{"id":76972,"date":"2025-12-05T08:00:00","date_gmt":"2025-12-05T14:00:00","guid":{"rendered":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/?p=76972"},"modified":"2025-11-12T15:30:23","modified_gmt":"2025-11-12T21:30:23","slug":"seguridad-post-cuantica-escat-uninter","status":"publish","type":"post","link":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/","title":{"rendered":"Seguridad post-cu\u00e1ntica #ESCAT #Uninter"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/www.facebook.com\/EscatUninter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2025\/06\/image-167.png\" alt=\"\" class=\"wp-image-75185\" width=\"156\" height=\"176\"\/><\/a><\/figure>\n<\/div>\n\n\n<p>Con la llegada inminente de la computaci\u00f3n cu\u00e1ntica, los sistemas criptogr\u00e1ficos tradicionales enfrentan desaf\u00edos que podr\u00edan poner en riesgo la seguridad digital a nivel global. Ricardo Akle, consultor experto en HSM y PKI de OCD Tech M\u00e9xico, aborda en su presentaci\u00f3n la importancia de prepararse para este cambio de paradigma mediante la adopci\u00f3n de criptograf\u00eda post-cu\u00e1ntica (PQC).<\/p>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\u00bfQ<\/strong>u\u00e9 es la Computaci\u00f3n Cu\u00e1ntica?<\/h2>\n\n\n\n<p>La computaci\u00f3n cu\u00e1ntica utiliza los principios de la mec\u00e1nica cu\u00e1ntica para realizar c\u00e1lculos de forma exponencialmente m\u00e1s eficiente que las computadoras tradicionales. A diferencia de los sistemas binarios que operan con estados determinados (0 y 1), los computadores cu\u00e1nticos aprovechan los estados superpuestos, procesando m\u00faltiples posibilidades simult\u00e1neamente.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"720\" src=\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2025\/09\/image-29.png\" alt=\"\" class=\"wp-image-76973\"\/><\/figure>\n<\/div>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Automotriz:<\/strong>&nbsp;Mejora de la seguridad en veh\u00edculos aut\u00f3nomos y uso de inteligencia artificial.<\/li>\n\n\n\n<li><strong>Log\u00edstica:<\/strong>&nbsp;Optimizaci\u00f3n de cadenas de suministro.<\/li>\n\n\n\n<li><strong>Biotecnolog\u00eda:<\/strong>&nbsp;Desarrollo de tratamientos personalizados.<\/li>\n\n\n\n<li><strong>Finanzas:<\/strong>&nbsp;Mayor eficiencia en la asignaci\u00f3n de recursos y an\u00e1lisis de riesgos.<\/li>\n\n\n\n<li><strong>Telecomunicaciones y seguridad:<\/strong>&nbsp;Reforzamiento de las comunicaciones y protecci\u00f3n de datos.<\/li>\n<\/ul>\n\n\n\n<p>Aunque estas aplicaciones prometen grandes avances, tambi\u00e9n representan una amenaza significativa para los sistemas de seguridad actuales.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2025\/09\/image-30.png\" alt=\"\" class=\"wp-image-76974\" width=\"744\" height=\"418\"\/><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\">El Impacto de la Computaci\u00f3n Cu\u00e1ntica en la Criptograf\u00eda<\/h3>\n\n\n\n<p>La computaci\u00f3n cu\u00e1ntica tiene el potencial de debilitar o incluso quebrar los algoritmos criptogr\u00e1ficos que sustentan la seguridad digital moderna. Dos algoritmos cu\u00e1nticos destacan por sus capacidades disruptivas:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Algoritmo de Shor:<\/strong>&nbsp;Rompe algoritmos de clave p\u00fablica como RSA y ECC al resolver problemas de factorizaci\u00f3n.<\/li>\n\n\n\n<li><strong>Algoritmo de Grover:<\/strong>&nbsp;Reduce significativamente el tiempo requerido para ataques de fuerza bruta contra criptograf\u00eda sim\u00e9trica como AES, aunque este impacto puede mitigarse duplicando el tama\u00f1o de las claves.<\/li>\n<\/ol>\n\n\n\n<p>Adem\u00e1s, el ataque conocido como \u201cHarvest Now, Decrypt Later\u201d (HNDL) es especialmente preocupante. Consiste en recopilar informaci\u00f3n encriptada sensible con la intenci\u00f3n de descifrarla en el futuro, cuando las computadoras cu\u00e1nticas sean lo suficientemente potentes.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2025\/09\/image-31.png\" alt=\"\" class=\"wp-image-76975\" width=\"634\" height=\"407\"\/><\/figure>\n<\/div>\n\n\n<h4 class=\"wp-block-heading\"><strong>Tecnolog\u00edas y Sistemas en Riesgo<\/strong><\/h4>\n\n\n\n<p>La amenaza cu\u00e1ntica afecta un amplio espectro de tecnolog\u00edas, desde infraestructuras cr\u00edticas hasta aplicaciones cotidianas:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Infraestructura de Internet:<\/strong>&nbsp;Protocolos como SSL\/TLS y DNSSEC podr\u00edan quedar obsoletos.<\/li>\n\n\n\n<li><strong>Redes m\u00f3viles 5G:<\/strong>&nbsp;La seguridad de las comunicaciones y el acceso a redes est\u00e1n en riesgo.<\/li>\n\n\n\n<li><strong>Sistemas bancarios y financieros:<\/strong>&nbsp;Cajeros autom\u00e1ticos, tarjetas de cr\u00e9dito\/d\u00e9bito y transacciones.<\/li>\n\n\n\n<li><strong>Sistemas de identidad digital:<\/strong>&nbsp;Incluyendo pasaportes electr\u00f3nicos y firmas digitales.<\/li>\n\n\n\n<li><strong>Blockchain:<\/strong>&nbsp;Aunque su dise\u00f1o es robusto, tambi\u00e9n enfrenta desaf\u00edos ante los avances cu\u00e1nticos.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2025\/09\/image-32.png\" alt=\"\" class=\"wp-image-76976\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Preparaci\u00f3n para un Futuro Cu\u00e1ntico Seguro<\/strong><\/h4>\n\n\n\n<p>Ante estas amenazas, la criptograf\u00eda post-cu\u00e1ntica (PQC) ofrece soluciones dise\u00f1adas para resistir ataques de computadoras cu\u00e1nticas. Los est\u00e1ndares en desarrollo, liderados por instituciones como el NIST, est\u00e1n definiendo algoritmos seguros como Kyber y Classic McEliece, que se basan en problemas matem\u00e1ticos extremadamente dif\u00edciles de resolver.<\/p>\n\n\n\n<p><strong>Recomendaciones clave para la transici\u00f3n:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Crear un inventario criptogr\u00e1fico:<\/strong>&nbsp;Identificar qu\u00e9 algoritmos y sistemas se utilizan actualmente.<\/li>\n\n\n\n<li><strong>Adoptar cripto-agilidad:<\/strong>&nbsp;Implementar sistemas flexibles que permitan el reemplazo de algoritmos sin interrupciones significativas.<\/li>\n\n\n\n<li><strong>Incorporar soluciones h\u00edbridas:<\/strong>&nbsp;Utilizar combinaciones de algoritmos cl\u00e1sicos y post-cu\u00e1nticos durante la transici\u00f3n.<\/li>\n\n\n\n<li><strong>Planificar con anticipaci\u00f3n:<\/strong>&nbsp;Establecer hojas de ruta t\u00e1cticas para migrar a PQC antes de que las computadoras cu\u00e1nticas sean una amenaza real.<\/li>\n<\/ol>\n\n\n\n<p><strong>Fuente: <\/strong><a href=\"https:\/\/www.sectigo.com\/es\/recursos\/criptografia-post-cuantica-proposito-y-preparacion\">Sectigo<\/a><\/p>\n\n\n\n<p class=\"has-text-align-right\"><a href=\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/category\/noticias\/\">Mas noticias sobre.<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/uninter.edu.mx\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"154\" src=\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2025\/06\/image-170.png\" alt=\"\" class=\"wp-image-75188\"\/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Con la llegada inminente de la computaci\u00f3n cu\u00e1ntica, los sistemas criptogr\u00e1ficos tradicionales enfrentan desaf\u00edos que podr\u00edan poner en riesgo la seguridad digital a nivel global. Ricardo Akle, consultor experto en HSM y PKI de OCD Tech M\u00e9xico, aborda en su presentaci\u00f3n la importancia de prepararse para este cambio de paradigma mediante la adopci\u00f3n de criptograf\u00eda&hellip;<\/p>\n","protected":false},"author":22,"featured_media":76979,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20],"tags":[2642,61,32,104,1121,152,62,258,37],"class_list":["post-76972","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ingenieria-mecatronica","tag-ciberseguridad","tag-diseno","tag-escat","tag-ingenierias","tag-seguridad-2","tag-sistemas","tag-tecnologia","tag-tecnologia-2","tag-universidad-internacional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>Seguridad post-cu\u00e1ntica #ESCAT #Uninter<\/title>\r\n<meta name=\"description\" content=\"Con la llegada inminente de la computaci\u00f3n cu\u00e1ntica, los sistemas criptogr\u00e1ficos enfrentan desaf\u00edos que podr\u00edan poner en riesgo la seguridad\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/\" \/>\r\n<meta property=\"og:locale\" content=\"es_MX\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Seguridad post-cu\u00e1ntica #ESCAT #Uninter - Escuela de Ciencias, Artes y Tecnolog\u00eda\" \/>\r\n<meta property=\"og:description\" content=\"Con la llegada inminente de la computaci\u00f3n cu\u00e1ntica, los sistemas criptogr\u00e1ficos enfrentan desaf\u00edos que podr\u00edan poner en riesgo la seguridad\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Escuela de Ciencias, Artes y Tecnolog\u00eda\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EscatUninter\/\" \/>\r\n<meta property=\"article:published_time\" content=\"2025-12-05T14:00:00+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2025\/09\/image-32-1.png\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\r\n\t<meta property=\"og:image:height\" content=\"800\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\r\n<meta name=\"author\" content=\"EquipoEscat\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:title\" content=\"Seguridad post-cu\u00e1ntica #ESCAT #Uninter - Escuela de Ciencias, Artes y Tecnolog\u00eda\" \/>\r\n<meta name=\"twitter:image\" content=\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2025\/09\/image-32-1.png\" \/>\r\n<meta name=\"twitter:creator\" content=\"@EscatUninter\" \/>\r\n<meta name=\"twitter:site\" content=\"@EscatUninter\" \/>\r\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"EquipoEscat\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/\"},\"author\":{\"name\":\"EquipoEscat\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#\/schema\/person\/df7b8f33d62433cb78a2104bda02490d\"},\"headline\":\"Seguridad post-cu\u00e1ntica #ESCAT #Uninter\",\"datePublished\":\"2025-12-05T14:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/\"},\"wordCount\":595,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2025\/09\/image-32-1.png\",\"keywords\":[\"ciberseguridad\",\"Dise\u00f1o\",\"ESCAT\",\"Ingenier\u00edas\",\"Seguridad\",\"Sistemas\",\"Tecnolog\u00eda\",\"tecnologia\",\"Universidad Internacional\"],\"articleSection\":[\"Ingenier\u00eda Mecatr\u00f3nica\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/\",\"name\":\"Seguridad post-cu\u00e1ntica #ESCAT #Uninter\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2025\/09\/image-32-1.png\",\"datePublished\":\"2025-12-05T14:00:00+00:00\",\"author\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#\/schema\/person\/df7b8f33d62433cb78a2104bda02490d\"},\"description\":\"Con la llegada inminente de la computaci\u00f3n cu\u00e1ntica, los sistemas criptogr\u00e1ficos enfrentan desaf\u00edos que podr\u00edan poner en riesgo la seguridad\",\"breadcrumb\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/#primaryimage\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2025\/09\/image-32-1.png\",\"contentUrl\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2025\/09\/image-32-1.png\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguridad post-cu\u00e1ntica #ESCAT #Uninter\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#website\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/\",\"name\":\"Escuela de Ciencias, Artes y Tecnolog\u00eda UNINTER\",\"description\":\"ESCAT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#\/schema\/person\/df7b8f33d62433cb78a2104bda02490d\",\"name\":\"EquipoEscat\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d943e53cecc7e9e13c011abf6ec7475809c7d278834bde994b19ecd58034a9ff?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d943e53cecc7e9e13c011abf6ec7475809c7d278834bde994b19ecd58034a9ff?s=96&d=mm&r=g\",\"caption\":\"EquipoEscat\"},\"url\":\"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/author\/equipoescat\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Seguridad post-cu\u00e1ntica #ESCAT #Uninter","description":"Con la llegada inminente de la computaci\u00f3n cu\u00e1ntica, los sistemas criptogr\u00e1ficos enfrentan desaf\u00edos que podr\u00edan poner en riesgo la seguridad","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/","og_locale":"es_MX","og_type":"article","og_title":"Seguridad post-cu\u00e1ntica #ESCAT #Uninter - Escuela de Ciencias, Artes y Tecnolog\u00eda","og_description":"Con la llegada inminente de la computaci\u00f3n cu\u00e1ntica, los sistemas criptogr\u00e1ficos enfrentan desaf\u00edos que podr\u00edan poner en riesgo la seguridad","og_url":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/","og_site_name":"Escuela de Ciencias, Artes y Tecnolog\u00eda","article_publisher":"https:\/\/www.facebook.com\/EscatUninter\/","article_published_time":"2025-12-05T14:00:00+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2025\/09\/image-32-1.png","type":"image\/png"}],"author":"EquipoEscat","twitter_card":"summary_large_image","twitter_title":"Seguridad post-cu\u00e1ntica #ESCAT #Uninter - Escuela de Ciencias, Artes y Tecnolog\u00eda","twitter_image":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2025\/09\/image-32-1.png","twitter_creator":"@EscatUninter","twitter_site":"@EscatUninter","twitter_misc":{"Escrito por":"EquipoEscat","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/#article","isPartOf":{"@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/"},"author":{"name":"EquipoEscat","@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#\/schema\/person\/df7b8f33d62433cb78a2104bda02490d"},"headline":"Seguridad post-cu\u00e1ntica #ESCAT #Uninter","datePublished":"2025-12-05T14:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/"},"wordCount":595,"commentCount":0,"image":{"@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2025\/09\/image-32-1.png","keywords":["ciberseguridad","Dise\u00f1o","ESCAT","Ingenier\u00edas","Seguridad","Sistemas","Tecnolog\u00eda","tecnologia","Universidad Internacional"],"articleSection":["Ingenier\u00eda Mecatr\u00f3nica"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/","url":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/","name":"Seguridad post-cu\u00e1ntica #ESCAT #Uninter","isPartOf":{"@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/#primaryimage"},"image":{"@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2025\/09\/image-32-1.png","datePublished":"2025-12-05T14:00:00+00:00","author":{"@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#\/schema\/person\/df7b8f33d62433cb78a2104bda02490d"},"description":"Con la llegada inminente de la computaci\u00f3n cu\u00e1ntica, los sistemas criptogr\u00e1ficos enfrentan desaf\u00edos que podr\u00edan poner en riesgo la seguridad","breadcrumb":{"@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/#primaryimage","url":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2025\/09\/image-32-1.png","contentUrl":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2025\/09\/image-32-1.png","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/seguridad-post-cuantica-escat-uninter\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/"},{"@type":"ListItem","position":2,"name":"Seguridad post-cu\u00e1ntica #ESCAT #Uninter"}]},{"@type":"WebSite","@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#website","url":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/","name":"Escuela de Ciencias, Artes y Tecnolog\u00eda UNINTER","description":"ESCAT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#\/schema\/person\/df7b8f33d62433cb78a2104bda02490d","name":"EquipoEscat","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d943e53cecc7e9e13c011abf6ec7475809c7d278834bde994b19ecd58034a9ff?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d943e53cecc7e9e13c011abf6ec7475809c7d278834bde994b19ecd58034a9ff?s=96&d=mm&r=g","caption":"EquipoEscat"},"url":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/author\/equipoescat\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/wp-content\/uploads\/2025\/09\/image-32-1.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/wp-json\/wp\/v2\/posts\/76972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/wp-json\/wp\/v2\/comments?post=76972"}],"version-history":[{"count":2,"href":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/wp-json\/wp\/v2\/posts\/76972\/revisions"}],"predecessor-version":[{"id":76984,"href":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/wp-json\/wp\/v2\/posts\/76972\/revisions\/76984"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/wp-json\/wp\/v2\/media\/76979"}],"wp:attachment":[{"href":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/wp-json\/wp\/v2\/media?parent=76972"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/wp-json\/wp\/v2\/categories?post=76972"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/ESCAT\/index.php\/wp-json\/wp\/v2\/tags?post=76972"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}