Tecnologies

Quantum

CTIC Quantum Lab

Quantum technologies enable new approaches to tackling computing and security challenges. Although they are still under development, they already open up real opportunities to explore more advanced solutions than those currently available.

At CTIC Quantum Lab, we work to bring these technologies closer to companies and organizations by researching and developing solutions in two main areas:

  • Quantum computing. We develop infrastructures, demonstrators, and algorithms that enable understanding and experimentation with the potential of quantum computing.
  • Quantum security and communications. We develop solutions to secure communications against the threats that quantum computing poses to current cryptography.

CTIC Quantum Lab actively collaborates with research centers, universities, and companies to promote the adoption of these technologies and strengthen Asturias’ position in the quantum field.

Post-quantum cryptography

Quantum computing will bring about a major change in the way we protect information. Many of today's cryptographic systems will no longer be secure when sufficiently advanced quantum computers exist.

Post-Quantum Cryptography (PQC) addresses this challenge through new algorithms designed to resist this type of attacks. At CTIC Quantum Lab we help organizations anticipate this change by assessing their current situation and defining secure and progressive transition strategies. Our approach is based on crypto-agility, which allows adapting data and digital identity protection without disrupting operations.

Assessment of current security

We analyze the impact of quantum computing on existing cryptographic systems:

  • Public key cryptography (RSA, ECC): based on mathematical problems difficult for classical computing, but vulnerable in the future to quantum algorithms such as Shor, which would allow solving them efficiently.
  • Symmetric cryptography and hash functions (AES, SHA): more resistant to quantum attacks. Algorithms such as Grover reduce their security, but this impact can be mitigated by increasing the size of the keys.

Transition to new standards

We work with the new international standards, especially those defined by NIST, which will mark the evolution of cryptography in the coming years:

  • ML-KEM (Kyber): based on lattices. It is the leading standard for key exchange because of its high speed and efficiency.
  • ML-DSA (Dilithium): lattice-based. The recommended digital signature algorithm for its balance and performance.
  • SLH-DSA (Sphincs+): based on hash functions. Used in digital signatures and offers exceptional robustness by not relying on lattice issues.
  • FN-DSA (Falcon): based on lattices. Especially efficient for signatures requiring very small size.
  • Classic McEliece: based on error-correcting codes. A veteran scheme with decades of proven robustness for key exchange and encryption.
     

Quantum algorithms

At CTIC Quantum Lab we work to take quantum algorithms beyond theory and explore their application in real problems. To do so, we focus on two main lines:

Quantum Machine Learning (QML)

We explore the combination of quantum computing and artificial intelligence, investigating how properties such as superposition and entanglement in quantum models can complement or enhance the scope of traditional AI. We currently address the following applications:

  • Artificial Vision: image classification and complex pattern recognition, with applications in diagnostics, quality control or scientific data analysis.
  • Natural Language Processing (NLP): new ways of representing linguistic information to improve understanding of context and ambiguity in large volumes of text.
  • Anomaly detection and cybersecurity: identification of irregular patterns and subtle threats in massive data streams, drastically reducing false positives and strengthening transaction security in critical infrastructures.
  • Time series prediction: improving accuracy in models to anticipate the evolution of variables such as energy demand, markets or natural phenomena.
  • Generative IA: exploration of quantum generative models (such as QGANs) for materials design, molecular simulation or synthetic data generation.

Quantum optimization

We investigate algorithms oriented to complex optimization problems, where the number of variables makes it difficult to solve them with classical methods. Some application cases are:

  • Logistics and Supply Chain: solving the "commuter problem" on a large scale to optimize last mile delivery routes, fleet management and strategic location of warehouses, reducing costs and carbon footprint.
  • Energy: efficient management of power grids, optimizing distribution, storage and renewable integration for supply stability.
  • Industry: production planning, allocating resources and machinery in the most efficient way to minimize downtime and bottlenecks.

Quantum key distribution

Quantum Key Distribution (QKD) is a technology that allows the exchange of cryptographic keys using quantum mechanical principles. Unlike other approaches, it allows detecting any interception attempt during transmission, which makes it especially relevant for high-security communications.

At CTIC Quantum Lab we work on the design and evaluation of communications architectures that integrate this technology in real environments.

Security fundamentals

QKD uses quantum states of light (photons) to transmit cryptographic keys. Any interception attempt inevitably alters these states, and this alteration can be detected by communication systems. This allows only those keys that have been securely transmitted to be used.

Integration into communication networks

At CTIC Quantum Lab we focus on the practical challenges of incorporating QKD into existing communication infrastructures:

  • Key management systems: we investigate the integration of QKD devices with platforms that allow these quantum keys to be distributed and used in conventional encryption systems.
  • Network architectures: we design and evaluate deployment scenarios, from direct point-to-point links to networks connecting multiple entities.

Simulation in HPC

We develop and maintain QUTE, a platform that allows quantum algorithms to be run in supercomputing environments, facilitating experimentation, validation and training without the need for quantum hardware.

More info