Complete a 5G cryptography inventory
All links to official websites of government agencies in the Kingdom of Saudi Arabia end with .gov.sa
Secure websites in the Kingdom of Saudi Arabia use the HTTPS protocol for encryption.
Registered with the Digital Government Authority under number :
20250519510Quantum computing is a new type of computing that helps us solve extremely complex problems. Unlike classical computers, which execute operations sequentially, a quantum computer can evaluate many possibilities at the same time.
Think of a lock with millions of keys:
a normal computer tests them one by one, a quantum computer can test many at once.
Encryption is like a giant puzzle that would take classical computers thousands of years to solve. A sufficiently powerful quantum computer could break it in hours or days, making today’s digital locks unsafe.
Even before such machines arrive, the threat is real: attackers can copy encrypted data now and decrypt it later using future quantum power, a strategy known as Harvest Now, Decrypt Later. This drives the urgent need for Post-Quantum Cryptography (PQC) to protect sensitive data against future quantum attacks. PQC involves developing quantum-resistant encryption methods that remain secure even against quantum-powered attacks.
According to Cloudflare Radar, hybrid post-quantum TLS now protects ~50% of HTTPS traffic globally.
A major telecom operator ran a pilot on a 5G network using post-quantum cryptography to protect customer data. The goal was to reduce “Harvest Now, Decrypt Later” risk and prepare to scale. Service worked as expected; errors were monitored.
The side diagram outlines the journey of a 5G telecom operator pilot, from scoping to expansion.
Complete a 5G cryptography inventory
Classify long-lived data & keys (subscriber data, billing info)
Run pilots to check end-to-end compatibility
Enable hybrid PQC on critical 5G identity/core links
Expand pilots for PQC signatures (dual-sign firmware & SIM/eSIM) and track fallbacks