Quantum Computer Networks and the Application of Quantum Key Distribution to Banking Data Security

Authors

Keywords:

Quantum Computing, Cybersecurity, Quantum Key Distribution (QKD), Banking Data Security, Quantum Networks

Abstract

The development of quantum computing has a significant impact on cybersecurity, particularly in the banking sector, which relies heavily on data confidentiality and integrity. Classical cryptographic algorithms are at risk of becoming vulnerable due to the ability of quantum computers to break encryption systems using algorithms such as Shor's, raising the need for new security technologies based on quantum mechanical principles. This study analyzes the concept of quantum computer networks, identifies implementation challenges, and examines case studies of Quantum Key Distribution (QKD) applications in banking data security systems. The research method used is a descriptive approach through literature analysis and case studies of QKD applications in global financial networks. The results show that QKD can improve the security of encryption key exchanges through an eavesdropping detection mechanism that relies on changes in the state of photons, thus enabling communications that are theoretically impossible to intercept without detection. Case studies of the SwissQuantum Network and financial networks in China demonstrate that the implementation of QKD has successfully improved the security of data communications between bank branches and data centers. However, this study also identified several key challenges, such as high infrastructure costs, limited transmission distances, and the complexity of integration with existing cryptographic systems and conventional networks. Furthermore, human resource readiness, regulatory support, and long-term investment are key factors in the successful implementation of this technology.  This study concludes that QKD is a promising security solution for the banking sector in facing future quantum computing threats, although its adoption requires strategic planning, technological readiness, and comprehensive policies.

References

[1] M. Takeoka, S. Guha, and M. Wilde, “Fundamental rate-loss tradeoff for optical quantum key distribution,” Nature Communications, 2014. doi:10.1038/ncomms6235

[2] V. Scarani et al., “The security of practical quantum key distribution,” Rev. Mod. Phys., 2009. doi:10.1103/RevModPhys.81.1301

[3] N. Gisin and R. Thew, “Quantum communication,” Nature Photonics, 2007. doi:10.1038/nphoton.2007.22

[4] H.-K. Lo, M. Curty, and K. Tamaki, “Secure quantum key distribution,” Nature Photonics, 2014. doi:10.1038/nphoton.2014.149

[5] S. Pirandola et al., “Advances in quantum cryptography,” Advances in Optics and Photonics, 2020. doi:10.1364/AOP.361502

[6] S. Aaronson, “The limits of quantum computers,” Scientific American, 2008. doi:10.1038/scientificamerican0508-62

[7] M. Razavi, “An introduction to quantum communications,” IEEE Communications Surveys & Tutorials, 2018. doi:10.1109/COMST.2018.2817460

[8] F. Xu et al., “Secure quantum key distribution with realistic devices,” Rev. Mod. Phys., 2020. doi:10.1103/RevModPhys.92.025002

[9] C. Elliott, “The DARPA quantum network,” Quantum Communications and Cryptography, 2006. doi:10.1007/0-387-23455-7_13

[10] A. Muller et al., “Quantum cryptography over 23 km of installed telecom fibre,” Europhysics Letters, 1997. doi:10.1209/epl/i1997-00336-0

[11] Y. Liu et al., “Experimental quantum key distribution over 404 km fiber,” Physical Review Letters, 2021. doi:10.1103/PhysRevLett.126.250502

[12] B. Fröhlich et al., “A quantum key distribution system for secure data transmission,” Nature, 2013. doi:10.1038/nature12493

[13] C. Panayi et al., “Memory-assisted quantum key distribution,” New Journal of Physics, 2019. doi:10.1088/1367-2630/ab5c12

[14] R. Bedington, J. Arrazola, and A. Ling, “Progress in satellite quantum key distribution,” npj Quantum Information, 2017. doi:10.1038/s41534-017-0014-4

[15] S. Wang et al., “Field test of quantum communication in bank networks,” Optica, 2022. doi:10.1364/OPTICA.454727

[16] H. Zbinden et al., “SwissQuantum: A quantum network,” IEEE Journal of Selected Topics in Quantum Electronics, 2011. doi:10.1109/JSTQE.2011.2108131

[17] J. Yin et al., “Satellite-to-ground entanglement distribution,” Science, 2017. doi:10.1126/science.aan3211

[18] M. Sasaki et al., “Field test of quantum key distribution in Tokyo,” Optics Express, 2011. doi:10.1364/OE.19.010387

[19] X. Zhang et al., “Intercity quantum communication network in China,” Nature Photonics, 2022. doi:10.1038/s41566-022-00979-y

[20] A. Brouwer et al., “Quantum security in financial communication,” Journal of Financial Technology, 2022. doi:10.2139/ssrn.4032911

[21] D. Kasture et al., “Impact of quantum computing on cryptography,” IEEE Access, 2020. doi:10.1109/ACCESS.2020.2968410

[22] R. Singh and S. Yadav, “Quantum-safe cryptography,” Journal of Information Security and Applications, 2021. doi:10.1016/j.jisa.2021.103139

[23] Y. Chen et al., “A review of QKD networks,” Entropy, 2020. doi:10.3390/e22040435

[24] L. Zhang et al., “Practical challenges in QKD deployment,” Optics Communications, 2023. doi:10.1016/j.optcom.2023.129027

[25] P. W. Shor, “Algorithms for quantum computation,” Proceedings of FOCS, 1994. doi:10.1109/SFCS.1994.365700

Published

2025-10-31

How to Cite

Putra, F. A., Setiaji, B. I., & Syafri, A. N. (2025). Quantum Computer Networks and the Application of Quantum Key Distribution to Banking Data Security. Journal of Information Systems and Business Technology, 1(3), 93-98. https://journal.jci.co.id/jisbt/article/view/298