Back to Search Start Over

Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography

Authors :
Vaibhav Chanana
Prakhar Parashari
Vikas Hassija
Alireza Jolfaei
Vinay Chamola
Source :
Computer Communications. 176:99-118
Publication Year :
2021
Publisher :
Elsevier BV, 2021.

Abstract

Quantum computing is an emerging field that uses the concepts of quantum mechanics to outperform classical computers. Quantum computing finds plethora of applications in the 5G and Beyond networks. It can process data at an exponential rate, which can address numerous business and scientific challenges. In this paper, we provide a detailed review of the field, starting from the most important applications of quantum computers and then diving into the future of cryptography. The major applications of quantum computing include unstructured search, quantum simulation, and optimization. It can also provide improvements in terms of speed and accuracy for some existing technologies, such as machine learning. These technologies have numerous applications in 5G and beyond networks. However, due to such abilities of quantum computing, it can also pose a serious risk to many existing security systems, especially the asymmetric key cryptography schemes. The risk of quantum computing has also influenced the mobile broadband standards to move from a symmetric key cryptography techniques to PKI-based trust model. We also discuss in detail various alternate cryptosystems based on mathematical problems that are believed to be hard even for a quantum computer to solve. In parallel, we discuss the developments in the field of quantum key distribution that makes use of quantum phenomenon to develop a quantum-resistant crypto systems. Such quantum-resistant systems have a great potential in provisioning secure 5G and beyond networks.

Details

ISSN :
01403664
Volume :
176
Database :
OpenAIRE
Journal :
Computer Communications
Accession number :
edsair.doi...........64a47b7204fced2edbf6c657a23be098
Full Text :
https://doi.org/10.1016/j.comcom.2021.05.019