Workshops Emergency Services PQC Migration for Emergency Comms
Emergency Services Full Day Workshop

PQC Migration for Emergency Communications: TETRA, LTE, and 5G

A technical workshop for emergency communications engineers and programme managers migrating TETRA, LTE MCPTT, and 5G MCX voice and data services to post-quantum cryptographic standards.

Full day (6 hours + Q&A)
In person or online
Max 30 delegates

Proud to recommend our expert members

Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside

Workshop Description

Emergency communications systems present a layered PQC migration challenge. TETRA networks (Airwave in the UK) use TEA1-TEA4 air interface encryption algorithms with key management that depends on classical cryptography. The transition to LTE-based mission-critical push-to-talk (MCPTT) via the Emergency Services Network (ESN) introduces 3GPP authentication (5G-AKA) with its own quantum vulnerabilities. 5G MCX Release 17/18 adds further cryptographic dependencies in group key management, MCPTT floor control, and MCData/MCVideo services. Each layer requires independent PQC assessment and coordinated migration.

This workshop maps the cryptographic dependencies across the emergency communications stack: TETRA air interface (TEA algorithms, authentication, end-to-end encryption), ISSI/CSSI inter-system interfaces, DMO (Direct Mode Operation) cryptography, LTE MCPTT key management (GMS, GCS, KMS), 5G-AKA authentication chain (SEAF, AUSF, UDM), and the ESN/FirstNet programme migration paths. For each dependency, we identify the specific quantum vulnerability, assess the threat timeline using published estimates from ETSI and 3GPP, and evaluate the PQC replacement options. ETSI TR 103 930 (TETRA quantum-safe study) and 3GPP TR 33.875 (quantum-safe 5G) provide the standards framework. Participants leave with a prioritised migration sequence that accounts for the TETRA-to-ESN transition timeline.

What participants cover

  • TETRA air interface encryption: TEA1-TEA4 algorithm quantum assessment, authentication mechanism vulnerabilities, and end-to-end encryption key management under PQC
  • ISSI and CSSI inter-system interface security: cross-network authentication and key exchange between TETRA systems from different manufacturers
  • LTE MCPTT key management: Group Management Server (GMS), Group Communication Server (GCS), and Key Management Server (KMS) cryptographic dependencies
  • 5G-AKA authentication chain: SEAF, AUSF, and UDM key derivation hierarchy; ECIES Profile A/B vulnerability for SUPI concealment (SUCI)
  • ESN/FirstNet migration: coordinating PQC transition with the TETRA-to-LTE/5G platform migration and avoiding double migration costs
  • Standards framework: ETSI TR 103 930 (TETRA quantum-safe study), 3GPP TR 33.875 (quantum-safe 5G), GSMA FS.40/FS.49, and FIPS 203/204/205 algorithm selection

Preliminary Agenda

Full-day session structure with scheduled breaks. Content is configurable to your emergency communications platform, migration timeline, and regulatory jurisdiction.

# Session Topics
1 Emergency Communications Cryptographic Architecture TETRA, LTE MCPTT, and 5G MCX cryptographic layers
2 TETRA Air Interface and Key Management TEA algorithms, authentication, and E2E encryption
  • TEA1-TEA4 algorithm quantum assessment: TEA1 (export) already compromised; TEA2 (Schengen) and TEA3 (public safety) quantum vulnerability timeline
  • TETRA authentication mechanism: challenge-response protocol using classical key derivation; quantum risk to identity spoofing on TETRA networks
  • DMO (Direct Mode Operation) cryptography: simplex key management in direct mode versus infrastructure mode and PQC implications for off-network communications
Break, after 50 min
3 LTE MCPTT and 5G MCX Security 3GPP mission-critical service key management
  • MCPTT key management architecture: GMS group key distribution, KMS identity-based key exchange, and the RSA/ECC dependencies in each server role
  • 5G-AKA authentication chain: SEAF/AUSF/UDM key derivation; ECIES Profile A/B vulnerability for SUPI concealment; ML-KEM replacement path for SUCI
  • MCX R17/R18 group communication: floor control authentication, MCData confidentiality, MCVideo stream encryption, and per-service PQC requirements
4 Inter-System Interfaces and Interoperability ISSI, CSSI, and cross-network security
  • ISSI (Inter-RF Subsystem Interface): authentication and key exchange between TETRA base stations from different manufacturers under PQC
  • CSSI (Console Subsystem Interface): dispatch console authentication and the impact of PQC key sizes on dispatcher workstation performance
  • Cross-technology interop: TETRA-LTE gateway security, IWF (InterWorking Function) authentication, and maintaining interoperability during phased PQC migration
Break, after 45 min
5 Migration Sequencing and ESN Coordination Aligning PQC with the TETRA-to-ESN transition
  • Avoiding double migration: where PQC migration should wait for the ESN platform transition and where it must proceed on TETRA infrastructure now
  • FIPS 203/204/205 algorithm selection for mission-critical communications: ML-KEM for key exchange, ML-DSA for authentication, performance on mission-critical devices
  • Hybrid deployment: running classical and PQC in parallel during the multi-year ESN transition without degrading voice latency or group call setup time
6 Standards and Regulatory Framework ETSI, 3GPP, and Home Office requirements
  • ETSI TR 103 930: TETRA quantum-safe study findings and ETSI TC TCCE roadmap for PQC in professional mobile radio
  • 3GPP TR 33.875: quantum-safe authentication study for 5G and timeline for normative PQC specifications in Release 19/20
  • Home Office critical communications requirements: ESN security standards and PQC compliance expectations for emergency service network operators
7 Q&A and Migration Planning

Designed and Delivered By

Workshops are designed and delivered by QSECDEF in collaboration with sector specialists. All facilitators have direct experience in both quantum technologies and emergency services systems.

QD

Quantum Security Defence

Workshop design and delivery

QSECDEF brings world-leading expertise in post-quantum cryptography, quantum computing strategy, and defence-grade security assessment. Our advisory membership spans 600+ organisations and 1,200+ professionals working at the intersection of quantum technologies and critical infrastructure security.

EM

Emergency Services Partners

Domain expertise and operational validation

Emergency Services workshops are co-delivered with sector specialists who bring direct operational experience in emergency communications engineering, TETRA network operations, and mission-critical broadband deployment. This ensures workshop content is grounded in the interoperability, availability, and safety-of-life requirements of mission-critical communications.

Commission This Workshop

Sessions are configured around your emergency communications infrastructure, ESN migration timeline, and operational requirements. Get in touch to discuss requirements and schedule a date.

Contact Us