[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3317549.3324882acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
tutorial

Post-quantum cryptography and 5G security: tutorial

Published: 15 May 2019 Publication History

Abstract

The Fifth Generation (5G) mobile broadband standards make a fundamental shift in cryptography. Prior generations based their security and privacy principally on symmetric key cryptography. The Subscriber Identity Module (SIM) and its successors contain a shared key used to authenticate the User Equipment (UE) to the network, and vice versa.
However 5G is shifting its core network over to a microservices, cloud-first architecture and is heavily leveraging protocols like TLS and OAuth2.0 to authenticate and authorize transactions. As a result, it is shifting to a PKI-based trust model. This shift is happening just as quantum computing threatens to unravel the security of traditional ciphers such as RSA and ECC.
In this paper we highlight the need to advance the 3GPP 5G standards and NIST post-quantum cryptography standards in tandem, with the goal of launching a "quantum ready" 5G core network.

References

[1]
Augot, D., Batina, L., Bernstein, D. J., Bos, J., Buchmann, J., Castryck, W., Dunkelman, O., Guneysu, T., Gueron, S., Hulsing, A., Lange, T., Mohamed, M. S. E., Rechberger, C., Schwabe, P., Sendrier, N., Vercauteren, F., and Yang, B.-Y. Initial recommendations for long-term secure post-quantum systems. PQCRYPTO: Post-Quantum Cryptography for Long-Term Security, 2015.
[2]
Ducas, L., Durmus, A., Lepoint, T., and Lyubashevsky, V. Lattice signatures and bimodal gaussians. In Proceedings of the 33th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO'13) (2013).
[3]
Goldreich, O., Goldwasser, S., and Halevi, S. Public-key cryptosystems from lattice reduction problems. In Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO'97) (1997), pp. 112--131.
[4]
Grover, L. A fast quantum mechanical algorithm for database search. Bell Labs, New Jersey, Technical Report, 1996.
[5]
Hoffstein, J., Pipher, J., and Silverman, J. Ntru: A ring based public key cryptosystem. In Algorithmic Number Theory (ANTS III) (1998), pp. 267--288.
[6]
Mavroeidis, V., Vishi, K., Zych, M. D., and Josang, A. The impact of quantum computing on present cryptography department of informatics. International Journal of Advanced Computer Science and Applications 9 (2018).
[7]
McEliece, R. A public-key cryptosystem based on algebraic coding theory. DSN Progress Report 44 (1978), 114--116.
[8]
Shor, P. Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science (1994), pp. 124--134.

Cited By

View all
  • (2024)An Applied Analysis of Securing 5G/6G Core Networks with Post-Quantum Key Encapsulation MethodsElectronics10.3390/electronics1321425813:21(4258)Online publication date: 30-Oct-2024
  • (2024)Smart and Digital Healthcare. Advanced Technologies and Security IssuesProceedings of the Central and Eastern European eDem and eGov Days 202410.1145/3670243.3673857(288-294)Online publication date: 12-Sep-2024
  • (2024)Anti-Quantum Certificateless Group Authentication for Massive Accessing IoT DevicesIEEE Internet of Things Journal10.1109/JIOT.2024.335380711:9(16561-16577)Online publication date: 1-May-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks
May 2019
359 pages
ISBN:9781450367264
DOI:10.1145/3317549
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 May 2019

Check for updates

Author Tags

  1. 5G
  2. cellular networks
  3. post-quantum cryptography

Qualifiers

  • Tutorial

Conference

WiSec '19
Sponsor:

Acceptance Rates

Overall Acceptance Rate 98 of 338 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)134
  • Downloads (Last 6 weeks)13
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)An Applied Analysis of Securing 5G/6G Core Networks with Post-Quantum Key Encapsulation MethodsElectronics10.3390/electronics1321425813:21(4258)Online publication date: 30-Oct-2024
  • (2024)Smart and Digital Healthcare. Advanced Technologies and Security IssuesProceedings of the Central and Eastern European eDem and eGov Days 202410.1145/3670243.3673857(288-294)Online publication date: 12-Sep-2024
  • (2024)Anti-Quantum Certificateless Group Authentication for Massive Accessing IoT DevicesIEEE Internet of Things Journal10.1109/JIOT.2024.335380711:9(16561-16577)Online publication date: 1-May-2024
  • (2024)Post-Quantum Cryptography (PQC)-Grade IEEE 2030.5 for Quantum Secure Distributed Energy Resources Networks2024 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)10.1109/ISGT59692.2024.10454235(1-5)Online publication date: 19-Feb-2024
  • (2024)Quantum Cryptography in 5G Networks: A Comprehensive OverviewIEEE Communications Surveys & Tutorials10.1109/COMST.2023.330905126:1(302-346)Online publication date: Sep-2025
  • (2024)Coding DesignEdge Computing Acceleration10.1002/9781119813873.ch4(89-124)Online publication date: 29-Nov-2024
  • (2023)Multivariate Polynomial Public Key Digital Signature Algorithm: Semi-covariance Analysis and Performance Test over 5G Networks2023 19th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)10.1109/WiMob58348.2023.10187725(299-305)Online publication date: 21-Jun-2023
  • (2023)Performance Evaluation of Quantum-Resistant Open Fronthaul Communications in 5GIEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)10.1109/INFOCOMWKSHPS57453.2023.10225821(1-6)Online publication date: 20-May-2023
  • (2023)Cryptographic Agility Evaluation for 5G Slices: Challenges and Solutions2023 IEEE Future Networks World Forum (FNWF)10.1109/FNWF58287.2023.10520649(1-2)Online publication date: 13-Nov-2023
  • (2023)6G Security Vision - A Concise Update2023 IEEE Future Networks World Forum (FNWF)10.1109/FNWF58287.2023.10520627(1-7)Online publication date: 13-Nov-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media