Workshops Defence Innovative Tunnelling Technology
Defence Deep Dive Session

Quantum Tunnelling and Secure Network Architecture

Classical VPN tunnelling relies on key exchange algorithms (RSA, ECDH) that quantum computers will break. This session examines quantum-secured alternatives for defence network tunnelling: QKD-secured point-to-point links for high-value classified channels, PQC-based VPN replacements for general traffic, and hybrid architectures that combine both approaches. Participants receive an engineering-level assessment of what works today, what requires further development, and the trade-offs between quantum and post-quantum approaches.

Half day (3 hours)
In person or online
Max 30 delegates

Proud to recommend our expert members

Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IONQ - ID Quantique
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
QIZ
Global Quantum Intelligence
Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IONQ - ID Quantique
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
QIZ
Global Quantum Intelligence

Workshop Description

Defence organisations maintain hundreds of encrypted tunnels connecting headquarters, field offices, forward operating bases, and allied networks. These tunnels use IPsec with IKEv2 key exchange or TLS-based VPN solutions, all depending on classical public-key cryptography. Replacing the key exchange layer requires either PQC algorithms (ML-KEM for encapsulation, ML-DSA for authentication) or QKD for physics-based key distribution. Each approach has different deployment constraints, and most defence networks will need both.

This workshop provides a detailed technical comparison of QKD-secured tunnelling and PQC-based tunnelling for defence applications. For QKD tunnels, the session covers trusted node relay networks, the EuroQCI initiative, and satellite QKD for long-distance links, alongside the practical constraints of fibre distance limits (approximately 100 km without repeaters), key rate throughput, and equipment cost. For PQC tunnels, it covers ML-KEM integration into IKEv2, hybrid key exchange during transition, and performance impacts on latency-sensitive military traffic. The interactive section compares both approaches against real defence network requirements.

What participants cover

  • QKD-secured tunnelling: BB84, CV-QKD, and trusted node architectures for classified point-to-point links
  • PQC-based VPN migration: ML-KEM integration into IPsec IKEv2 and TLS 1.3 tunnel configurations
  • Hybrid PQC-QKD architectures: combining information-theoretic and computational security guarantees
  • Quantum repeater roadmap: entanglement swapping, quantum memories, and extended-range QKD timelines
  • Performance analysis: latency, throughput, and key rate impacts on military-grade traffic requirements
  • EuroQCI and national quantum network integration for defence tunnel infrastructure

Preliminary Agenda

Deep Dive Session structure with scheduled breaks. Content is configurable to your organisation's technical level and operational environment.

# Session Topics
1 Defence Tunnel Architecture and Quantum Vulnerability Where current encrypted tunnels are exposed
  • IPsec IKEv2 and TLS VPN key exchange: RSA and ECDH vulnerability under quantum attack
  • HNDL risk for tunnel traffic: classification of data types by sensitivity and shelf life
  • CNSA 2.0 migration requirements for tunnel key exchange and authentication
2 QKD and PQC Tunnelling Technologies Technical deep dive into quantum-safe alternatives
  • QKD-secured tunnels: key management, trusted relay nodes, and integration with existing encryptors
  • PQC VPN migration: ML-KEM in IKEv2, hybrid key exchange, and performance benchmarks
  • Satellite QKD for long-distance tunnel links: LEO downlinks and ground station infrastructure
  • Quantum repeater technology: current state and projected deployment timeline for extended-range QKD
Break, after 60 min
3 Architecture Design and Trade-off Analysis Choosing the right approach for each tunnel type
  • Decision framework: QKD for high-value/short-distance, PQC for general/long-distance, hybrid for critical paths
  • EuroQCI integration: connecting defence tunnel infrastructure to national quantum networks
  • Cost-benefit analysis: equipment, maintenance, and operational overhead for each approach
4 Discussion and Next Steps Planning your tunnel migration
  • Phased migration roadmap: PQC first for general traffic, QKD for highest-value links
  • Vendor landscape: Thales, Rohde and Schwarz, ID Quantique, and PQC VPN solutions

Designed and Delivered By

Workshops are designed and delivered by QSECDEF in collaboration with sector specialists. All facilitators have direct experience in both quantum technologies and defence systems.

QD

Quantum Security Defence

Workshop design and delivery

QSECDEF brings world-leading expertise in post-quantum cryptography, quantum computing strategy, and defence-grade security assessment. Our advisory membership spans 600+ organisations and 1,200+ professionals working at the intersection of quantum technologies and critical infrastructure security.

DE

Defence Sector Partners

Domain expertise and operational validation

Defence workshops are co-delivered with sector specialists who bring direct operational experience in defence organisations. This ensures workshop content is grounded in regulatory, operational, and technical realities specific to the sector.

Commission This Workshop

Sessions are configured around your organisation's technical level, operational environment, and regulatory jurisdiction. Get in touch to discuss requirements and schedule a date.

Contact Us

Quantum technologies are evolving quickly and new developments emerge regularly. This page was last updated on 15/03/2026. For the most current information about course content and suitability for your organisation, we recommend contacting us directly.