Quantum and Post-Quantum Security in Future Networks

被引:0
|
作者
Sanon, Sogo Pierre [1 ]
Alzalam, Ihab [1 ]
Schotten, Hans D. [1 ,2 ]
机构
[1] German Res Ctr Artificial Intelligence, Intelligent Networks Res Grp, D-67663 Kaiserslautern, Germany
[2] RPTU Kaiserslautern Landau, Inst Wireless Commun & Nav, D-67663 Kaiserslautern, Germany
来源
2023 IEEE FUTURE NETWORKS WORLD FORUM, FNWF | 2024年
关键词
Future Networks; Quantum Computing; Quantum Cryptography; Post-Quantum Cryptography; Isogeny-Based Cryptography; CRYPTOGRAPHY; ALGORITHM; ISOGENIES;
D O I
10.1109/FNWF58287.2023.10520624
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantum computing is a rapidly developing field with the potential to revolutionize many industries. However, it also poses a serious threat to the security of future networks as current communications rely on encryption to protect data from unauthorized access, which could be broken by quantum computers in the future. This means that they could be used to attack future networks like Beyond 5G (B5G) and Sixth Generation (6G) which are expected to be much more widely used than previous generations of networks. There are a number of things that can be done to mitigate the quantum threat to future networks. One approach is to develop new encryption algorithms, Post-Quantum Cryptography (PQC), that are resistant to quantum computers. Another approach is to use Quantum Key Distribution (QKD) to create secure keys that cannot be broken by quantum computers. This work examines the current state of quantum and post-quantum cryptography and their applications in upcoming generations of wireless networks such as 6G, and the challenges that might arise for their implementation. Additionally, a new isogeny-based post-quantum cryptographic scheme is presented. This paper aims to advance and contribute to the research and development of quantum security in future networks.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review
    Khan, Muhammad Asghar
    Javaid, Shumaila
    Mohsan, Syed Agha Hassnain
    Tanveer, Muhammad
    Ullah, Insaf
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2024, 5 : 6849 - 6871
  • [2] A Survey and Comparison of Post-Quantum and Quantum Blockchains
    Yang, Zebo
    Alfauri, Haneen
    Farkiani, Behrooz
    Jain, Raj
    Di Pietro, Roberto
    Erbad, Aiman
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (02): : 967 - 1002
  • [3] Post-Quantum Security: Opportunities and Challenges
    Li, Silong
    Chen, Yuxiang
    Chen, Lin
    Liao, Jing
    Kuang, Chanchan
    Li, Kuanching
    Liang, Wei
    Xiong, Naixue
    SENSORS, 2023, 23 (21)
  • [4] Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography
    Chamola, Vinay
    Jolfaei, Alireza
    Chanana, Vaibhav
    Parashari, Prakhar
    Hassija, Vikas
    COMPUTER COMMUNICATIONS, 2021, 176 : 99 - 118
  • [5] Security Analysis of Classical and Post-Quantum Blockchains
    Dahhak, Hajar
    Afifi, Nadia
    Hilal, Imane
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [6] Securing the future internet of things with post-quantum cryptography
    Kumar, Adarsh
    Ottaviani, Carlo
    Gill, Sukhpal Singh
    Buyya, Rajkumar
    SECURITY AND PRIVACY, 2022, 5 (02)
  • [7] Future of cyberspace: A critical review of standard security protocols in the post-quantum era
    Ahvanooey, Milad Taleby
    Mazurczyk, Wojciech
    Zhao, Jun
    Caviglione, Luca
    Choo, Kim-Kwang Raymond
    Kilger, Max
    Conti, Mauro
    Misoczki, Rafael
    COMPUTER SCIENCE REVIEW, 2025, 57
  • [8] A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies
    Hasan, Khondokar Fida
    Simpson, Leonie
    Baee, Mir Ali Rezazadeh
    Islam, Chadni
    Rahman, Ziaur
    Armstrong, Warren
    Gauravaram, Praveen
    McKague, Matthew
    IEEE ACCESS, 2024, 12 : 23427 - 23450
  • [9] Post-Quantum Primitives in Information Security
    Aleksandrova, E. B.
    Shtyrkina, A. A.
    Iarmak, A. V.
    NONLINEAR PHENOMENA IN COMPLEX SYSTEMS, 2019, 22 (03): : 269 - 276
  • [10] Post-quantum Techniques in Wireless Network Security: An Overview
    Fakhruldeen, Hassan Falah
    Al-Kaabi, Rana Abbas
    Jabbar, Feryal Ibrahim
    Al-Kharsan, Ibrahim H.
    Shoja, Sarah Jawad
    MALAYSIAN JOURNAL OF FUNDAMENTAL AND APPLIED SCIENCES, 2023, 19 (03): : 337 - 344