QUANTUM TECHNOLOGIES IN DEFENSE AND SECURITY

Authors

DOI:

https://doi.org/10.63978/3083-6476.2026.1.4.05

Keywords:

quantum technologies, quantum computing, quantum sensors, quantum communication, quantum encryption, quantum cryptography, cybersecurity

Abstract

The article focuses on quantum technologies and the prospects for their application in the defense and security sectors. Based on an analysis of the current state of development of quantum technologies and their applications in defense and security, three main areas are identified: quantum computing, quantum communication, and quantum sensors. For each of these, a specific set of applications, advantages, and limitations is identified. It is noted that quantum computing in defense and security finds application primarily in four subfields: post-quantum cryptography, quantum cryptography, cyber threat detection, and cryptanalysis; quantum communication ensures secure information transmission by utilizing the physical properties of quantum states, particularly the principle of the impossibility of cloning a quantum state, with its primary practical application being Quantum key distribution and its promising application being the quantum internet; quantum sensors are the category of quantum technologies closest to operational deployment, as they utilize the hypersensitivity of quantum states to external disturbances to achieve measurement accuracy unattainable by classical devices. A summary of the main areas of application for quantum technologies in defense and security indicates that quantum sensors have the nearest practical implementation horizon (5–7 years), while quantum computing will have the greatest strategic impact on cryptographic infrastructure due to the threat it poses to existing asymmetric encryption algorithms—which is precisely why the transition to post-quantum standards is becoming urgent. Therefore, given the significant interest in and funding for quantum technologies from both the civilian industry and governments, it is expected that these technologies will continue to develop and new quantum applications will become available over the next five to ten years, and new advances in the development of quantum technologies may bring new opportunities for the military, but for the military to actually reap the benefits of new quantum technologies, they need to actively engage in this field and guide the development and implementation of military applications of quantum technologies.

References

Mikhel van Ameronhen (2021). Kvantovi tekhnolohii v oboroni i bezpetsi [Quantum technologies in defense and security]. Retrieved from: https://www.nato.int/docu/review/uk/articles/2021/06/03/kvantov-tehnolog-voboron-bezpets/index.html (accessed 14.01.2026) [in Ukrainian].

Danyliuk, I. A., Lazuta, R. H., Kutsaiev, V. V., & Tsymbal, I. V. (2025). Doslidzhennia perspektyv zastosuvannia kvantovykh tekhnolohii u Zbroinykh Sylakh Ukrainy [Research into the prospects of applying quantum technologies in the Armed Forces of Ukraine]. Systemy i tekhnolohii zviazku, informatyzatsii ta kiberbezpeky. 7. Retrieved from: https://doi.org/10.58254/viti.7.2025.03.28; https://journal.viti.edu.ua/index.php/cicst/article/view/113 [in Ukrainian].

Lysetskyi, Yu. M., Bokhanchenko, O. S., & Surma, A. I. (2024). Vykorystannia kvantovykh tekhnolohii dlia zabezpechennia kiberzakhystu [The use of quantum technologies to ensure cyber defense]. 30 rokiv VA imeni Yevheniia Berezniaka: aktualni problemy rozvidky, kontrrozvidky, pravookhoronnoi diialnosti v umovakh shyrokomasshtabnoi zbroinoi ahresii rf proty Ukrainy: nauk. zb. mizhvid. nauk.-prakt. konf. 54 (рр. 114–115). Kyiv [in Ukrainian].

The White House. (2022). National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems (NSM-10). Retrieved from: https://www.whitehouse.gov/briefing-room/statements-releases/2022/05/04/national-securitymemorandum-on-promoting-united-states-leadership-in-quantum-computing-while-mitigating-risks-tovulnerable-cryptographic-systems/ (accessed 20.01.2026).

Sahu, S. K., & Mazumdar, K. (2024). State-of-the-art analysis of quantum cryptography: applications and future prospects. Frontiers in Physics, 12. Retrieved from: https://doi.org/10.3389/fphy.2024.1456491.

Ali, S. & et al. (2025). Next-Generation Quantum Security: The Impact of Quantum Computing on Cybersecurity – Threats, Mitigations, and Solutions. Computers & Electrical Engineering, 128. Article 110649. Retrieved from: https://doi.org/10.1016/j.compeleceng.2025.110649.

The Soufan Center. (2024). Quantum Computing and the Evolving Cyber Threat Landscape. IntelBrief. Retrieved from: https://thesoufancenter.org/intelbrief-2024-november-15/ (accessed 22.01.2026)

U.S. Government Accountability Office (GAO). (2024). Future of Cybersecurity: Leadership Needed to Fully Define Quantum Threat Mitigation Strategy. GAO-25-107703. Washington, D.C. Retrieved from: https://www.gao.gov/products/gao-25-107703 (accessed 18.01.2026).

Dervisevic, E., Tankovic, A., Fazel, E., Kompella, R., Fazio, P., Voznak, M., & Mehic, M. (2025). Quantum Key Distribution Networks – Key Management: A Survey. ACM Computing Surveys. Retrieved from: https://doi.org/10.1145/3730575.

Quantum Technologies and Cybersecurity: Threats and Defenses. (2025). PostQuantum.com. Retrieved from: https://postquantum.com/quantum-computing/quantum-cybersecurity/ (accessed 22.01.2026).

Purohit, K., & Vyas, A. K. (2025). Quantum key distribution through quantum machine learning: a research review. Frontiers in Quantum Science and Technology, 4. Article 1575498. Retrieved from: https://doi.org/10.3389/frqst.2025.1575498.

SandboxAQ, Defense Innovation Unit advance quantum navigation for GPS-denied operations. (2025). GPS World. Retrieved from: https://www.gpsworld.com/sandboxaq-defense-innovation-unit-advancequantum-navigation-for-gps-denied-operations/ (accessed 12.01.2026).

Burkey, M. T. (2025). How Quantum Sensing Will Help Solve GPS Denial in Warfare. Fellow Publication. Center for Global Security Research, Lawrence Livermore National Laboratory. LLNL-TR2004820. Retrieved from: https://cgsr.llnl.gov/sites/cgsr/files/2025-06/Burkey_QS_final.pdf (accessed 28.01.2026).

Sayler, K. M. (2024). Defense Primer: Quantum Technology. CRS In Focus IF11836. Congressional Research Service. Washington, D.C. Retrieved from: https://www.congress.gov/crs-product/IF11836 (дата звернення: 15.01.2026).

Ekert, A. K. (1991). Quantum Cryptography Based on Bell’s Theorem. Physical Review Letters, 67, 6, 661–663. Retrieved from: https://doi.org/10.1103/PhysRevLett.67.661.

Shor, P. (1994). Algorithms for Quantum Computation: Discrete Logarithms and Factoring. Foundations of Computer Science, 1994 Proceedings., 35th Annual Symposium on – IEEE, 124-134.

Lysetskyi, Yu. M., Surma, A. I., & Danchenko, O. I. (2024). Kvantovi tekhnolohii. Novi mozhlyvosti v kiberbezpetsi [Quantum technologies. New opportunities in cybersecurity]. Visnyk voiennoi rozvidky, 81, 44-47 [in Ukrainian].

SandboxAQ, Defense Innovation Unit advance quantum navigation for GPS-denied operations. (2025). GPS World. Retrieved from: https://www.gpsworld.com/sandboxaq-defense-innovation-unit-advancequantum-navigation-for-gps-denied-operations/ (accessed 12.01.2026).

Published

2026-03-30

How to Cite

Lysetsyi, Y. (2026). QUANTUM TECHNOLOGIES IN DEFENSE AND SECURITY. Military Strategy and Technology, (1(4), 61–70. https://doi.org/10.63978/3083-6476.2026.1.4.05

Issue

Section

НАЦІОНАЛЬНА БЕЗПЕКА ТА ОБОРОНА