Papers
Topics
Authors
Recent
2000 character limit reached

Hybrid QKD-PQC Systems

Updated 5 December 2025
  • Hybrid QKD-PQC systems combine quantum key distribution and post-quantum cryptography to provide robust, layered key exchange that withstands quantum adversaries.
  • They employ series and parallel key-combination techniques, using XOR and HKDF methods, to ensure secrecy even if one component is compromised.
  • These systems enable adaptive operational modes in real-world networks, enhancing performance, scalability, and resilience through dynamic control and fallback mechanisms.

A hybrid QKD-PQC system is a cryptographic architecture that integrates Quantum Key Distribution (QKD)—which provides information-theoretic key exchange security via quantum mechanics—with Post-Quantum Cryptography (PQC), which employs computationally hard problems (commonly lattice-based) to defend against attacks by quantum adversaries. These systems combine the distinct strengths of QKD and PQC to provide layered, resilient key-distribution and authentication suitable for real-world, quantum-safe networks at scale. Hybridization achieves defense-in-depth, mitigates single points of failure, and enables adaptive operational modes and key-combination strategies under diverse trust, cost, and infrastructure constraints.

1. Hybrid QKD–PQC Protocol Principles

Hybrid systems integrate both QKD and PQC primitives at various layers for key exchange, transport, and authentication.

The hybrid approach is motivated by the recognition that QKD and PQC have orthogonal—and often complementary—threat models, performance limits, and cost profiles (Zeng et al., 1 Nov 2024, Zhu, 17 Oct 2025, Prisco, 2023). If either primitive is defeated (e.g., by a cryptanalytic breakthrough in PQC or implementation failure in QKD), the other remains to protect confidentiality.

2. Protocol Designs and Key-Generation Workflows

Hybrid QKD-PQC schemes span physical, architectural, and protocol layers:

  • Physical/QKD Layer: QKD devices implement protocols such as BB84, E91, B92, or entanglement-based methods (e.g., with GHZ states as in (Sykot et al., 10 Nov 2024)). Channel loss, detector efficiency, fiber distance, and quantum bit error rate (QBER) bound performance.
  • PQC Layer: PQC KEMs (e.g., ML-KEM–768, Kyber, NTRU) operate over standard classical networks. Signatures (e.g., ML-DSA, Dilithium, Falcon) are leveraged for entity authentication (Chen, 30 Sep 2025, Liu-Jun et al., 2020, Yang et al., 2021).
  • Key-Combination: After QKD and PQC keys are established, hybrid schemes typically combine them:
  • Authentication Channel: The classical communication required for QKD post-processing (basis sifting, error correction, privacy amplification) is authenticated using either information-theoretic MACs (Wegman–Carter) fueled by pre-shared key or PQC digital signatures/certificates (Liu-Jun et al., 2020, Yang et al., 2021, Prisco, 2023).
  • Operational Switching: Key management and orchestration logic enables seamless mode switching based on performance indicators (buffer occupancy, QKD outage, PQC compromise alerts) (Sanz et al., 27 Nov 2025, Makris et al., 13 Mar 2024), with fallback to PQC or classical symmetric methods as necessary.

A representative table for series and parallel designs is as follows:

Architecture Key Rate Formula Security Condition
Series Rseries=min(RQKD,1,RPQC,RQKD,2)R_{\rm series} = \min(R_{\rm QKD,1}, R_{\rm PQC}, R_{\rm QKD,2}) At least one sub-key is secret
Parallel/XOR Rhybrid=min(RQKD,RPQC)R_{\mathrm{hybrid}} = \min(R_{\rm QKD}, R_{\rm PQC}) Either sub-key unknown to adversary
Secret Sharing RSS=iRiR_{\rm SS} = \sum_i R_i Adversary must break tt of nn

3. Security Model and Proof Frameworks

Security in hybrid QKD-PQC protocols is composable and quantifiable (Zeng et al., 1 Nov 2024, Zeng et al., 2 Nov 2024, Sanz et al., 27 Nov 2025, Gupta et al., 4 Dec 2025, Chen, 30 Sep 2025):

  • Composable Security: Final key indistinguishability is maintained if at least one component is secure. For parallel/XOR protocols:

εtotalεQKD+εPQC\varepsilon_{\mathrm{total}} \leq \varepsilon_{\mathrm{QKD}} + \varepsilon_{\mathrm{PQC}}

For serial (XOR) composition, secrecy is retained if even one key is information-theoretically random (Zeng et al., 1 Nov 2024).

  • Finite-Key Effects: Protocols using the entanglement-based BBM92 or BB84 must account for finite-key-size effects, quantified via security parameter breakdown:

εQKDεauth+εec+εpa+2εpe\varepsilon_{\rm QKD} \ge \varepsilon_{\rm auth}+\varepsilon_{\rm ec}+\varepsilon_{\rm pa}+2\varepsilon_{\rm pe}

(see (Gupta et al., 4 Dec 2025) for detailed expressions).

4. Performance and Practical Implementation

Performance analysis quantifies key rate, end-to-end latency, and resilience under realistic network and system constraints:

  • Key Rate:
  • Latency and Throughput: Parallel hybridization (simultaneous key retrieval and encapsulation) eliminates the multiplicative latency seen in the sequential approach—measured speedup is up to 2× under high RTT (Blanco-Romero et al., 12 Jul 2025).
  • Authentication Overhead: PQC digital signatures introduce sub-millisecond latency, not rate-limiting in networked QKD (Liu-Jun et al., 2020, Yang et al., 2021).
  • Buffering and Fallback: Service continuity and key-availability can be analytically engineered by buffer sizing, hybrid fallback fraction, and SLA-driven policies (see stochastic modeling in (Zhu, 17 Oct 2025)).

Empirical results from deployed and simulated networks show that such systems can maintain key rotation intervals of sub-minute (at >98% reliability), with flexibility to transition between QKD, hybrid, and PQC modes with no data-path interruption (Makris et al., 13 Mar 2024, Sanz et al., 27 Nov 2025).

5. Deployment Scenarios and Standards Integration

Hybrid QKD-PQC is implemented in several network and application scenarios:

  • Metropolitan and Backbone Networks: Hybridization enables QKD-based keying over short/medium distances with PQC-based bridging for long-haul or cross-domain connections (Brauer et al., 2023, Sanz et al., 27 Nov 2025).
  • Critical Infrastructure: Power-system communications (Zhu, 17 Oct 2025) and field-deployed high-throughput encryption (Makris et al., 13 Mar 2024) demonstrate statistical SLA bounds and risk mitigation via hybrid logical fallback.
  • IPsec and TLS: Unified QKD-KEM interfaces plug into standard protocol negotiation (e.g., in strongSwan IKEv2); hybrid keys are derived via API-based combinations (Blanco-Romero et al., 12 Jul 2025, Chen, 30 Sep 2025).
  • Certificate and Entity Authentication: Integration of PQC signing into QKD network onboarding and key management minimizes O(n2n^2) pre-sharing burdens, enabling dynamic, scalable mesh topologies (Yang et al., 2021, Liu-Jun et al., 2020, Chen, 30 Sep 2025).
  • Adaptive Security Frameworks: Hierarchical controllers (e.g., QuSeC (Sanz et al., 27 Nov 2025)) choose per-connection security level, spanning pure QKD, hybrid, and PQC modes, with measured end-to-end key establishment latencies from 73 ms (direct QKD) to 155 ms (hybrid).
  • Obfuscated Hybridization: Dynamic, pre-shared key-driven obfuscation of QKD-PQC operational sequence resists side-channel and unknown-future attacks (Rani et al., 11 Aug 2025, Gupta et al., 4 Dec 2025).

The ETSI GS QKD 014/015/018 standards and NIST PQC algorithms (Kyber, Dilithium, ML-KEM, ML-DSA) are commonly adopted building blocks (Chen, 30 Sep 2025).

6. Security, Cost, and Tradeoff Analysis

Hybridization brings sharply characterized tradeoffs:

7. Advanced and Experimental Hybridization Strategies

Recent innovations and prototypes extend hybrid QKD-PQC in several directions:

  • Obfuscated Operation Sequencing: Dynamic, PSK-driven selection and obfuscation of encryption primitive sequence (instruction sequence IS) as an additional security layer (Rani et al., 11 Aug 2025, Gupta et al., 4 Dec 2025).
  • Multipath and Multi-technology Interconnects: Long-distance, continental-scale hybrid QKD-PQC links incorporating satellite, fiber, and parallel PQC channels, combined at border nodes for composable security (Brauer et al., 2023).
  • Finite-Key and Side-Channel Models: Systematic modeling of finite-key-size effects and explicit leakage channels, with fallback to IT-secure instruction sequence in the worst-case (Gupta et al., 4 Dec 2025).
  • Hybrid Digital Signatures: Certificate size optimization by splitting PQC signature material, confirmed using QKD-generated confirmation codes at verification time (Chen, 30 Sep 2025).
  • Standardization: Integration with ETSI QKD APIs, NIST PQC standards, and major cryptonet protocols (TLS, IPsec, REST-based KMEs) for maximum interoperability (Sanz et al., 27 Nov 2025, Blanco-Romero et al., 12 Jul 2025, Chen, 30 Sep 2025).

This synthesis demonstrates that hybrid QKD-PQC systems provide a mathematically rigorous, systematically engineered, and field-validated foundation for quantum-safe networked communications. Layered key-distribution, dynamic operational switching, and security composability are essential elements for practical deployments that demand both immediate quantum resistance and forward-compatibility with IT-secure cryptographic guarantees.

Whiteboard

Follow Topic

Get notified by email when new papers are published related to Hybrid QKD-PQC System.