Workshops Cyber Defence QRNG and QKD
Cyber Defence Full Day Workshop

QRNG and QKD for Cyber Defence Applications

This workshop covers the operational and technical case for quantum random number generation and quantum key distribution in defence and critical infrastructure networks. It examines where these technologies add genuine security value and where software-based PQC is the better path.

Full day (6 hours + Q&A)
In person or online
Max 30 delegates

Proud to recommend our expert members

Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside

Workshop Description

Covers quantum random number generation and quantum key distribution for defence and critical infrastructure networks. Examines QRNG entropy sources and device architectures, QKD protocol families (BB84, CV-QKD, MDI-QKD), network deployment models for classified environments, and the vendor landscape. Provides an honest assessment of where these technologies add genuine security value versus where software-based PQC is sufficient.

QRNG devices exploit quantum mechanical processes (vacuum fluctuations, single-photon detection, amplified spontaneous emission) to generate entropy that is certifiably unpredictable under quantum mechanics. QKD uses quantum states to distribute symmetric keys with information-theoretic security, meaning the key exchange is secure against any computational attack, including from a future fault-tolerant quantum computer. The practical question for defence organisations is not whether these properties are real. They are. The question is whether the operational complexity and cost of deploying QRNG hardware and QKD fibre or free-space links is justified for your specific network topology, threat model, and classification level. For most general-purpose encrypted communications, NIST post-quantum algorithms (ML-KEM, ML-DSA) provide adequate protection at far lower deployment cost. QKD adds genuine value for point-to-point high-classification links where information-theoretic key exchange is a requirement. QRNG adds value where entropy source certification to BSI AIS 31 PTG.3 or equivalent is mandated. This workshop maps those boundaries with specificity.

What participants cover

  • QRNG entropy source physics: vacuum fluctuation, photon arrival time, ASE, and homodyne detection approaches with their respective entropy rates and certification pathways
  • QKD protocol mechanics: BB84 with decoy states, CV-QKD with Gaussian modulation, and MDI-QKD for removing detector vulnerabilities, including security proof assumptions
  • Network deployment architectures: trusted node chains, MDI mesh topologies, fibre distance budgets (circa 100 km BB84, 300+ km twin-field), and satellite QKD for global reach
  • Defence integration patterns: QKD overlay on existing classified networks, key management system interfaces, and operational constraints for air-gapped environments
  • PQC versus QKD trade-off framework: where information-theoretic security is genuinely required versus where NIST PQC algorithms are the more practical choice, informed by NSA CNSA 2.0 and ETSI guidance
  • Vendor assessment: independent comparison of QRNG and QKD hardware suppliers including ID Quantique, Toshiba, QuantumCTek, KETS Quantum Security, Quside, and the EuroQCI infrastructure programme

Preliminary Agenda

Full day workshop structure with scheduled breaks. Content is configurable to your organisation's network architecture, classification requirements, and existing cryptographic infrastructure.

# Session Topics
1 The Quantum Communications Landscape for Defence Where QRNG and QKD sit in the defence security stack
2 QRNG: Entropy Sources, Device Architectures, and Certification From quantum physics to certified random numbers
  • Entropy source physics: vacuum fluctuation, photon arrival time, amplified spontaneous emission (ASE), and homodyne detection
  • Device architectures: standalone QRNG modules (ID Quantique Quantis, Toshiba QRNG), chip-scale integration, and PCIe card form factors
  • Certification standards: BSI AIS 31 (Class PTG.2/PTG.3), NIST SP 800-90B entropy assessment, and Common Criteria evaluation
Break, after 50 min
3 QKD Protocols and Key Distribution Mechanics How quantum key distribution works and where it breaks
  • DV-QKD protocols: BB84, B92, and decoy-state BB84 with security proofs against photon number splitting (PNS) attacks
  • CV-QKD: Gaussian-modulated coherent state protocols and their compatibility with standard telecom components
  • MDI-QKD and twin-field QKD: removing detector side-channel vulnerabilities and extending fibre distance limits beyond 300 km
4 Interactive Demonstration QKD key exchange simulation and QRNG entropy analysis
  • Facilitator-led BB84 key exchange simulation: basis selection, sifting, error estimation, and privacy amplification walkthrough
  • QRNG entropy output analysis: min-entropy estimation, NIST SP 800-22 statistical test suite interpretation, and bias detection
  • Key rate calculation exercise: channel loss, detector efficiency, error rate, and secure key rate for a given fibre link budget
Break, after 60 min
5 Network Architectures and Defence Integration Deploying QKD in defence and critical infrastructure networks
  • Trusted node networks versus measurement-device-independent (MDI) mesh topologies for classified environments
  • Fibre QKD: distance limits (circa 100 km standard BB84, 300+ km twin-field), channel loss budgets, and dark fibre requirements
  • Free-space and satellite QKD: Micius experiment results, daylight operation challenges, and LEO constellation plans for global coverage
6 PQC versus QKD: The Trade-Off Framework for Defence Where each technology adds genuine value and where it does not
  • QRNG value assessment: when hardware entropy genuinely exceeds DRBG quality and when it does not (CSPRNGs with good seeding are sufficient for most applications)
  • QKD value assessment: information-theoretic security versus computational security, and why QKD requires an authenticated classical channel (which itself needs PQC or pre-shared keys)
  • NSA CNSA 2.0 and ETSI guidance: why both agencies recommend PQC as the primary migration path and position QKD as a complementary layer for specific high-value links
7 Vendor Landscape, Procurement, and Q&A Independent guidance on QRNG and QKD suppliers
  • QRNG vendors: ID Quantique, Toshiba, KETS Quantum Security, Quside, and chip-integrated solutions from SK Telecom and others
  • QKD vendors: ID Quantique Cerberis, Toshiba QKD, QuantumCTek, ThinkQuantum, and the EuroQCI initiative for pan-European QKD infrastructure

Designed and Delivered By

Workshops are designed and delivered by QSECDEF in collaboration with quantum communications specialists. All facilitators have direct experience in both quantum key distribution technologies and defence network security.

QD

Quantum Security Defence

Workshop design and delivery

QSECDEF brings world-leading expertise in post-quantum cryptography, quantum computing strategy, and defence-grade security assessment. Our advisory membership spans 600+ organisations and 1,200+ professionals working at the intersection of quantum technologies and critical infrastructure security.

QC

Quantum Communications and Defence Network Partners

Domain expertise and operational validation

Quantum communications workshops are co-delivered with specialists who bring direct operational experience in QKD network deployment, QRNG integration, and defence communications infrastructure. This ensures workshop content is grounded in the physical, operational, and procurement realities of deploying quantum communications hardware in classified environments.

Commission This Workshop

Sessions are configured around your organisation's network topology, classification requirements, existing cryptographic infrastructure, and procurement constraints. Get in touch to discuss requirements and schedule a date.

Contact Us

Quantum technologies are evolving quickly and new developments emerge regularly. This page was last updated on 15/03/2026. For the most current information about course content and suitability for your organisation, we recommend contacting us directly.