Workshops Defence Deep Dive: QRNG Technology
Defence Deep Dive Session

Deep Dive: QRNG Technology

Every cryptographic operation begins with randomness. Classical pseudo-random number generators derive entropy from deterministic processes that can, in principle, be predicted or manipulated. Quantum random number generators exploit fundamental quantum mechanical indeterminacy to produce provably unpredictable output. This session examines the physics, hardware implementations, certification requirements, and practical integration paths for deploying QRNG across defence cryptographic infrastructure.

Half day (3 hours)
In person or online
Max 30 delegates

Proud to recommend our expert members

Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IONQ - ID Quantique
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
QIZ
Global Quantum Intelligence
Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IONQ - ID Quantique
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
QIZ
Global Quantum Intelligence

Workshop Description

QRNG devices generate randomness from quantum physical processes: vacuum state fluctuations, single-photon path decisions, or amplified spontaneous emission noise. Unlike classical entropy sources that rely on environmental sampling (mouse movements, thermal noise, interrupt timing), quantum sources are fundamentally non-deterministic. No amount of information about the device's prior state allows prediction of the next output bit.

For defence organisations, QRNG addresses a specific vulnerability in the cryptographic stack. Key generation for AES-256, ML-KEM, and ML-DSA requires high-quality entropy. Nonce generation for TLS 1.3, IPsec IKEv2, and MACsec must be unpredictable to prevent replay and chosen-nonce attacks. This session covers the physics behind each QRNG approach, chip-scale hardware from vendors such as ID Quantique and Quside, certification under AIS 31 and NIST SP 800-90B, integration with hardware security modules, and deployment considerations for constrained defence devices including tactical radios and UAV controllers.

What participants cover

  • Quantum entropy source physics: vacuum fluctuation, photon arrival, ASE, and homodyne detection
  • Discrete-variable and continuous-variable QRNG architectures with throughput benchmarks
  • Certification and evaluation: AIS 31 (BSI), NIST SP 800-90B, FIPS 140-3, and Common Criteria
  • Randomness extraction pipelines: min-entropy estimation, Toeplitz hashing, and health testing
  • HSM integration paths for Thales Luna, Utimaco CryptoServer, and Entrust nShield
  • Embedded QRNG deployment for tactical radios, UAV systems, and weapons platform firmware

Preliminary Agenda

Deep Dive Session structure with scheduled breaks. Content is configurable to your organisation's technical level and operational environment.

# Session Topics
1 Entropy Sources and Quantum Randomness Why classical PRNGs are insufficient for defence cryptography
  • Pseudo-random versus true random: deterministic algorithms, seed predictability, and side-channel leakage
  • Quantum entropy sources: vacuum fluctuation, photon arrival time, amplified spontaneous emission (ASE), and homodyne detection
  • Certification standards: AIS 31 (BSI), NIST SP 800-90B, and Common Criteria for QRNG evaluation
2 QRNG Architectures and Hardware From laboratory devices to chip-scale integration
  • Discrete-variable QRNG: single-photon detection, photon number splitting, and path branching implementations
  • Continuous-variable QRNG: vacuum state measurement, homodyne detection, and heterodyne approaches
  • Chip-scale QRNG: CMOS-compatible designs (e.g., ID Quantique Quantis, Quside FMC400), throughput benchmarks, and integration paths
  • Randomness extraction: min-entropy estimation, Toeplitz hashing, and post-processing pipelines for certified output
Break, after 55 min
3 Defence Applications and Integration Where QRNG adds genuine security value
  • Key generation for AES-256, ML-KEM, and ML-DSA: entropy requirements and CNSA 2.0 compliance
  • Nonce generation for TLS 1.3, IPsec IKEv2, and MACsec in classified networks
  • Hardware security modules (HSMs) with QRNG: Thales Luna, Utimaco CryptoServer, and nShield integration
  • Embedded QRNG for constrained defence devices: tactical radios, UAV controllers, and weapons system firmware
4 Discussion and Next Steps Evaluating QRNG for your environment
  • Vendor comparison: throughput, form factor, certification status, and cost per bit
  • Procurement pathway: NCSC guidance, FIPS 140-3 validation status, and Common Criteria evaluation

Designed and Delivered By

Workshops are designed and delivered by QSECDEF in collaboration with sector specialists. All facilitators have direct experience in both quantum technologies and defence systems.

QD

Quantum Security Defence

Workshop design and delivery

QSECDEF brings world-leading expertise in post-quantum cryptography, quantum computing strategy, and defence-grade security assessment. Our advisory membership spans 600+ organisations and 1,200+ professionals working at the intersection of quantum technologies and critical infrastructure security.

DE

Defence Sector Partners

Domain expertise and operational validation

Defence workshops are co-delivered with sector specialists who bring direct operational experience in defence organisations. This ensures workshop content is grounded in regulatory, operational, and technical realities specific to the sector.

Commission This Workshop

Sessions are configured around your organisation's technical level, operational environment, and regulatory jurisdiction. Get in touch to discuss requirements and schedule a date.

Contact Us

Quantum technologies are evolving quickly and new developments emerge regularly. This page was last updated on 15/03/2026. For the most current information about course content and suitability for your organisation, we recommend contacting us directly.