Physicists from research groups at the University of Stuttgart, Saarbrücken, and Dresden conducting an experiment on quantum teleportation (left to right: Tobias Bauer, Marlon Schäfer, Caspar Hopfmann, Stefan Kazmaier, Tim Strobel, Simone Luca Portalupi). Credit: Julian Maisch
Everyday life on the internet is insecure. Hackers can break into bank accounts or steal digital identities. Driven by AI, attacks are becoming increasingly sophisticated. Quantum cryptography promises more effective protection. It makes communication secure against eavesdropping by relying on the laws of quantum physics. However, the path toward a quantum internet is still fraught with technical hurdles.
Researchers at the Institute of Semiconductor Optics and Functional Interfaces (IHFG) at the University of Stuttgart have now made a decisive breakthrough in one of the most technically challenging components, the quantum repeater. They report their results in Nature Communications.
Nanometer-sized semiconductor islands for information transfer
“For the first time worldwide, we have succeeded in transferring quantum information among photons originating from two different quantum dots,” says Prof. Peter Michler, head of the IHFG and deputy spokesperson for the Quantenrepeater.Net (QR.N) research project.
What is the background? Whether WhatsApp or video stream, every digital message consists of zeros and ones. Similarly, this also applies to quantum communication, in which individual light particles serve as carriers of information.
Zero or one is then encoded in two different directions of polarization of the photons (i.e., their orientation in the horizontal and vertical directions or in a superposition of both states). Because photons follow the laws of quantum mechanics, their polarization cannot always be completely read out without leaving traces. Any attempt to intercept the transmission would inevitably be detected.
Making the quantum internet ready for the fiber-optic infrastructure
Another challenge: An affordable quantum internet would use optical fibers—just like today’s internet. However, light has only a limited range. Conventional light signals, therefore, need to be renewed approximately every 50 kilometers using an optical amplifier.
Because quantum information cannot simply be amplified or copied and forwarded, this does not work in the quantum internet. However, quantum physics allows information to be transferred from one photon to another as long as the information stays unknown. This process is referred to as quantum teleportation.
Quantum repeaters as nodes for information transmission
Building on this, physicists are developing quantum repeaters that renew quantum information before it is absorbed in the optical fiber. They are to serve as nodes for the quantum internet. However, there are considerable technical hurdles. To transmit quantum information via teleportation, the photons must be indistinguishable (i.e., they must have approximately the same temporal profile and color). This proves extremely difficult because they are generated at different locations from different sources.
“Light quanta from different quantum dots have never been teleported before because it is so challenging,” says Tim Strobel, scientist at the IHFG and first author of the study. As part of QR.N, his team has developed semiconductor light sources that generate almost identical photons.
“In these semiconductor islands, certain fixed energy levels are present, just like in an atom,” says Strobel. This allows individual photons with defined properties to be generated at the push of a button.
“Our partners at the Leibniz Institute for Solid State and Materials Research in Dresden have developed quantum dots that differ only minimally,” says Strobel. This means that almost identical photons can be generated at two locations.
Information is ‘beamed’ from one photon to another
At the University of Stuttgart, the team succeeded in teleporting the polarization state of a photon originating from one quantum dot to another photon from a second quantum dot. One quantum dot generates a single photon, the other an entangled photon pair.
Entangled means that the two particles constitute a single quantum entity, even when they are physically separated. One of the two particles travels to the second quantum dot and interferes with its light particle. The two overlap. Because of this superposition, the information of the single photon is transferred to the distant partner of the pair.
Instrumental for the success of the experiment were quantum frequency converters, which compensate for residual frequency differences between the photons. These converters were developed by a team led by Prof. Christoph Becher, an expert in quantum optics at Saarland University.
Improvements for reaching considerably greater distances
“Transferring quantum information between photons from different quantum dots is a crucial step toward bridging greater distances,” says Michler.
In the Stuttgart experiment, the quantum dots were separated only by an optical fiber of about 10 m length. “But we are working on achieving considerably greater distances,” says Strobel.
In earlier work, the team had shown that the entanglement of the quantum dot photons remains intact even after a 36-kilometer transmission through the city center of Stuttgart. Another aim is to increase the current success rate of teleportation, which currently stands at just over 70%. Fluctuations in the quantum dot still lead to slight differences in the photons.
“We want to reduce this by advancing semiconductor fabrication techniques,” says Strobel.
“Achieving this experiment has been a long-standing ambition — these results reflect years of scientific dedication and progress,” says Dr. Simone Luca Portalupi, group leader at the IHFG and one of the study coordinators. “It’s exciting to see how experiments focused on fundamental research are taking their first steps toward practical applications.”
Researchers at Google’s Threat Intelligence Group (GTIG) have discovered that hackers are creating malware that can harness the power of large language models (LLMs) to rewrite itself on the fly.
An experimental malware family dubbed PROMPTFLUX, identified by GTIG in a recent blog post, can rewrite its own code to avoid detection.
It’s an escalation that could make future malware far more difficult to detect, further highlighting growing cybersecurity concerns brought on by the advent and widespread adoption of generative AI.
Tools like PROMPTFLUX “dynamically generate malicious scripts, obfuscate their own code to evade detection, and leverage AI models to create malicious functions on demand, rather than hard-coding them into the malware,” GTIG wrote.
According to the tech giant, this new “just-in-time” approach “represents a significant step toward more autonomous and adaptive malware.”
PROMPTFLUX is a Trojan horse malware that interacts with Google’s Gemini AI model’s application programming interface (API) to learn how to modify itself to avoid detection on the fly.
“Further examination of PROMPTFLUX samples suggests this code family is currently in a development or testing phase since some incomplete features are commented out and a mechanism exists to limit the malware’s Gemini API calls,” the group wrote.
Fortunately, the exploit has yet to be observed infecting machines in the wild, as the “current state of this malware does not demonstrate an ability to compromise a victim network or device,” Google noted. “We have taken action to disable the assets associated with this activity.”
Nonetheless, GTIG noted that malware like PROMPTFLUX appears to be “associated with financially motivated actors.” The team warned of a maturing “underground marketplace for illicit AI tools,” which could lower the “barrier to entry for less sophisticated actors.”
The threat of adversaries leveraging AI tools is very real. According to Google, “State-sponsored actors from North Korea, Iran, and the People’s Republic of China” are already tinkering with the AI to enhance their operations.
In response to the threat, GTIG introduced a new conceptual framework aimed at securing AI systems.
While generative AI can be used to create almost impossible-to-detect malware, it can be used for good as well. For instance, Google recently introduced an AI agent, dubbed Big Sleep, which is designed to use AI to identify security vulnerabilities in software.
In other words, it’s AI being pitted against AI in a cybersecurity war that’s evolving rapidly.