Natasha Bwalya, Simon Tembo
Department of Electrical and Electronic Engineering, School of Engineering, The University of Zambia, Zambia
Correspondence to: Natasha Bwalya, Department of Electrical and Electronic Engineering, School of Engineering, The University of Zambia, Zambia.
Email: |  |
Copyright © 2025 The Author(s). Published by Scientific & Academic Publishing.
This work is licensed under the Creative Commons Attribution International License (CC BY).
http://creativecommons.org/licenses/by/4.0/

Abstract
This paper explores the multifaceted effects of quantum computing on cryptography and data security within Zambia's rapidly evolving Information and Communication Technology (ICT) environment. Using a mixed-methods approach combining vulnerability assessments, stakeholder interviews, and global benchmarks, quantum computing appears to be a serious threat to conventional cryptographic systems and a potential solution for enhanced security measures as Zambia undergoes digital transformation. Results show significant vulnerabilities in government communications (92% dependent on quantum-vulnerable RSA-2048) and financial systems (Cryptographic Vulnerability Index = 0.84), with telecommunications infrastructure facing 42% higher migration costs from legacy systems (complexity score = 7.8). Reflecting policy gaps (18% of cybersecurity policies address quantum threats) and workforce shortages (14% of curricula cover quantum-resistant techniques), Zambia's African Quantum Readiness Matrix score of 4.2/10 lags behind regional leaders such as South Africa (7.8/10). By 2027, a 23% annual training shortfall necessitates $6.3 million in investments to produce 890 quantum-literate professionals, alongside addressing technical barriers such as legacy systems (68% of ICT infrastructure) and budget constraints (private-sector migration costs exceeding budgets by 5.25×). The proposed framework prioritizes a National Quantum Security Task Force, phased upgrades of 47 telecom nodes using CRYSTALS-Kyber by 2026, quantum literacy initiatives, local PQC standards, and reallocating 2.5% of ICT budgets ($6.2 million annually). Hybrid encryption and quantum key distribution could reduce national vulnerability by 58% within three years under RSA-2048 systems, which face a 92% quantum decryption risk by 2030.
Keywords:
Quantum computing, Post-quantum cryptography, Zambia ICT ecosystem, Cryptographic vulnerability index, Quantum readiness, CRYSTALS-Kyber, Quantum literacy
Cite this paper: Natasha Bwalya, Simon Tembo, Quantum Computing's Potential for Strengthening Cryptography and Data Security in Zambia's ICT Ecosystem, Advances in Computing, Vol. 14 No. 1, 2025, pp. 1-9. doi: 10.5923/j.ac.20251401.01.
1. Introduction
As Zambia's ICT ecosystem experiences rapid growth, safeguarding sensitive data has become paramount. Traditional cryptographic methods such as RSA and Elliptic Curve Cryptography (ECC) have long protected digital communications by relying on the computational difficulty of complex mathematical problems. However, the emergence of quantum computing now threatens to undermine these conventional defences.Quantum computing represents a paradigm shift in computational power that enables the processing of complex calculations at unprecedented speeds (eMudhra, 2024). This development seriously endangers conventional cryptographic techniques, such as RSA and ECC, which depend on the computational complexity of problems, including discrete logarithms and integer factorization. Particularly, Shor's algorithm among quantum algorithms can quickly resolve these issues, therefore exposing present encryption techniques (Sectigo, 2024).The implications for Zambia's ICT sector are profound. As the country continues to digitize its services and infrastructure, the potential for quantum computers to compromise data security could undermine trust in digital systems and impede technological progress. Moreover, the global race towards quantum supremacy suggests that quantum capabilities may become a reality sooner than anticipated, necessitating proactive measures to secure digital communications (KPMG, 2024).In Zambia, the digital landscape is evolving rapidly, with the ICT sector growing at an average rate of 15% annually over the past five years and internet penetration now exceeding 50% of the population (ZICTA, 2023). However, this growth is accompanied by a troubling increase in cybersecurity incidents by approximately 40% in the past three years-indicating that the nation's digital infrastructure is increasingly vulnerable. Currently, only about 20% of Zambian ICT firms have invested in advanced cybersecurity measures capable of withstanding emerging quantum threats.This research aims to: (1) assess the vulnerabilities of existing cryptographic systems in Zambia to quantum computing threats; (2) explore potential applications of quantum computing in strengthening data security; and (3) propose strategies for Zambia to prepare for the integration of quantum-resistant cryptographic techniques.
2. Literature Review
2.1. Global Quantum Computing Trends
Recent advancements in quantum computing have fundamentally altered the cybersecurity landscape, presenting both existential threats and innovative solutions. Shor's algorithm, which enables quantum computers to factor large integers in polynomial time, poses a critical risk to RSA and elliptic curve cryptography (Singh & Sakk, 2024; Bernstein et al., 2009). Studies project that RSA-2048 encryption, widely used in global digital infrastructure, could be broken by quantum computers within 3–5 years as qubit counts approach 5,000 (Ahmed et al., 2024; IBM, 2025).The National Institute of Standards and Technology (NIST) has responded by standardizing post-quantum cryptography (PQC) algorithms, including CRYSTALS-Kyber for key encapsulation and CRYSTALS-Dilithium for digital signatures (NIST, 2024). These lattice-based methods resist quantum attacks by relying on the Learning with Errors (LWE) problem, a mathematical challenge currently unsolvable by classical or quantum systems (NIST, 2024; Fractal.ai, 2024). Hybrid approaches combining classical and PQC algorithms are now recommended for transitional security (KPMG, 2024).
2.2. Africa’s Quantum Readiness
Africa’s quantum preparedness varies significantly across regions, as shown in Table 1. South Africa leads with a Quantum Readiness Index (QRI) of 7.8/10, driven by its National Quantum Strategy and partnerships with IBM Quantum (SADC, 2025). Kenya follows at 5.1/10, prioritizing quantum literacy programs at universities like Strathmore. Zambia scores 4.2/10, hindered by fragmented policies and legacy infrastructure (SADC, 2025).Table 1. African Quantum Readiness Comparison (2025)  |
| |
|
Regional collaboration is emerging through initiatives like the Africa Quantum Leaders Roundtable (March 2025), which aims to harmonize PQC standards and address shared challenges like workforce gaps (Quantum2025.org, 2025). However, only 15% of SADC nations have ratified the AU’s quantum security guidelines, slowing cross-border data protection efforts (SADC, 2025).
2.3. Zambia’s Cryptographic Landscape
Zambia’s ICT sector faces dual challenges: 68% of infrastructure relies on legacy systems (e.g., RSA-2048), while cybersecurity incidents surged by 40% in 2023–2024 (ZICTA, 2023; Parliament of Zambia, 2022). A 2025 audit revealed that 92% of government communications use quantum-vulnerable encryption, with a Cryptographic Vulnerability Index (CVI) of 0.71 for critical systems (Ministry of Home Affairs, 2025).Workforce gaps exacerbate risks: only 14% of cybersecurity curricula at institutions like Ndola ICT College cover quantum-resistant techniques, compared to 64% in South Africa (Ndola ICT College, 2025). INFRATEL’s fibre-optic network, while expanding, lacks quantum key distribution (QKD) capabilities, limiting secure key exchange to 50 km in urban areas (INFRATEL, 2025). Financial constraints further delay upgrades, with migration costs exceeding private-sector budgets by 5.25× (World Bank, 2025).Efforts to bridge these gaps include the Smart Zambia Initiative, which aims to retrofit 47 telecom nodes with CRYSTALS-Kyber by 2026 (SMART Zambia Institute, 2025). However, policy misalignment persists- only 12% of Zambia’s cybersecurity regulations reference NIST’s PQC standards, compared to 68% in South Africa (SADC, 2025).
3. Methods
3.1. Research Philosophy and Design
This study adopted a pragmatic research philosophy recognizing the dual imperatives of measurable technical performance and contextual interpretations of institutional readiness. This philosophical approach combines the positivist emphasis on measurable criteria with constructivist perspectives, highlighting socio-organizational adaptation. The research employed a composite index based on the equation:Quantum Readiness Index (QRI) = 0.6Tq + 0.4SaWhere Tq represents technical solutions and Sa denotes socio-organizational adaptations. This formulation was essential in measuring the varied readiness of Zambia's ICT sector.A sequential explanatory mixed-methods design was employed, consisting of three interconnected phases: secondary data analysis, a quantitative survey, and qualitative interviews. The secondary data analysis provided historical and contextual foundations for understanding quantum trends, which then informed the quantitative survey designed to assess organizational practices. Finally, qualitative interviews helped to elucidate the underlying causes of observed statistical trends, enabling deeper exploration of implementation challenges.
3.2. Data Collection Framework
3.2.1. Secondary Data Collection
The secondary data collection phase involved a systematic review of government documents, academic literature, and industry reports spanning 2018 to 2023. A content analysis matrix was utilized to identify relevant documents based on a search equation that integrated quantum keywords and local context terms. The relevance of each document was quantified using the formula: | (3.1) |
Where Kq denotes quantum-related keywords, Lc signifies local contextual terms, and Da represents a document age factor.
3.2.2. Primary Data Collection
The primary data collection consisted of a structured quantitative survey and semi-structured qualitative interviews. The survey instrument measured dimensions of organizational preparedness, including a Cryptographic Vulnerability Index (CVI), an Organizational Readiness Metric (ORM), and a Migration Cost-Benefit Analysis. For example, the CVI was computed as: | (3.2) |
Where wi represents the weight assigned to a specific protocol, Ei denotes the exposure duration, and Qt indicates the quantum threat likelihood.The survey sample included representatives from government (30%), telecommunications (20%), academia (25%), and the private sector (25%), ensuring balanced representation of Zambia's ICT landscape.The qualitative component involved in-depth interviews with ICT professionals, policymakers, and academic experts, exploring the cryptographic lifecycle, institutional barriers, and strategic needs for policy development.
3.3. Data Analysis Procedures
For secondary data, a systematic content analysis was conducted based on Bowen's framework, involving the extraction of key information, thematic coding, and policy gap analysis. The Holt-Winters forecasting model was employed to project future trends.The quantitative survey data were processed using SPSS version 27, with descriptive statistics summarizing current practices and inferential statistics, including multiple regression models, predicting the ORM. Factor analysis using Varimax rotation (KMO value of 0.81) helped identify latent constructs underpinning organizational readiness.NVivo software facilitated qualitative data analysis, enabling rigorous thematic analysis following Saldaña's iterative framework. A convergence matrix was constructed to integrate findings from all three data sources, highlighting areas of convergence and divergence.
4. Findings and Discussion
This section presents an integrated analysis of Zambia's quantum security landscape, examining vulnerabilities across critical sectors while simultaneously discussing their implications. Our research reveals significant cryptographic vulnerabilities across government, financial, and telecommunications sectors, compounded by workforce capacity gaps and implementation challenges. The findings suggest an urgent need for coordinated policy responses and strategic investment to achieve quantum resilience before large-scale quantum computers become operational.
4.1. Vulnerability Metrics and Cross-Sectoral Analysis
The Quantum Resilience Gap Index (QRGI) quantified systemic vulnerabilities across Zambia's critical infrastructure sectors, revealing acute risks in financial systems (QRGI = 0.83) and government databases (QRGI = 0.79) (Bankers Association of Zambia, 2025). The index is calculated as: | (4.1) |
where Vs = sector vulnerability score, Ws = sector weight, N = total sectors, Aw = workforce awareness, and At = target awareness.These findings align with INFRATEL's audit identifying 47 vulnerable telecommunications nodes and the Ministry of Home Affairs' revelation that 92% of classified communications rely on quantum-vulnerable RSA-2048 encryption (Ministry of Home Affairs, 2025; INFRATEL, 2025).A comparative analysis against the African Quantum Readiness Matrix (AQRM) positions Zambia 4.2 years behind South Africa's migration timeline, with critical path analysis identifying workforce development delays (ΔT = 14 months) as the primary constraint (IBM, 2025). This skills deficit manifests in delayed Post-Quantum Cryptography (PQC) implementation cycles, with government systems requiring 23% longer migration timelines than technical capacity alone would suggest: | (4.2) |
The high QRGI scores correlate strongly with outdated cryptographic governance frameworks, which score just 2.7/10 on the AQRM policy dimension, highlighting the urgent need for policy reform and technical upgrades (SMART Zambia Institute, 2025).
4.2. Financial Sector Vulnerabilities
The financial sector emerged as particularly vulnerable, with 84% of banking systems using encryption protocols susceptible to Shor's algorithm (Bankers Association of Zambia, 2025). The Cryptographic Vulnerability Index (CVI) for financial institutions is calculated as: | (4.3) |
where Ei = 1,825 days (5-year exposure window), Qt = 0.82 (quantum threat likelihood), and Rp=0.18 (remediation progress). This yields CVIfinance = 0.84, signalling an urgent need for upgrades.
4.3. Government Systems and Classified Communications
Survey data from Zambia's Ministry of Home Affairs (2025) revealed that 92% of classified government communication systems rely on RSA-2048 encryption, which is highly vulnerable to quantum attacks via Shor's algorithm. This vulnerability arises because Shor's algorithm can factor large prime numbers exponentially faster than classical computers, compromising asymmetric encryption methods like RSA (NIST, 2024).The quantum attack timeframe for these systems is modeled as: | (4.4) |
where:• N = 2048-bit key length• Qc = 5×103 (quantum computing capacity in logical qubits)Table 2. Cross-Sectoral Vulnerability Metrics for Zambian Critical Infrastructure  |
| |
|
 | Figure 1a–b. Telecommunications Sector Vulnerability Analysis showing critical nodes, traffic percentages, and risk factors |
Substituting values yields Tbreak = 3.2, indicating a critical vulnerability window of 3–5 years for government systems. This timeframe aligns with global projections of quantum supremacy milestones (IBM, 2025).Government vulnerabilities are particularly concerning given their outdated cryptographic governance frameworks, scoring 2.7/10 on the AQRM policy dimension (SMART Zambia Institute, 2025). Regulatory fragmentation persists across 73% of cybersecurity policies, lacking quantum-specific provisions. The SMART Zambia Institute's draft framework scores only 0.41 on the Quantum Policy Coherence Index (QPCI), compared to South Africa's 0.68 (SMART Zambia Institute, 2025). This fragmentation manifests in conflicting standards between the Communications Authority of Zambia (CAZ) and the Zambia Bureau of Standards (ZABS), creating compliance uncertainties for 62% of surveyed organizations (CAZ, 2025).
4.4. Telecommunications Infrastructure Vulnerabilities
A 2025 audit by INFRATEL identified 47 critical nodes in Zambia's telecommunications infrastructure requiring immediate post-quantum cryptography (PQC) upgrades (INFRATEL, 2025). These nodes handle 68% of national data traffic, including mobile networks, fiber-optic hubs, and satellite links. Despite moderate awareness (34%), the telecommunications sector faces elevated legacy system complexity (Cl = 7.8) due to infrastructure age factors (n = 8 years).The Cryptographic Vulnerability Index (CVI) for telecom infrastructure is calculated as: | (4.5) |
where:• Ei=1,095 (3-year exposure period)• Qt=0.82 (quantum threat likelihood)• Rp=0.23 (remediation progress)This yields CVItelecom = 0.68, signalling high risk. For context, a CVI > 0.5 requires urgent intervention under NIST guidelines (NIST SP 800-208).The telecommunications sector’s moderate workforce awareness (34%) contrasts with its high infrastructure criticality, creating a risk amplification factor of: | (4.6) |
Values > 1.5 indicate systemic instability (ITU, 2024).
4.5. Workforce and Technical Capacity Gaps
Data from Ndola ICT College (2025) reveals that only 14% of cybersecurity curricula address quantum threats, resulting in severe workforce deficiencies. The competency gap is quantified as: | (4.7) |
where:• Sq=127 quantum-literate professionals (2025 estimate)• Dq = 890 required by 2027To close this gap, Zambia needs 23% annual growth in trained professionals, achievable through curriculum reforms at 8 major universities, industry certification programs (1,200 professionals by 2027), and public-sector training initiatives ($6.3M budget over 3 years) (Ndola ICT College, 2025). A three-tier training framework is proposed based on Ndola ICT College's curriculum analysis: | (4.8) |
Where n represents the program year and Ba base capacity (200 professionals/year). This exponential growth model projects training for 1,200 certified experts by 2027 (Ndola ICT College, 2025). | Figure 2. Projected Workforce Growth vs. Demand |
Workforce growth trajectory assuming 23% annual training expansion. Highlights a critical gap in human capital. While projections indicate substantial growth in the quantum-literate workforce (from 127 in 2025 to 723 by 2027), the demand for professionals in 2027 is estimated at 890. This shortfall indicates that even with rapid growth, the pace of workforce development is insufficient to meet market needs, underscoring the necessity for accelerated training programs and educational initiatives to bridge this gap. Figure 2 shows Legacy ciphers (e.g., DES/3DES) remain prevalent in each sector’s cryptographic stack, collectively inflating vulnerability levels most notably in Financial Services. This stacked bar chart highlights the relative impact of each encryption method on overall sector risk.
4.6. Strategic Implementation Challenges and Framework
The Quantum Migration Cost Model (QMCM) estimates sector-specific expenditures: | (4.9) |
Where Iu = 47 infrastructure nodes (telecom), Cp = $18,500/node, Tr = 15,000 training hours, Hc = $45/hour, and Pd = $1.2M productivity losses. The private sector faces the largest funding gap
, necessitating public-private partnerships and international grants (World Bank, 2025).Legacy systems account for 68% of migration complexity, modeled as: | (4.10) |
For 8-year-old systems (n=8) with Av=0.4 (limited vendor support) and An=1.0: | (4.11) |
Scores Cl>5.0 require customized migration strategies, increasing costs by 42% compared to modern systems, according to survey data from an IT private company.
4.7. Resource Allocation and Budget Strategy
The comparative analysis of current versus recommended budget allocations for quantum security implementation reveals systemic underinvestment across Zambia's critical sectors. The government's current 2.1% allocation fails to address RSA-2048 vulnerabilities in classified systems, while academia's modest 1.2% investment needs to quadruple to develop the workforce required for quantum resilience (SMART Zambia Institute, 2025).Resource allocation challenges are quantified through the Quantum Migration Cost Model (QMCM): | (4.12) |
This underfunding compounds technical debt through postponed upgrades, with legacy systems accounting for 68% of migration complexity (Cl=1.38×0.4=7.8). IT Computer Solutions' audit data shows that 42% of critical systems rely on deprecated SSL/TLS implementations, requiring remediation efforts that are 3.2× greater than modern infrastructure upgrades.A five-pillar strategy operationalizes these allocations through targeted investments:Pillar-Based Budget AlignmentThe five-pillar strategy operationalizes these allocations through targeted investments:Pillar 1: National Quantum Security Task ForceEstablishing a task force by Q3 2025 per SMART Zambia's framework would integrate 17 existing initiatives under a unified governance structure. The task force effectiveness metric is calculated as: | (4.13) |
where Ai represents agency alignment scores and Wi sector weighting factors.Initial projections estimate TE=0.68 within 18 months, requiring annual increases of 23% in inter-agency coordination. Survey data from the construction firm.Pillar 2: Phased PQC MigrationCritical infrastructure upgrades by Q2 2026 follow the Cryptographic Vulnerability Index prioritization model: | (4.14) |
Telecommunications networks score a CVI of 0.71, demanding immediate attention, while academic systems (CVI = 0.52) permit phased implementation.Pillar 3: Quantum Literacy ProgramNdola ICT College's curriculum analysis informs a three-tier training framework: | (4.15) |
Table 3. Budget Allocation Analysis for Quantum Security Implementation in Zambia (SMART Zambia Institute, 2025)  |
| |
|
where n represents the program year and Ba base capacity (200 professionals/year). This exponential growth model projects training for 1,200 certified experts by 2027, closing 63% of the workforce gap.Pillar 4: Zambia-Specific PQC StandardsAlignment with NIST SP800-208 incorporates local infrastructure realities through the Compatibility Adjustment Factor (CAF): | (4.16) |
This necessitates modified implementation timelines that are 17% longer than NIST baselines, but prevent compatibility issues affecting up to 42% of systems (Zambia Bureau of Standards, 2025).Pillar 5: Budget Reallocation StrategyThe required budget allocation translates to an annual investment of $6.2M$6.2M distributed through:
Current projections allocate funding as follows:• Government Systems: 38%• Telecommunications Networks: 29%• Private Sector Support Programs: 33%This integrated approach demonstrates potential to reduce national cryptographic vulnerability by 58% within three years, positioning Zambia as a regional leader in quantum security while addressing unique developmental constraints.The success probability model: | (4.17) |
Current inputs yield Ps=0.81, indicating a high likelihood of achieving roadmap objectives with sustained implementation efforts.
5. Conclusions
5.1. Summary of Key Findings
This study evaluated the impact of quantum computing on Zambia’s cryptographic infrastructure, revealing critical vulnerabilities and opportunities for strategic advancement. Government systems relying on RSA-2048 encryption face a 92% risk of quantum decryption within 3–5 years, with classified communications particularly exposed (Ministry of Home Affairs, 2025). Telecommunications infrastructure scored a Cryptographic Vulnerability Index (CVI) of 0.68, with 47 critical nodes handling 68% of national data traffic-requiring urgent post-quantum upgrades. Legacy systems, constituting 68% of Zambia’s ICT infrastructure, amplify migration complexity and costs by 42%.Only 14% of cybersecurity curricula at Zambian institutions address quantum threats, resulting in an 85.7% deficit in quantum-literate professionals relative to 2027 demand projections. This gap jeopardizes the implementation of quantum-resistant protocols and delays sector-wide preparedness (Ndola ICT College, 2025).The private sector faces the most severe budgetary challenges, with quantum migration costs exceeding allocated budgets by a factor of 5.25. Annual investments of $3.4 million are required to address vulnerabilities in banking APIs, digital payment platforms, and enterprise systems (World Bank, 2025).Zambia’s National Digital Transformation Strategy demonstrates only 12% alignment with NIST’s Post-Quantum Cryptography (PQC) standards, reflecting fragmented regulatory frameworks and inadequate integration of quantum-specific provisions. This misalignment risks incompatibility with global security benchmarks and delays critical infrastructure upgrades (SMART Zambia Institute, 2025). | Figure 3. Quantum Migration Timeline showing critical path dependencies and sector-specific implementation phases |
These findings underscore the urgent need for coordinated policy reforms, targeted investments, and workforce development to mitigate quantum threats and position Zambia’s ICT ecosystem for long-term resilience.
5.2. Strategic Recommendations
To address Zambia’s quantum vulnerabilities, this study proposes a four-pillar strategy integrating policy, technical, workforce, and financial interventions. First, policy reforms mandate establishing a National Quantum Security Task Force to coordinate post-quantum cryptography (PQC) migration, enforce NIST SP 800-208 compliance, and oversee a $6.2M annual budget (2.5% of ICT allocations). Legislative updates to the Cyber Security Act will institutionalize quantum-specific audits for critical infrastructure. Second, technical upgrades prioritize high-risk sectors: telecommunications must retrofit 47 nodes with hybrid encryption by Q2 2026 (reducing CVI to ≤0.3), while financial systems adopt CRYSTALS-Kyber for banking APIs. Third, workforce development targets 500 PQC experts by 2027 via curriculum reforms at eight universities, IBM/Microsoft certifications for 1,200 professionals, and a $2.1M World Bank-funded government training program. Fourth, financial mobilization leverages public-private partnerships (private contributions = 0.6×Total Cost − Government Subsidy) and international grants ($4.7M for research, $2.3M for SMEs). An implementation roadmap prioritizes policy harmonization (Q1 2026), telecom upgrades (Q2 2026), workforce expansion (Q4 2027), and budget finalization (Q3 2025), positioning Zambia to reduce vulnerability by 58% within three years and emerge as a regional quantum-security leader. Immediate action is critical to mitigate the 3–5 year RSA-2048 decryption window.
5.3. Future Work
Three strategic initiatives will drive Zambia’s quantum security advancement while bridging technological disparities. Rural Quantum Literacy Programs will deploy mobile education units equipped with solar-powered quantum simulators and VR training modules, integrated with agricultural extension services to address mobile money security for rural users, aiming to train 500 community cyber ambassadors by 2027 and reduce rural quantum awareness gaps from 89% to 45% through $2.1 million in World Bank-funded agricultural partnerships. Urban infrastructure will see phased deployment of Zambia’s first Quantum Key Distribution (QKD) network along the Lusaka-Kitwe fiber corridor by 2027, linking critical financial and energy nodes with benchmarks targeting sub-3% quantum bit error rates over 50 km distances and 58% cost efficiency gains compared to European deployments via Nokia’s QKD-on-chip integration with 5G infrastructure. Regionally, the Zambia-South Africa Quantum Alliance will harmonize SADC payment system migration timelines, develop shared CRYSTALS-Kyber implementation guidelines for cross-border telecoms, and redirect 15% of mining sector AI budgets to joint quantum research, supported by biannual cross-border attack simulations and alignment with African Union cybersecurity standards. Implementation will be accelerated through dedicated funding mechanisms allocating 1.5% of national ICT levies to quantum initiatives and the establishment of a Presidential Quantum Advisory Council by mid-2026, ensuring cohesive policy execution and infrastructure resilience across urban-rural and regional dimensions.
ACKNOWLEDGEMENTS
I extend my deepest gratitude to Dr. Simon Tembo, whose expert guidance and intellectual mentorship fundamentally shaped this research journey. His rigorous academic standards, coupled with his willingness to engage in countless hours of constructive dialogue, transformed theoretical concepts into actionable insights. The methodological framework and analytical depth of this study owe much to his patient mentorship and scholarly wisdom.My sincere appreciation goes to the National Airport Corporation for their institutional support and professional flexibility. The organization's commitment to knowledge advancement was demonstrated through adjusted work schedules, access to operational data, and technological resources that proved indispensable for field research. To my family, your unwavering emotional support during the intensive research phases provided the resilience needed to overcome computational challenges and tight deadlines. Your understanding during late-night coding sessions and weekend data analysis marathons made this achievement possible.Finally, I acknowledge the foundational work of networking pioneers whose published research informed this study's theoretical framework. While space constraints prevent individual recognition, their intellectual contributions form the bedrock upon which this practical implementation stands.
References
[1] | Ahmed, A., Sipola, T. and Hautamäki, J. Cyber protection applications of quantum computing: A review. arXiv preprint. Available at: https://doi.org/10.48550/arxiv.2406.13259. |
[2] | Bankers Association of Zambia. Quantum threats to financial systems. Lusaka: BAZ Publications. |
[3] | Bernstein, D.J. Post-quantum cryptography. Nature, 549 (7671), pp. 188–194. |
[4] | Bunescu, L. and Vârtei, A.M. Modern finance through quantum computing: A systematic literature review. PLOS ONE, 19(4), pp. 1–15. |
[5] | eMudhra. Quantum computing & digital security. Available at: https://emudhra.com. |
[6] | Fractal.ai. The looming threat of quantum computing to data security. Available at: https://fractal.ai/nists-post-quantum-cryptographic-standards/. |
[7] | IBM. Quantum Computing Milestones Report. Armonk, NY: IBM Corporation. |
[8] | INFRATEL. Critical Infrastructure Audit Report. Lusaka: INFRATEL. |
[9] | ITU. Global Cybersecurity Index. Geneva: International Telecommunication Union. |
[10] | KPMG. Quantum is coming – and bringing new cybersecurity threats with it. Available at: https://kpmg.com. |
[11] | Ministry of Home Affairs. National Security Brief. Lusaka: Government of Zambia. |
[12] | National Institute of Standards and Technology (NIST). Post-quantum cryptography standardization. Gaithersburg: NIST Special Publications. Available at: https://csrc.nist.gov/projects/post-quantum-cryptography. |
[13] | Ndola ICT College. Cybersecurity Curriculum Analysis. Ndola: Ndola ICT College. |
[14] | Parliament of Zambia. Information Brief on Cyber Security and Cybercrime Trends. Available at: https://www.parliament.gov.zm. |
[15] | Quantum2025.org Africa Quantum Leaders Roundtable. Available at: https://quantum2025.org. |
[16] | SADC. Cybersecurity Capacity Maturity Report. Gaborone: SADC Secretariat. |
[17] | Sectigo. Quantum computing concerns & positive impacts. Available at: https://sectigo.com. |
[18] | Singh, S. and Sakk, E. Implementation and analysis of Shor's algorithm. TechRxiv. https://doi.org/10.36227/techrxiv.19348752. |
[19] | SMART Zambia Institute. National Digital Transformation Strategy Review. Lusaka: Government of Zambia. |
[20] | World Bank. Digital Infrastructure Financing Report. Washington, DC: World Bank Group. |
[21] | Zambia Information and Communications Technology Authority (ZICTA). Annual report 2022. Lusaka: ZICTA Publications. |