Abstract
The advent of quantum computing poses transformative implications for cybersecurity, privacy, and societal equity. This systematic review looks at current insights, evaluates potential threats, and recommends proactive strategies for mitigating quantum risks. The review leverages recent survey data, expert analyses, and global policy assessments to examine the quantum threat timeline and its broader ramifications, particularly emphasizing the ethical dimensions and the digital divide in technologically advanced versus developing regions. The aim of the study was to analyze existing research to find gaps in policy and ethical dilemma around quantum computing. This review looks at structured international governance, legal frameworks for quantum data sovereignty, and incentive-based models for equitable transition to advocate for a multilayered approach when it comes to quantum computing.
Keywords: Quantum, Computing, Ethics, AI, Security
1. Introduction
Quantum computing, a paradigm shift from classical computing, utilizes quantum bits (qubits) that exploit superposition and entanglement.1 This unique capability enables the processing of complex computations exponentially faster than traditional systems. Quantum computing’s potential applications span diverse sectors, including drug discovery, materials science, optimization problems, artificial intelligence, and cryptography. According to McKinsey (2023), quantum advancements could generate up to $1.3 trillion in value by 2035 across various industries.2
However, alongside these transformative opportunities, quantum computing introduces substantial risks, notably concerning cybersecurity vulnerabilities, ethical concerns about privacy and data security, and exacerbation of the socio-economic digital divide.3 This report aims to holistically explore these aspects, offering insights into potential safeguards and strategies for equitable and secure quantum integration.
Quantum theory’s historical roots trace back to Max Planck’s quantum hypothesis in 1900, which introduced the concept of quantized energy levels, setting the foundation for quantum mechanics.4.
Albert Einstein’s explanation of the photoelectric effect in 1905 further elaborated on the particle nature of light, supporting quantum theory’s evolution.5
These discoveries laid the groundwork for the development of quantum computing, notably advanced by Richard Feynman’s conceptualization of quantum simulations in 1981 and Peter Shor’s development of a quantum algorithm for factoring integers in 1994.6,7
Quantum computers are projected to compromise existing encryption schemes like RSA and ECC within the next two decades.8 The Global Risk Institute’s 2024 Quantum Threat Timeline Report indicates a 19%9
IBM reports suggest that practical quantum computing capabilities could be realized by 2030, highlighting an urgent need to prioritize the development of quantum-resistant cryptographic protocols to safeguard sensitive data and infrastructure. These advancements underline the critical need for continuous investment in quantum research, particularly in error-correction methodologies and hardware scalability.
This review aims to assess the ethical implications of quantum advancements, focusing on privacy, security, and the digital divide. It highlights current global initiatives addressing quantum cybersecurity threats and recommends proactive strategies for safe migration to quantum-safe cryptographic systems.10 Furthermore, it contributes to the global discourse on ethical technology adoption, ensuring inclusive and responsible quantum development. By addressing ethical considerations and promoting equitable access, this report underscores the importance of preemptive action in safeguarding digital security.
2. Methodology
This is a systematic review of peer-reviewed articles published, government reports and documentation, reports, and articles on quantum computing. Search terms included “quantum computing security,” “post-quantum cryptography,” “quantum ethics,” and “digital divide and emerging tech.” The main sources comprise the reports of National Institute of Standards and Technology (NIST) on post-quantum cryptography, the 2024 Global Risk Institute Quantum Threat Timeline Report, the White House National Security Memo (2022) for quantum-resistant algorithms, and the publications by the industry leaders of technology, regarding the post-quantum security measures. Results were analyzed thematically and grouped into categories such as cybersecurity risks, privacy issues, and digital divide. Inclusion criteria used was from a peer-reviewed journal or credible institutional publication and/or directly addressed one or more of themes of the review. Sources mainly published in the last 2 decades were also primarily used.
3. Results and Discussion
Quantum computing introduces both immense potential and profound risks, particularly regarding cybersecurity and ethical concerns. The following sections detail these aspects and offer a nuanced discussion of their broader implications.
3.1 Quantum Computing and Cybersecurity Threats
Quantum computers are likely to render current cryptographic algorithms vulnerable, notably RSA and ECC, which form the foundation of global digital security frameworks.7 The sheer computational power of quantum systems, once optimized, will enable rapid decryption of encrypted data, dismantling existing security protocols. One of the most pressing concerns is the risk of Harvest Now, Decrypt Later (HNDL) attacks, in which information is collected to be decoded when quantum technology allows. There have already been multiple incidents that resemble HNDL attacks on a national level: in 2016, Canadian internet traffic to South Korea was caught being rerouted to China; in 202011, data from large tech companies such as Google, Amazon, Facebook and 200 other networks were being redirected to Russia.12
In such scenarios, adversaries intercept and store encrypted data with the intention of decrypting it when quantum technology matures.13 These attacks pose significant threats to national security, financial institutions, and the privacy of individuals. Sensitive governmental and corporate data could be compromised, with long-term implications for economic stability and trust in digital systems. Newer studies also model the cost implications of transitioning from legacy cryptography, especially for small businesses and developing states.14
The Mosca Inequality provides a pragmatic framework for understanding quantum risk. It suggests that if the combined shelf-life of data and the time required for system migration surpasses the time until quantum decryption becomes viable, the data is effectively at risk.15 Therefore, it is imperative for organizations to initiate transitions to quantum-resistant cryptography well in advance. The urgency of this transition is underscored by recent NIST guidelines, which advocate for immediate action in developing and deploying quantum-safe algorithms.8,16
But adoption is limited by infrastructure constraints, compliance costs, and lack of global coordination. Recent toolkits such as MITRE’s Quantum Risk Management Toolkit offer guidance for prioritizing migration timelines.17
However, this migration is fraught with challenges. Transitioning infrastructures on a global scale entails significant financial costs and logistical complexity. Compatibility with legacy systems is a concern, as is ensuring consistent global compliance. Moreover, the cybersecurity sector faces a skills gap, with a shortage of professionals trained in quantum security solutions. Addressing these challenges requires coordinated action, substantial investment, and international collaboration.
3.2 Ethical Concerns and the Digital Divide
Quantum computing’s ethical implications extend beyond cybersecurity, intersecting with issues of equity, access, and societal impact. The digital divide remains one of the most concerning facets. Advanced quantum systems, with their high costs and technological complexities, are likely to be concentrated within affluent nations and corporations. This imbalance could deepen global inequalities, leaving under-resourced regions vulnerable to exploitation and exclusion from the quantum economy.
According to the World Economic Forum (2024), over 60% of developing countries lack basic infrastructure necessary for digital transformation.19
Without proactive measures, these nations may face heightened cybersecurity risks and economic marginalization. Furthermore, the complexity of quantum systems could create a knowledge divide, where only those with specialized education and resources can participate in or benefit from quantum advancements. To mitigate this, international frameworks must prioritize equitable access and capacity-building initiatives. Investments in educational programs focused on quantum science and cybersecurity, alongside affordable access strategies, will be pivotal.
Privacy concerns also feature prominently in quantum ethical discussions. The potential for quantum systems to decrypt data previously thought secure introduces complex ethical questions about privacy, consent, and data sovereignty. Organizations must adopt robust ethical frameworks to guide data handling practices, ensuring that technological advancements do not come at the cost of fundamental human rights.
Global responses have been mixed but encouraging. The European Union’s hybrid cryptography initiatives and Canada’s national quantum strategy offer valuable blueprints for broader adoption.20,21
Nonetheless, these efforts must be expanded to include marginalized regions and emphasize cross-border cooperation. Ethical guidelines should also be developed to govern the application of quantum technologies, with a focus on promoting fairness and mitigating harm.11,12
4. Comparative Analysis: Blockchain vs. Quantum Security
Blockchain is often used as a decentralized solution when it comes to security, but it is not immune to quantum threats. ECDSA signatures used in most blockchain protocols (e.g., Bitcoin, Ethereum) are vulnerable to quantum attacks.22,23 ,23 Hybrid models are emerging where blockchain protocols integrate post-quantum cryptographic algorithms like Falcon or SPHINCS+.24
Comparative analysis shows that quantum-safe cryptography offers greater long-term resilience but lacks blockchain’s decentralization and immutability.23,25 Table 1 compares blockchain and quantum security across five categories: scalability, energy use, security under quantum threat, implementation complexity, and governance models.
Criteria | Blockchain | Quantum |
Scalability | Moderate | High (depending on algorithm) |
Energy Efficiency | Low (Proof-of-Work) | High |
Quantum Resistance | Vulnerable to quantum attacks | Resilient (e.g., Kyber, Falcon) |
Decentralization | High | Low |
Adoption Complexity | Moderate to High | High (requires infrastructure overhaul) |
Recommendations
Early adoption of quantum-safe algorithms is crucial to mitigate potential risks. Providing accessible resources and incentives for small businesses and developing nations is necessary to ensure an inclusive transition. Establishing a Quantum Ethics Consortium under the UN will support international cooperation will help ensure equitable access to quantum technology and promote best practices for cryptographic resilience. It can help implement and enforce global best practices for data handling, cybersecurity, and transparency that reflect international ethical norms, especially to ensure protections for at risk populations.26,27 Additionally, modeled after the GDPR, this new treaty would set global standards for data sovereignty, consent, encryption, and ethical surveillance in a quantum-enabled world. It would also include opt-in clauses for developing countries and encourage participation through development aid or technical training packages.28
Encouraging interdisciplinary research will facilitate better understanding and navigation of ethical concerns arising from quantum advancements, with a particular focus on socio-economic implications and long-term digital equity. To decentralize the R&D pipeline, governments should support localized labs, university partnerships, and exchange programs in emerging economies. These efforts should be accompanied by scholarship pipelines and joint public-private partnerships that build domestic expertise and reduce dependency on foreign technologies.29,30,31
Moreover, governments could provide tax credits, grants, or low-interest loans to businesses transitioning to NIST-certified post-quantum cryptographic systems. Focus should be placed on SMEs and public sector entities in vulnerable regions, ensuring global cryptographic parity.22,14
Furthermore, governments and NGOs should fund community-based learning modules, workshops, and curricula that promote understanding of quantum risk and personal data security—especially in regions with low digital literacy.32
Lastly, public awareness campaigns are essential to raise understanding of quantum risks and mitigation strategies, contributing to the creation of informed, resilient communities.
4. Conclusion
Quantum computing heralds both unprecedented opportunities and significant risks. On one hand, it offers the potential to revolutionize industries such as medicine, materials science, logistics, and cryptography, with economic benefits projected to reach trillions of dollars in the coming decades. On the other hand, its disruptive potential poses serious threats to current cybersecurity frameworks, privacy norms, and global equity. The anticipated ability of quantum systems to break existing cryptographic codes could render much of the world’s sensitive data vulnerable, fundamentally altering the security landscape.
The ethical implications extend beyond security concerns. Quantum technology, if left unchecked, could deepen global inequalities, creating a significant digital divide between technologically advanced nations and those lacking the infrastructure or resources to engage with quantum advancements. Without deliberate efforts to ensure inclusivity, marginalized communities may be excluded from the benefits of quantum progress, perpetuating socio-economic disparities. Ethical frameworks and international collaborations are essential to prevent such scenarios and promote equitable access to quantum opportunities.32,33
A critical challenge lies in balancing the race for technological supremacy with ethical responsibility. Governments, corporations, and academic institutions must collaborate to ensure that the pursuit of quantum advancements is accompanied by robust security measures, transparent ethical standards, and accessible educational initiatives. Such collaborations should focus on developing quantum-safe cryptographic systems, investing in quantum research, and providing platforms for global knowledge exchange. Regulatory frameworks and cross-border agreements will also be key in setting standardized guidelines and preventing misuse.
The findings presented are constrained by varying expert opinions and the speculative nature of quantum technology timelines. Additionally, limitations in global data availability and regional differences in technological infrastructure may influence the interpretation of these findings. Socio-political factors affecting technology accessibility were also outside the scope of this study but warrant further exploration. Future research should incorporate longitudinal studies to observe evolving impacts and mitigation effectiveness.
Furthermore, raising public awareness is vital. As quantum technology permeates various sectors, ensuring that individuals understand its implications and are equipped with the knowledge to protect their privacy is fundamental. Educational campaigns and policy initiatives must address public concerns and promote responsible digital citizenship in a quantum-enabled world.
In conclusion, the path toward quantum innovation is as challenging as it is promising. The transformative potential of quantum computing can be harnessed responsibly only through collective, coordinated, and conscientious efforts. Proactive, ethical, and inclusive strategies are essential to safeguarding global security and ensuring that quantum progress benefits all of humanity. Governments, private sectors, and global institutions must rise to this occasion, navigating the quantum era with foresight, integrity, and a shared commitment to equitable progress.
References
- M. A. Nielsen, I. L. Chuang. Quantum computation and quantum information. Cambridge University Press (2000). [↩]
- McKinsey & Company. The future of quantum computing: value potential through 2035. https://www.mckinsey.com/business-functions/mckinsey-digital/our-insights/the-quantum-computing-opportunity (2023). [↩]
- M. Mosca, M. Piani. Quantum threat timeline report 2024. Global Risk Institute, https://globalriskinstitute.org/publication/2024-quantum-threat-timeline-report/ (2024). [↩]
- M. Planck. On the theory of the energy distribution law of the normal spectrum. Verhandlungen der Deutschen Physikalischen Gesellschaft, 2, 202–204 (1900). [↩]
- A. Einstein. On a heuristic point of view concerning the production and transformation of light. Annalen der Physik, 17, 132–148 (1905). [↩]
- R. P. Feynman. Simulating physics with computers. International Journal of Theoretical Physics, 21, 467–488 (1982). [↩]
- P. W. Shor. Algorithms for quantum computation: discrete logarithms and factoring. Proceedings 35th Annual Symposium on Foundations of Computer Science, 124–134 (1994). [↩] [↩]
- L. Chen, S. Jordan, Y. Liu, D. Moody, R. Peralta, D. Smith-Tone, D. S. Shumow. Report on post-quantum cryptography. NIST IR 8105. https://doi.org/10.6028/NIST.IR.8105 (2016). [↩] [↩]
- M. Mosca, M. Piani. Quantum threat timeline report 2024. Global Risk Institute, https://globalriskinstitute.org/publication/2024-quantum-threat-timeline-report/ (2024). [↩]
- M. Mosca, R. Mullholland. A framework for cryptographic migration. https://uwaterloo.ca/institute-for-quantum-computing/sites/default/files/uploads/files/2017cryptomigration-v5.pdf (2017). [↩]
- ITnews. China systematically hijacks internet traffic: researchers. https://www.itnews.com.au/news/china-systematically-hijacks-internet-traffic-researchers-514537 (2018). [↩] [↩]
- ZDNet. Russian telco hijacks internet traffic for Google, AWS, Cloudflare, and others. https://www.zdnet.com/article/russian-telco-hijacks-internet-traffic-for-google-aws-cloudflare-and-others/ (2018). [↩] [↩]
- Keyfactor. Harvest now, decrypt later: the race to post-quantum cryptography. https://www.keyfactor.com/blog/harvest-now-decrypt-later-quantum-cryptography/ (2024). [↩]
- Ferguson, H. (2023). Interoperability Challenges in PQC Deployment. https://aclanthology.org/2023.pqc-interop [↩] [↩]
- M. Mosca. Cybersecurity in an era with quantum computers: will we be ready? IEEE Security & Privacy, 16(5), 38–41 (2018). [↩]
- NIST. Post-Quantum Cryptographic Algorithms. https://csrc.nist.gov/projects/post-quantum-cryptography [↩]
- MITRE. (2022). Quantum Risk Management Toolkit. https://www.mitre.org/publications/technical-papers/quantum-risk-management-toolkit [↩]
- M. Mosca, M. Piani. Quantum threat timeline report 2024. Global Risk Institute, https://globalriskinstitute.org/publication/2024-quantum-threat-timeline-report/ (2024). [↩]
- World Economic Forum. Global digital economy report. https://www.weforum.org/reports/global-digital-economy-report-2024 (2024). [↩]
- ENISA. Post-quantum cryptography: current state and quantum-resistant solutions. https://www.enisa.europa.eu/publications/post-quantum-cryptography (2024). [↩]
- Government of Canada. Canada’s national quantum strategy. https://ised-isde.canada.ca/site/national-quantum-strategy/en (2023). [↩]
- NIST. Post-Quantum Cryptographic Algorithms. https://csrc.nist.gov/projects/post-quantum-cryptography [↩] [↩]
- Lu, Y., et al. (2022). A Survey on Quantum-Safe Cryptographic Algorithms. https://doi.org/10.1109/ACCESS.2022.3146791 [↩] [↩]
- Daryabar, F., et al. (2021). Post-Quantum Cryptography: A Review. https://doi.org/10.1016/j.cose.2021.102252 [↩]
- Thapa, C., et al. (2023). Global Quantum Policy: Equity and Regulation. https://doi.org/10.1016/j.tele.2023.102057 [↩]
- Thapa, C., et al. (2023). Global Quantum Policy: Equity and Regulation. https://doi.org/10.1016/j.tele.2023.102057 [↩]
- Allen, D. (2023). Quantum Threats to Global South: A Policy Perspective. https://policyreviewjournal.org/quantum-south-2023 [↩]
- White House OSTP. (2022). National Security Memo on Quantum. https://www.whitehouse.gov/briefing-room/statements-releases/2022/05/04 [↩]
- Lee, A. (2023). Inclusive Innovation in Quantum Computing. https://www.nature.com/articles/s41586-023-06154-8 [↩]
- White House OSTP. (2022). National Security Memo on Quantum. https://www.whitehouse.gov/briefing-room/statements-releases/2022/05/04 [↩]
- Singh, P. (2021). Bridging the Quantum Divide. https://link.springer.com/article/10.1007/s10207-021-00537-7 [↩]
- Tan, M. (2022). Encryption Ethics in the Age of Quantum. https://journals.ssrn.com/abstract=4067025 [↩] [↩]
- EU Quantum Flagship. (2023). Equity and Funding Overview. https://qt.eu/about-quantum-flagship/equity-funding [↩]