{"id":247152,"date":"2025-03-20T01:01:21","date_gmt":"2025-03-20T01:01:21","guid":{"rendered":"https:\/\/globetimeline.com\/ar\/tech\/rewrite-this-title-in-arabic-uk-cyber-security-watchdog-warns-on-future-risk-of-quantum-computer-hacking\/"},"modified":"2025-03-20T01:01:21","modified_gmt":"2025-03-20T01:01:21","slug":"rewrite-this-title-in-arabic-uk-cyber-security-watchdog-warns-on-future-risk-of-quantum-computer-hacking","status":"publish","type":"post","link":"https:\/\/globetimeline.com\/ar\/tech\/rewrite-this-title-in-arabic-uk-cyber-security-watchdog-warns-on-future-risk-of-quantum-computer-hacking\/","title":{"rendered":"rewrite this title in Arabic UK cyber security watchdog warns on future risk of quantum computer hacking"},"content":{"rendered":"<p>Summarize this content to 2000 words in 6 paragraphs in Arabic Stay informed with free updatesSimply sign up to the Cyber Security myFT Digest &#8212; delivered directly to your inbox.Britain\u2019s cyber security watchdog has warned businesses and governments to prepare for the arrival of quantum computer hacking by 2035 and switch to stronger encryption methods that the new technology cannot compromise. In guidelines published on Thursday, the National Cyber Security Centre, a branch of signals intelligence agency GCHQ, said the risks posed by the rapid development of quantum computers were not being taken seriously enough and called for organisations to begin preparing now. \u201cThe threat to cryptography from future large-scale, fault-tolerant quantum computers is now well understood,\u201d the NCSC said. Quantum computing, which exploits the physics of subatomic particles to perform functions that existing computers cannot, remains largely in its infancy. But given the pace of recent advances and huge investments in the technology, the watchdog\u2019s guidelines point to \u201cQ-day\u201d \u2014 when a robust quantum computer will be able to crack the most common encryption method used to secure our digital data \u2014 occurring by the middle of next decade.However, an NCSC spokesperson cautioned that the 2035 deadline did not amount to a prediction of when a quantum computer capable of hacking would be viable. \u201cWe want the migration to post-quantum cryptography to be driven by the availability of mature technical solutions to counter the threat, and believe that 10 years is a sufficient time for these solutions to evolve,\u201d they said. \u201cThere is less inherent uncertainty in this approach than in predicting the development of quantum computing.\u201dQuantum computers will eventually be able to crunch numbers exponentially faster than standard computers that use binary bits to make calculations. Using quantum \u201cqubits\u201d, instead of \u201cbits\u201d in classical computing, they will be able to efficiently solve the hard mathematical problems that secure the public key cryptography protecting most networks today. Last year the US National Institute of Standards and Technology, a government agency, published three approved security algorithms that states and companies can use to safeguard information from quantum hacking.The NCSC recommended a timetable for migrating networks to use post-quantum cryptography, saying adjustments would have to start as early as 2028 in order to avoid a rush when the first quantum computers arrive.\u00a0The agency advised organisations to carry out a \u201cfull discovery exercise\u201d and build a migration plan by 2028 in order to guard sensitive data. The ambition was to avoid a potential \u201cbig panic\u201d caused by a badly executed switch, it said, calling for improved awareness of the threat. \u201cVarious countries have carried out industry surveys on PQC readiness and the numbers come out pretty low,\u201d the watchdog\u2019s spokesperson said. Europol, the EU\u2019s police agency, warned in a report on Tuesday that quantum computing, along with artificial intelligence and blockchain, had become a \u201ccatalyst\u201d for crime, driving \u201ccriminal operations\u2019 efficiency by amplifying their speed, reach, and sophistication\u201d.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summarize this content to 2000 words in 6 paragraphs in Arabic Stay informed with free updatesSimply sign up to the Cyber Security myFT Digest &#8212; delivered directly to your inbox.Britain\u2019s cyber security watchdog has warned businesses and governments to prepare for the arrival of quantum computer hacking by 2035 and switch to stronger encryption methods<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[63],"tags":[],"class_list":{"0":"post-247152","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-tech"},"_links":{"self":[{"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/posts\/247152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/comments?post=247152"}],"version-history":[{"count":0,"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/posts\/247152\/revisions"}],"wp:attachment":[{"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/media?parent=247152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/categories?post=247152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/globetimeline.com\/ar\/wp-json\/wp\/v2\/tags?post=247152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}