Tutorial: Post-quantum cryptography and 5G security

27Citations
Citations of this article
70Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The Fifth Generation (5G) mobile broadband standards make a fundamental shift in cryptography. Prior generations based their security and privacy principally on symmetric key cryptography. The Subscriber Identity Module (SIM) and its successors contain a shared key used to authenticate the User Equipment (UE) to the network, and vice versa. However 5G is shifting its core network over to a microservices, cloud-first architecture and is heavily leveraging protocols like TLS andOAuth2.0 to authenticate and authorize transactions. As a result, it is shifting to a PKI-based trust model. This shift is happening just as quantum computing threatens to unravel the security of traditional ciphers such as RSA and ECC. In this paper we highlight the need to advance the 3GPP 5G standards and NIST post-quantum cryptography standards in tandem, with the goal of launching a "quantum ready" 5G core network.

Cite

CITATION STYLE

APA

Clancy, T. C., McGwier, R. W., & Chen, L. (2019). Tutorial: Post-quantum cryptography and 5G security. In WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks (p. 285). Association for Computing Machinery, Inc. https://doi.org/10.1145/3317549.3324882

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free