Workshops Defence Deep Dive: QKD Technology
Defence Deep Dive Session

Deep Dive: QKD Technology

Quantum key distribution promises information-theoretic security for key exchange, a guarantee no classical or post-quantum algorithm can match. But QKD also carries real constraints: distance limits, throughput bottlenecks, and hardware costs that make it unsuitable for most defence traffic. This session gives network architects and COMSEC leads a technically honest assessment of where QKD delivers genuine value and where PQC is the better choice.

Half day (3 hours)
In person or online
Max 30 delegates

Proud to recommend our expert members

Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IONQ - ID Quantique
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
QIZ
Global Quantum Intelligence
Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IONQ - ID Quantique
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
QIZ
Global Quantum Intelligence

Workshop Description

QKD exploits quantum mechanical properties to distribute encryption keys with security guaranteed by physics rather than computational assumptions. The BB84 protocol with decoy states is the most mature implementation, deployed in metropolitan fibre networks by vendors including ID Quantique and Toshiba. Newer protocols such as CV-QKD eliminate the need for single-photon detectors, while MDI-QKD and twin-field QKD remove entire classes of detector side-channel attacks that have compromised earlier implementations.

For defence organisations, QKD occupies a specific niche. It is appropriate for high-value, short-distance point-to-point links where information-theoretic security justifies the hardware investment: nuclear command and control, embassy-to-capital channels, and SCIF interconnects. It is not a replacement for PQC across general defence IT. Current fibre-based QKD operates reliably to approximately 100 km without quantum repeaters, which remain at least a decade from operational deployment. Satellite QKD extends reach but introduces its own constraints around weather, orbital windows, and ground station security. This session examines both the capabilities and the boundaries.

What participants cover

  • BB84 with decoy states, CV-QKD, MDI-QKD, and twin-field QKD protocol mechanics
  • Trusted node, MDI mesh, and satellite QKD network architectures (including EuroQCI)
  • Distance, throughput, and cost constraints for each QKD approach
  • QKD versus PQC decision framework for different defence communication scenarios
  • Quantum repeater technology roadmap and realistic deployment timelines
  • Vendor landscape and NCSC/BSI procurement guidance for government QKD deployments

Preliminary Agenda

Deep Dive Session structure with scheduled breaks. Content is configurable to your organisation's technical level and operational environment.

# Session Topics
1 QKD Protocol Foundations Physics-based key distribution versus computational security
  • BB84 with decoy states: single-photon sources, basis reconciliation, and privacy amplification
  • Continuous-variable QKD (CV-QKD): homodyne/heterodyne detection, Gaussian modulation, and composable security proofs
  • Measurement-device-independent QKD (MDI-QKD) and twin-field QKD: removing detector side-channel attacks
2 QKD Network Architectures for Defence From point-to-point links to metropolitan and wide-area networks
  • Trusted node relay networks: key management, node compromise models, and the EuroQCI architecture
  • MDI mesh topologies: untrusted relay nodes and star/ring configurations
  • Satellite QKD: LEO downlinks (Micius experiment), daylight operation constraints, and defence implications
  • Quantum repeater roadmap: entanglement swapping, quantum memories, and the gap between theory and deployment
Break, after 50 min
3 QKD Versus PQC: Trade-off Framework for Defence When each approach fits and when it does not
  • Information-theoretic security versus computational hardness: what QKD guarantees that PQC cannot
  • Practical limitations: distance constraints (typically under 100 km without repeaters), key rate throughput, and hardware cost
  • QKD for high-value point-to-point links: nuclear command and control, embassy networks, SCIF interconnects
  • PQC for everything else: why most defence traffic will use ML-KEM/ML-DSA, not QKD
4 Discussion and Next Steps Evaluating QKD for your defence environment
  • Vendor landscape: ID Quantique, Toshiba, KETS Quantum Security, and SpeQtral
  • Procurement considerations: NCSC and BSI guidance on QKD deployment in government networks

Designed and Delivered By

Workshops are designed and delivered by QSECDEF in collaboration with sector specialists. All facilitators have direct experience in both quantum technologies and defence systems.

QD

Quantum Security Defence

Workshop design and delivery

QSECDEF brings world-leading expertise in post-quantum cryptography, quantum computing strategy, and defence-grade security assessment. Our advisory membership spans 600+ organisations and 1,200+ professionals working at the intersection of quantum technologies and critical infrastructure security.

DE

Defence Sector Partners

Domain expertise and operational validation

Defence workshops are co-delivered with sector specialists who bring direct operational experience in defence organisations. This ensures workshop content is grounded in regulatory, operational, and technical realities specific to the sector.

Commission This Workshop

Sessions are configured around your organisation's technical level, operational environment, and regulatory jurisdiction. Get in touch to discuss requirements and schedule a date.

Contact Us

Quantum technologies are evolving quickly and new developments emerge regularly. This page was last updated on 15/03/2026. For the most current information about course content and suitability for your organisation, we recommend contacting us directly.