Workshop Description
QRNG devices generate randomness from quantum physical processes: vacuum state fluctuations, single-photon path decisions, or amplified spontaneous emission noise. Unlike classical entropy sources that rely on environmental sampling (mouse movements, thermal noise, interrupt timing), quantum sources are fundamentally non-deterministic. No amount of information about the device's prior state allows prediction of the next output bit.
For defence organisations, QRNG addresses a specific vulnerability in the cryptographic stack. Key generation for AES-256, ML-KEM, and ML-DSA requires high-quality entropy. Nonce generation for TLS 1.3, IPsec IKEv2, and MACsec must be unpredictable to prevent replay and chosen-nonce attacks. This session covers the physics behind each QRNG approach, chip-scale hardware from vendors such as ID Quantique and Quside, certification under AIS 31 and NIST SP 800-90B, integration with hardware security modules, and deployment considerations for constrained defence devices including tactical radios and UAV controllers.
What participants cover
- Quantum entropy source physics: vacuum fluctuation, photon arrival, ASE, and homodyne detection
- Discrete-variable and continuous-variable QRNG architectures with throughput benchmarks
- Certification and evaluation: AIS 31 (BSI), NIST SP 800-90B, FIPS 140-3, and Common Criteria
- Randomness extraction pipelines: min-entropy estimation, Toeplitz hashing, and health testing
- HSM integration paths for Thales Luna, Utimaco CryptoServer, and Entrust nShield
- Embedded QRNG deployment for tactical radios, UAV systems, and weapons platform firmware