Quantum and Post-Quantum Security in Future Networks

被引:0
|
作者
Sanon, Sogo Pierre [1 ]
Alzalam, Ihab [1 ]
Schotten, Hans D. [1 ,2 ]
机构
[1] German Res Ctr Artificial Intelligence, Intelligent Networks Res Grp, D-67663 Kaiserslautern, Germany
[2] RPTU Kaiserslautern Landau, Inst Wireless Commun & Nav, D-67663 Kaiserslautern, Germany
关键词
Future Networks; Quantum Computing; Quantum Cryptography; Post-Quantum Cryptography; Isogeny-Based Cryptography; CRYPTOGRAPHY; ALGORITHM; ISOGENIES;
D O I
10.1109/FNWF58287.2023.10520624
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantum computing is a rapidly developing field with the potential to revolutionize many industries. However, it also poses a serious threat to the security of future networks as current communications rely on encryption to protect data from unauthorized access, which could be broken by quantum computers in the future. This means that they could be used to attack future networks like Beyond 5G (B5G) and Sixth Generation (6G) which are expected to be much more widely used than previous generations of networks. There are a number of things that can be done to mitigate the quantum threat to future networks. One approach is to develop new encryption algorithms, Post-Quantum Cryptography (PQC), that are resistant to quantum computers. Another approach is to use Quantum Key Distribution (QKD) to create secure keys that cannot be broken by quantum computers. This work examines the current state of quantum and post-quantum cryptography and their applications in upcoming generations of wireless networks such as 6G, and the challenges that might arise for their implementation. Additionally, a new isogeny-based post-quantum cryptographic scheme is presented. This paper aims to advance and contribute to the research and development of quantum security in future networks.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A Note on Quantum Security for Post-Quantum Cryptography
    Song, Fang
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 246 - 265
  • [2] A note on quantum security for post-quantum cryptography
    Song, Fang
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 : 246 - 265
  • [3] Post-quantum cryptography and the quantum future of cybersecurity
    Liu, Yi-Kai
    Moody, Dustin
    PHYSICAL REVIEW APPLIED, 2024, 21 (04):
  • [4] Post-Quantum Security: Opportunities and Challenges
    Li, Silong
    Chen, Yuxiang
    Chen, Lin
    Liao, Jing
    Kuang, Chanchan
    Li, Kuanching
    Liang, Wei
    Xiong, Naixue
    SENSORS, 2023, 23 (21)
  • [5] Post-quantum Security of the Sponge Construction
    Czajkowski, Jan
    Bruinderink, Leon Groot
    Hulsing, Andreas
    Schaffner, Christian
    Unruh, Dominique
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2018, 2018, 10786 : 185 - 204
  • [6] Post-Quantum Primitives in Information Security
    Aleksandrova, E. B.
    Shtyrkina, A. A.
    Iarmak, A. V.
    NONLINEAR PHENOMENA IN COMPLEX SYSTEMS, 2019, 22 (03): : 269 - 276
  • [7] Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review
    Khan, Muhammad Asghar
    Javaid, Shumaila
    Mohsan, Syed Agha Hassnain
    Tanveer, Muhammad
    Ullah, Insaf
    IEEE Open Journal of the Communications Society, 2024, 5 : 6849 - 6871
  • [8] Ensuring Security & Trust in a Post-Quantum Environment
    Manfred Paeschke
    Walter Fumy
    Andreas Wilke
    Datenschutz und Datensicherheit - DuD, 2019, 43 (7) : 440 - 443
  • [9] Post-Quantum Security Models for Authenticated Encryption
    Soukharev, Vladimir
    Jao, David
    Seshadri, Srinath
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2016, 2016, 9606 : 64 - 78
  • [10] Post-quantum security on the Lai–Massey scheme
    Zhongya Zhang
    Wenling Wu
    Han Sui
    Bolin Wang
    Designs, Codes and Cryptography, 2023, 91 : 2687 - 2704