Workshop Description
Technical workshop for network architects and security engineers at telecoms operators. Covers QKD deployment architectures for metro and long-haul fibre backhaul, trusted node configurations, protocol selection (BB84, decoy-state, CV-QKD, MDI-QKD), key injection into TLS 1.3 and IPsec, ETSI GS QKD standards compliance, and the current vendor landscape including Toshiba, ID Quantique, QuantumCTek, and Huawei deployments. Addresses how to evaluate QKD against PQC for specific network segments.
Telecoms operators face a specific question that PQC migration alone does not answer: for which network segments does quantum key distribution provide security value beyond what post-quantum algorithms deliver? The answer depends on fibre topology, span distances, traffic classification, and threat model. Current commercial QKD systems achieve secret key rates of 1 to 10 kbps over 50 to 100 km of standard single-mode fibre, with trusted node relay extending reach to intercity distances. The Beijing-Shanghai backbone demonstrates a 2,000 km trusted node network in production. This workshop walks through fibre channel assessment, protocol selection for your network topology, trusted node placement optimisation, ETSI standards compliance, and an independent vendor comparison. Participants leave with a segment-by-segment deployment assessment for their network and a cost-benefit framework for QKD versus PQC-only approaches.
What participants cover
- QKD protocol characteristics: BB84 and decoy-state for prepare-and-measure, CV-QKD for coherent detection compatibility, MDI-QKD and twin-field QKD for extended reach
- Fibre channel assessment: attenuation budgets, Raman noise from classical co-propagation, DWDM quantum channel allocation for backhaul and core segments
- Trusted node architecture: relay chain design, physical security requirements, key management protocols, and node placement optimisation
- ETSI GS QKD standards (004, 014, 015) and ITU-T Y.3800 series: practical compliance requirements for telecoms operators
- Key injection into network security protocols: TLS 1.3, IPsec IKEv2, and MACsec integration via the ETSI KMS interface
- Vendor evaluation and cost-benefit analysis: independent comparison of commercial QKD systems and decision framework for QKD versus PQC-only migration per network segment