Abstract :
The financial sector faces escalating cybersecurity threats, exacerbated by the potential emergence of quantum computers capable of compromising widely used classical cryptographic methods. The paper includes an AI-enhanced general review on the use of quantum cryptography to secure financial transactions. Using machine learning methods to assess the principles, potential, and constraints to Quantum Key Distribution (QKD) and PostQuantum Cryptography (PQC), the review is an improvement of the existing view of the current state of quantumsafe technologies. The opportunities and challenges in adopting these technologies in the key financial services, such as banking, digital payments, and blockchain, are analyzed. It has been identified that a hybrid approach that utilizes both QKD to perform secure key exchange and PQC to protect data over the long term can be considered an effective strategy. The review ends by identifying the main future research opportunities and the necessity of standardized, cost-efficient, and scalable quantum security solutions, guided by AI-informed insights, to protect the financial sector against future quantum attacks.
Keywords :
Post-Quantum Cryptography (PQC), Quantum Cryptography, Quantum Key Distribution (QKD), Quantum Random Number Generators (QRNGs).References :
- Aggarwal, D., Brennen, G.K., Lee, T., Santha, M., & Tomamichel, M. (2017). Quantum attacks on Bitcoin, and how to protect against them. Ledger, 3, 68-90.
- Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the International Conference on Computer Systems and Signal Processing (pp. 175-179). IEEE.
- (2023). Quantum computing and the financial system: opportunities and risks. Bank for International Settlements.
- BIS Innovation Hub. (2023). Project Rosalind: Exploring Quantum-Resilient Central Bank Digital Currencies.
- Boneh, D., & Lipton, R. J. (1995). Quantum Cryptanalysis of Hidden Linear Functions. Advances in Cryptology – CRYPTO’95, 424-437.
- Chen, L., Jordan, S., Liu, Y.K., Moody, D., Peralta, R., Perlner, R., & Smith-Tone, D. (2016). Report on Post-Quantum Cryptography. NISTIR 8105.
- Dynes, J.F., Lucamarini, G., Fröhlich, B., et al. (2019). Long-distance QKD at 1550 nm wavelength. Scientific Reports, 9(1), 1-11.
- Elliott, C. (2002). Quantum cryptography for the masses. In Secure Communication Protocols, 55-68.
- (2021). Cyber resilience: Range of practices for operational continuity in the financial sector. Financial Stability Board.
- Gisin, N., Ribordy, G., Tittel, W., & Zbinden, H. (2002). Quantum cryptography. Reviews of modern physics, 74(1), 145.
- Gisin, N., Fasel, J., Gautier, J. D., et al. (2007). Quantum cryptography over 67 km of installed optical fiber. Optics express, 15(21), 14881-14888.
- Herrero-Collantes, M., & García-Escartín, J. C. (2017). Quantum random number generators. Reviews of Modern Physics, 89(1), 015004.
- Hillery, M., Bužek, V., & Berthiaume, A. (1999). Quantum secret sharing. Physical Review A, 59(3), 1829.
- (2023). Cost of a Data Breach Report. IBM.
- Ikeda, K., Fujii, K., & Yamamoto, N. (2021). Quantum Proof-of-Stake: Quantum-resistant blockchain protocol. Quantum Science and Technology, 6(4), 045001.
- Kimble, H. J. (2008). The quantum internet. Nature, 453(7198), 1023-1030.
- Kitaev, A. Y., Shen, A. H., & Vyalyi, M. N. (2002). Classical and quantum computation. Graduate Studies in Mathematics, 47. American Mathematical Society.
- Lu, Y., Li, Z., & Ng, S. K. (2020). Quantum Attack Detection for QKD Networks Using Machine Learning. IEEE Access, 8, 197813-197822.
- Ma, X., Yuan, X., Cao, Z., & Zhang, Z. (2016). Quantum Random Number Generation. npj Quantum Information, 2(1), 16021.
- McEliece, R. J. (1978). A public-key cryptosystem based on algebraic coding theory. DSN progress report, 44, 114.
- Mosca, M. (2018). Cybersecurity in an Era with Quantum Computers: Will We Be Ready? IEEE Security & Privacy, 16(5), 38-41.
- National Institute of Standards and Technology. (n.d.). Post-Quantum Cryptography. Retrieved from https://www.nist.gov/programs/cryptography/post-quantum-cryptography
- Nojoumian, M., & Lapa, L. (2022). Post-Quantum Cryptography for Digital Currencies. arXiv preprint, arXiv:2212.12042.
- Pirandola, S., Andersen, U.L., Banchi, L., et al. (2020). Advances in Quantum Cryptography. Advances in Optics and Photonics, 12(4), 1012-1236.
- Sangouard, N., Simon, C., de Riedmatten, H., & Gisin, N. (2011). Quantum repeaters. Reviews of Modern Physics, 83(1), 33.
- Shor, P. W. (1999). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM journal on computing, 26(5), 1484-1509.
- Xu, F., Wu, J., & Guo, H. (2020). Quantum Random Number Generators: A Review. IEEE Access, 8, 137115-137126.

