Skip to content Skip to Search
Skip navigation

Fighting cybercrime in the age of quantum computing

The Middle East must learn to navigate the threats and the opportunities

An engineer works on a cooling unit for a quantum computing system in a New York lab. The technology could crack 'traditional' encryption in seconds SeeQC/Handout via Reuters
An engineer works on a cooling unit for a quantum computing system in a New York lab. The technology could crack 'traditional' encryption in seconds

In 1981, when the Nobel prize-winning physicist Richard Feynman proposed a model for a “quantum computer”, no one imagined how the technology would overcome the limitations of traditional computers.

By harnessing the world of subatomic physics, quantum computers enable us to process, store and transmit information with speed. This presents several opportunities for the Middle East.

In Saudi Arabia, quantum computing is accelerating the kingdom’s drive to achieve its Vision 2030 objectives. 

Zapata Computing, a software company, is working with King Abdullah University of Science and Technology to examine how quantum technologies can aid research, as well as important sectors such as oil and gas.

In the UAE, the region’s first quantum computer has been unveiled at Abu Dhabi’s Technology Innovation Institute, brought in from Finland. 

However, there is a downside to the age of quantum computing. We must prepare ourselves for new cybersecurity risks.

The emergence of this technology makes critical areas such as government intelligence, digital payments, blockchain transactions, health records and national infrastructure more susceptible to security breaches. Businesses must remain vigilant and take measures to mitigate these threats. 

To understand the risks, we need to look at the basics of quantum computing. Conventional computers rely on bits as the fundamental unit of information, which can only be either 0 or 1.

By contrast, quantum computers use qubits, or quantum bits, which can exist in more than one state simultaneously.

This empowers quantum computers to perform complex calculations exponentially faster than classical computers, potentially solving previously unfixable problems.

But quantum computing can compromise the foundations of cybersecurity, primarily through its impact on encryption and public key infrastructure (PKI) encryption in particular. It threatens the integrity of digital documents and the encryption of sensitive health and financial data.

It may eventually become powerful enough to crack PKI encryption using an algorithm originally developed in 1994 by Peter Shor (Shor’s algorithm). This scenario is being termed the “cryptopocalypse”​​​​. Confidential business communications and sensitive customer information could be exposed to malicious actors in seconds.

To counteract this, governments and private organisations should be continuously assessing their cybersecurity protocols to identify potential vulnerabilities. They will need to adopt post-quantum cryptography techniques. This can be complex and costly, requiring substantial changes to existing systems and protocols.

Warding off the ‘cryptopocalypse’

First, enterprises need to identify those algorithms that are vulnerable to quantum computing attacks.

Next, we encourage organisations to revisit and manage their cryptography capabilities effectively, focusing on clarity and a willingness to adapt​​. Collaboration across various sectors is essential to create more robust defence strategies​​.

Third is the transition to quantum-resistant encryption. This involves adopting new algorithms that are believed to be secure against attacks​​.

Fourth, risk managers should examine the shelf life of data and the life cycles of their systems to determine the appropriate timing for implementing mitigation measures​​.

As we stand on the brink of this quantum era, I find myself re-evaluating my understanding of digital security. Our 2024 Digital Trust Insights survey indicates that mitigating cyber-risk remains a top priority for organisations in the Middle East – even higher than microeconomic volatility, inflation and geopolitical risks.

The strategies I have outlined above are just the beginning. We need a concerted effort from governments, industry and academia to develop robust quantum-resistant cryptographic standards.

I also see a need for greater awareness and education on quantum risks among cybersecurity professionals. This is a new frontier and we need to equip ourselves with the knowledge and tools to navigate it.

A proactive approach to cybersecurity is more critical than ever. We do not know for sure when a breakthrough will happen, but if the introduction of ChatGPT and other large language models is anything to go by, the impact is likely to be sudden – and in this scenario it could be devastating.

We need to plan for quantum threats, rather than react to them after the fact. By doing so, we can ensure that our digital infrastructure remains secure and resilient in the face of quantum computing’s unprecedented capabilities.  

Haitham Al Jowhari is partner, digital infrastructure and cybersecurity, at PwC Middle East in Saudi Arabia

Latest articles

A tourist with an arabian foal at Alhazm stud, Khubash, Saudi Arabia. 106m tourists visited the kingdom last year

Saudi Arabia hits tourism target seven years early

More than 106 million tourists visited Saudi Arabia last year, surpassing the kingdom’s 2030 target and prompting it to set a new goal of welcoming 150 million annual visitors by the end of the decade, according to the Ministry of Tourism. Achieving the milestone target of the Vision 2030 economic roadmap seven years early cements […]

Asked about reports the IMF loan could rise to $12bn, managing director Kristalina Georgieva said: 'There is nothing wrong in thinking big'

IMF expects bigger loan deal for Egypt within weeks

The International Monetary Fund expects a financing package for Egypt to be finalised within weeks, its chief said on Tuesday – while also entertaining speculation that the loan could rise to $12 billion. Speaking on the sidelines of a G20 finance meeting in Brazil, IMF managing director Kristalina Georgieva told Reuters that issues delaying the […]

Ericcson and Turkcell signed the 6G agreement at Mobile World Congress in Barcelona

Ericsson and Turkcell to lead 6G research in Turkey

Swedish telecom company Ericsson and Turkish operator Turkcell will begin advancements on research and development of 6G in Turkey. The sixth-generation wireless network will use higher frequencies than its predecessor 5G and provide substantially higher capacity and much lower latency. The advent of 6G networks holds promise of faster connectivity in various sectors including wireless […]