- Telecommunications
SoftBank: Quantum-Secured 5G Network Links in Japan
SoftBank
SoftBank deployed Toshiba QKD systems across Tokyo metro 5G backhaul links, securing base station communications against future quantum attacks as part of Japan's national quantum strategy.
- Key Outcome
- Secured 240 km of 5G backhaul fiber across Tokyo with QKD-encrypted keys at 10 Mbps key generation rate, the first commercial 5G QKD deployment at this scale in Asia.
The Challenge
Fifth-generation mobile networks carry an unprecedented density of sensitive traffic: financial transactions, industrial control signals, healthcare telemetry, and government communications all traverse 5G backhaul links that today rely on classical public-key cryptography. The arrival of cryptographically relevant quantum computers would render that cryptography obsolete, exposing archived traffic to retrospective decryption. Japan’s government identified this as a national security priority and tasked carriers with piloting quantum-safe backhaul before large-scale quantum computers emerge. SoftBank, operating one of Japan’s largest 5G networks, partnered with Toshiba to design and deploy a production-grade quantum key distribution system across the Tokyo metropolitan area.
The Quantum Approach
Quantum key distribution exploits a foundational property of quantum mechanics: any attempt to intercept a quantum-encoded key disturbs the quantum states in a detectable way. SoftBank and Toshiba installed Toshiba’s multiplexed QKD transceivers at 5G base station aggregation nodes across Tokyo, running the BB84 protocol over dark fiber in parallel with live 5G traffic on the same cable sheath. A custom key management stack integrated QKD-generated symmetric keys directly into the IPsec tunnels protecting backhaul links, replacing classical Diffie-Hellman negotiation for that segment.
import qkd_management_client as qmc
# Connect to the SoftBank QKD key management system
client = qmc.KeyManagerClient(
endpoint="https://kms.softbank-qkd.internal",
node_id="tokyo-aggregation-node-07",
auth_cert="/etc/qkd/node07.pem",
)
# Request a 256-bit symmetric key from the QKD pool
key_response = client.request_key(
destination_node="tokyo-aggregation-node-12",
key_size_bits=256,
application_id="5g-backhaul-ipsec",
)
if key_response.status == "available":
symmetric_key = key_response.key_material
key_id = key_response.key_id
print(f"QKD key obtained: ID={key_id}, freshness={key_response.age_ms} ms")
# Hand off to IPsec subsystem for tunnel re-keying
ipsec_rekey(tunnel_id="tokyo-07-to-12", key=symmetric_key, key_id=key_id)
else:
print(f"Key unavailable: {key_response.reason}, falling back to PQC")
ipsec_rekey_pqc(tunnel_id="tokyo-07-to-12")
The custom stack maintained a fallback path to post-quantum cryptographic algorithms (CRYSTALS-Kyber) for links where QKD key generation rate fell below the minimum required for timely re-keying, ensuring zero service interruption even during optical link degradation events.
Results and Implications
The deployment secured 240 km of active 5G backhaul fiber across 18 aggregation nodes in Tokyo, with Toshiba QKD hardware sustaining a 10 Mbps symmetric key generation rate under operational conditions. This represented the largest commercial 5G QKD deployment in Asia at the time of completion. Network operations reported no perceptible latency increase on the protected links, a critical requirement for 5G ultra-reliable low-latency communication services.
The project demonstrated a viable integration architecture between QKD hardware and existing IPsec-based network security infrastructure, an often-underestimated engineering challenge. SoftBank published its integration specifications to Japan’s telecommunications standards body, accelerating industry-wide adoption. The deployment also served as a live testbed for hybrid QKD plus post-quantum cryptography operation, a model that analysts expect will define commercial quantum-safe networking for the next decade while pure QKD infrastructure continues to mature.