Workshops Telecommunications QKD for Telecoms Backhaul
Telecommunications Full Day Workshop

Quantum Key Distribution for Telecoms Backhaul and Core Networks

This technical workshop equips telecoms network architects and optical transport engineers with the knowledge to evaluate, design, and plan QKD deployments across backhaul and core network segments.

Full day (6 hours + Q&A)
In person or online
Max 30 delegates

Proud to recommend our expert members

Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside
Qrypto Cyber
Eclypses
Arqit
QuantBond
Krown
Applied Quantum
Quantum Bitcoin
Venari Security
QuStream
BHO Legal
Census
QSP
IDQ
Patero
Entopya
Belden
Atlant3D
Zenith Studio
Qudef
Aries Partners
GQI
Upperside Conferences
Austrade
Arrise Innovations
CyberRST
Triarii Research
QSysteme
WizzWang
DeepTech DAO
Xyberteq
Viavi
Entrust
Qsentinel
Nokia
Gopher Security
Quside

Workshop Description

Technical workshop for network architects and security engineers at telecoms operators. Covers QKD deployment architectures for metro and long-haul fibre backhaul, trusted node configurations, protocol selection (BB84, decoy-state, CV-QKD, MDI-QKD), key injection into TLS 1.3 and IPsec, ETSI GS QKD standards compliance, and the current vendor landscape including Toshiba, ID Quantique, QuantumCTek, and Huawei deployments. Addresses how to evaluate QKD against PQC for specific network segments.

Telecoms operators face a specific question that PQC migration alone does not answer: for which network segments does quantum key distribution provide security value beyond what post-quantum algorithms deliver? The answer depends on fibre topology, span distances, traffic classification, and threat model. Current commercial QKD systems achieve secret key rates of 1 to 10 kbps over 50 to 100 km of standard single-mode fibre, with trusted node relay extending reach to intercity distances. The Beijing-Shanghai backbone demonstrates a 2,000 km trusted node network in production. This workshop walks through fibre channel assessment, protocol selection for your network topology, trusted node placement optimisation, ETSI standards compliance, and an independent vendor comparison. Participants leave with a segment-by-segment deployment assessment for their network and a cost-benefit framework for QKD versus PQC-only approaches.

What participants cover

  • QKD protocol characteristics: BB84 and decoy-state for prepare-and-measure, CV-QKD for coherent detection compatibility, MDI-QKD and twin-field QKD for extended reach
  • Fibre channel assessment: attenuation budgets, Raman noise from classical co-propagation, DWDM quantum channel allocation for backhaul and core segments
  • Trusted node architecture: relay chain design, physical security requirements, key management protocols, and node placement optimisation
  • ETSI GS QKD standards (004, 014, 015) and ITU-T Y.3800 series: practical compliance requirements for telecoms operators
  • Key injection into network security protocols: TLS 1.3, IPsec IKEv2, and MACsec integration via the ETSI KMS interface
  • Vendor evaluation and cost-benefit analysis: independent comparison of commercial QKD systems and decision framework for QKD versus PQC-only migration per network segment

Preliminary Agenda

Full day workshop structure with scheduled breaks. Content is configurable to your network topology, fibre infrastructure, and security requirements.

# Session Topics
1 QKD Fundamentals for Network Engineers From quantum mechanics to key generation in operational fibre
2 QKD Protocols and Performance Characteristics Protocol selection for different network segment types
  • BB84 and decoy-state BB84: the dominant prepare-and-measure protocol for commercial deployment
  • CV-QKD (GG02): coherent detection, compatibility with standard telecom receivers, and distance trade-offs
  • MDI-QKD and twin-field QKD: removing detector side-channel attacks and extending span distances beyond 300 km
Break, after 50 min
3 Deployment Architectures for Backhaul and Core Trusted nodes, metro rings, and long-haul relay chains
  • Point-to-point QKD links: fibre loss budgets, secret key rates (1-10 kbps at 50-100 km on standard SMF-28), and DWDM coexistence with classical traffic
  • Trusted node relay networks: key relay protocols, physical security requirements, and the Beijing-Shanghai 2,000 km backbone as reference architecture
  • Metro ring topologies versus hub-and-spoke: trade-offs for backhaul aggregation points and core interconnects
4 Interactive Demonstration: Fibre Channel Assessment and Key Rate Modelling Facilitator-led analysis with delegate interpretation and discussion
  • Characterising a backhaul fibre segment: attenuation, chromatic dispersion, Raman noise from co-propagating classical channels
  • Modelling expected secret key rates for BB84 and CV-QKD given measured channel parameters
  • Evaluating trusted node placement: optimising node count against physical security cost and key relay latency
Break, after 60 min
5 Standards, Integration, and Hybrid QKD-PQC Architectures ETSI QKD standards and key injection into existing network security protocols
  • ETSI GS QKD 004 (Application Interface) and GS QKD 014 (Protocol and data format): practical implementation requirements
  • Key injection into TLS 1.3, IPsec IKEv2, and MACsec using the ETSI KMS interface
  • Hybrid QKD plus PQC deployment: defence-in-depth strategy and network segment prioritisation (where QKD adds value over PQC alone)
6 Vendor Landscape and Cost-Benefit Analysis Independent assessment of commercial QKD systems for telecoms operators
  • Toshiba Multiplexed QKD, ID Quantique Cerberis XG, QuantumCTek, and Huawei deployments: capability comparison and field trial results
  • Total cost of ownership: QKD hardware, trusted node infrastructure, fibre allocation, and operational overhead versus PQC-only migration
  • Decision framework: which network segments justify QKD investment and which are better served by PQC alone
7 Q&A and Deployment Planning

Designed and Delivered By

Workshops are designed and delivered by QSECDEF in collaboration with sector specialists. All facilitators have direct experience in both quantum communication technologies and telecommunications network engineering.

QD

Quantum Security Defence

Workshop design and delivery

QSECDEF brings world-leading expertise in post-quantum cryptography, quantum computing strategy, and defence-grade security assessment. Our advisory membership spans 600+ organisations and 1,200+ professionals working at the intersection of quantum technologies and critical infrastructure security.

TE

Telecommunications Partners

Domain expertise and operational validation

Telecommunications workshops are co-delivered with sector specialists who bring direct operational experience in telecoms network engineering and optical transport. This ensures workshop content is grounded in the physical layer realities, fibre infrastructure constraints, and operational requirements specific to telecoms operators.

Commission This Workshop

Sessions are configured around your network topology, fibre infrastructure, span distances, and security classification requirements. Get in touch to discuss your QKD evaluation or deployment planning needs.

Contact Us