely on computational hardness. Computational hardness is a widely used measure of the difficulty of solving a computational problem, often assessed by the amount of time and resources an algorithm needs to succeed. Information theoretical cryptography is concerned with constructing protocols whose security does not rely on the hardness of any problem at all. It is important to investigate both approaches as each of them enables us to construct different kinds of efficient cryptographic schemes," says Bernardo David, who is using information theoretical techniques in his research:

"The advantage of information theoretical cryptographic protocols is that they can be used to implement advanced tasks – for example, privacy-preserving computation – with high efficiency. This is because the mathematical operations involved in such protocols are more efficient than those needed for protocols that are based on computational hardness."

Post-quantum vs. quantum cryptography

According to Bernardo David, one of the challenges in the field of post-quantum security is the widespread assumption that the threat of quantum computers needs to be countered with quantum cryptography. While quantum cryptography relies on the physical principles of quantum mechanics to create secure communication systems, post-quantum cryptography use mathematical algorithms to create systems that are secure against both classical and quantum computers.

"Although quantum cryptography is a very interesting theoretical research topic, it is not a good solution for all systems. It has limited efficiency and extremely high deployment and maintenance costs. This means that investments in post-quantum cryptography research are really important, not only to construct post-quantum secure schemes for secure communication, but also to develop more advanced protocols for tasks such as electronic voting and privacy-preserving machine learning," Bernardo David ends.

Learn more about Bernardo David's research in information theoretical cryptography:

https://eprint.iacr.org/2025/1464

https://eprint.iacr.org/2023/330

https://eprint.iacr.org/2023/943



News

PhD student co-authors book on cyber dilemmas

PhD student co-authors book on cyber dilemmas

9 January, 2026

The Danish book, Cyberdilemmaer - om mødet med virkeligheden, which has just been published, focuses on everyday situations where we must make decisions about IT security. One of the book’s authors is Raha Asadi, a PhD student at the IT University of Copenhagen, who hopes the book will help create a basis for dialogue between technical and non-technical colleagues.

New ITU Podcast: The IT security expert on the political desire for mass surveillance?

New ITU Podcast: The IT security expert on the political desire for mass surveillance?

21 December, 2025

In a pilot episode of the IT University’s new podcast series, Tech-away, Carsten Schürmann, Head of the Centre for Information Security and Trust, discusses the CSA Regulation, under which the EU wants to require all messaging services to scan our digital communications. Although the proposal was blocked by German politicians, the political desire for mass surveillance is far from dead.

ITU researcher secures DKK 6.99 million for linguistically grounded language models

ITU researcher secures DKK 6.99 million for linguistically grounded language models

18 December, 2025

Carlsberg Foundation funds project to embed real-world language knowledge into AI – beyond scale and compute.

ITU researchers receive international award

ITU researchers receive international award

16 December, 2025

AIS Impact Award goes to Danish researchers for the first time, recognising ITU research that sets the standard for ethical use of blockchain technology.

Privacy is not dead yet

Privacy is not dead yet

14 December, 2025

While some politicians keep pushing for “lawful access” to our private messages, a new method may make it possible to keep our private communications private – even if end-to-end encryption in, for instance, Signal is “lawfully” decrypted. Associate professor at the IT University of Copenhagen, Rosario Giustolisi, explains how.

New research project explores human-AI entanglement to promote responsible use

New research project explores human-AI entanglement to promote responsible use

24 November, 2025

Professor at ITU, Jichen Zhu, has secured 7.19 million kroner from the Independent Research Fund Denmark for a new project that investigates how people interact with artificial intelligence in highly subjective domains such as emotion recognition – and how to design tools that support more responsible use.

ITU researcher wants to make AI more trustworthy

ITU researcher wants to make AI more trustworthy

21 November, 2025

Associate Professor Christian Hardmeier has been granted DKK 7.18 million from the Independent Research Fund Denmark. The grant is given for a project that investigates how large language models can better communicate uncertainty to users.

Can nature’s own design process help the next big AI leap?

Can nature’s own design process help the next big AI leap?

19 November, 2025

ITU professor Sebastian Risi is the co-author of a new open-access resource on an emerging field that could shape the future of artificial intelligence.

Nordic project with ITU participation aims to strengthen future citizenship

Nordic project with ITU participation aims to strengthen future citizenship

6 November, 2025

In an era of algorithms, misinformation, and weakened trust in institutions, children and young people must be equipped to navigate democracy in the digital society. A new Nordic project focuses on solutions – and Associate Professor Gitte Stald from the IT University of Copenhagen plays a central role.

Denmark on the Digital Frontline: Lessons learned from Ukraine

Denmark on the Digital Frontline: Lessons learned from Ukraine

3 November, 2025

Drawing on data from Ukraine, researchers from the IT University of Copenhagen are investigating how to prepare Danish society for cyberattacks on the digital critical infrastructure.

Professor Portrait: Oliver Krancher explores knowledge and learning in the digital workplace

Professor Portrait: Oliver Krancher explores knowledge and learning in the digital workplace

3 November, 2025

With a background in business information systems and a passion for understanding how organisations use technology, Professor Oliver Krancher has spent his career investigating the role of knowledge in digital work. On 14 November, he will present his inaugural lecture at ITU.

The climate is changing – and so are we

The climate is changing – and so are we

29 October, 2025

With a grant of 3.1 million kroner from the Independent Research Fund Denmark, Associate Professor Vedran Sekara from the IT University of Copenhagen will map how human behaviour and mobility are changing in response to climate change.

Decoding the Brain: Can AI help predict human behaviour?

Decoding the Brain: Can AI help predict human behaviour?

27 October, 2025

What if it were possible to read the brain like a book? Paolo Burelli and his colleagues at the IT University’s brAIn Lab work at the cutting edge of digital technology and neuroscience. On 5 November, Paolo Burelli will present their research at Digital Tech Summit, in a talk titled “Decoding the Brain: How AI Unlocks Human Behavior.”

Professor Portrait: Rasmus Ejlers Møgelberg creates new mathematical worlds

Professor Portrait: Rasmus Ejlers Møgelberg creates new mathematical worlds

20 October, 2025

With a background in mathematics and a passion for the abstract layers of the discipline, Professor Rasmus Ejlers Møgelberg develops theories that enhance the understanding and robustness of modern software. Rasmus Ejlers Møgelberg will deliver his inaugural lecture at the IT University on 24 October.

ITU researchers secure prestigious Villum Experiment grants

ITU researchers secure prestigious Villum Experiment grants

2 October, 2025

Projects in infant cognition, robotics, and privacy-preserving AI receive funding for early-stage research.

Sami Brandt is the first winner of the ITU Research Award

Sami Brandt is the first winner of the ITU Research Award

29 September, 2025

Sami Brandt is the winner of the first-ever ITU Research Award. Please find out more about Sami Brandt and his research in this article.

Cancan Wang wins the 2025 ITU Teaching Award

Cancan Wang wins the 2025 ITU Teaching Award

29 September, 2025

Associate Professor Cancan Wang from the Digitalization, Democracy, and Governance (DDG) section at ITU is this year’s Teaching Award recipient. We spoke with Cancan about her teaching practices and what the award means to her.

Professor portrait: Eva Rotenberg wants to make algorithms simpler – for everyone’s benefit

Professor portrait: Eva Rotenberg wants to make algorithms simpler – for everyone’s benefit

22 September, 2025

On October 3, 2025, at 14:30, Professor Eva Rotenberg will deliver an inaugural lecture in Auditorium 02 at the IT University of Copenhagen. The lecture is titled: “A story of shortest paths.”

Professor portrait: Luca Aiello wants to make the internet a better place

Professor portrait: Luca Aiello wants to make the internet a better place

15 September, 2025

On 24 September 2025 at 14:30, Professor Luca Aiello will give his inaugural lecture in Auditorium 0 at the IT University in Copenhagen.

Contact us

Phone
+45 7218 5000
E-mail
itu@itu.dk

All contact information

Web Accessibility Statement

Find us

IT University of Copenhagen
Rued Langgaards Vej 7
DK-2300 Copenhagen S
Denmark
How to get here

Follow us

ITU på facebook
ITU på Linkedin
ITU på Instagram
ITU på Youtube
ITU på Bluesky
ITU på facebook ITU på Linkedin ITU på Instagram ITU på Youtube ITU på Bluesky
ITU Student /
Privacy /
EAN-nr. 5798000417878/
CVR-nr. 29 05 77 53 /
P-nummer 1005162959

This page is printed from https://prod.93.itu.dk/nyheder?tag=%7BBBAD6C2B-5822-4D55-A0EA-B90211746589%7D