scispace - formally typeset
Open AccessJournal ArticleDOI

The impact of quantum computing on real-world security: A 5G case study

Reads0
Chats0
TLDR
By exploiting backwards-compatibility features of the 5G security system design, this paper is able to propose a novel multi-phase approach to upgrading security that allows for a simple and smooth migration to a post-quantum-secure system.
About
This article is published in Computers & Security.The article was published on 2020-06-01 and is currently open access. It has received 20 citations till now. The article focuses on the topics: Quantum computer & Cryptography.

read more

Citations
More filters
Journal ArticleDOI

A survey on physical unclonable function (PUF)-based security solutions for Internet of Things

TL;DR: In this article, the authors present a review of the security challenges of emerging IoT networks and discuss some of the attacks and their countermeasures based on different domains in IoT networks, and present a proof-of-concept PUF-based solution for secret key generation using resistive random-access memories (ReRAM) embedded in IoTs.
Journal ArticleDOI

Securing Public Safety Communications on Commercial and Tactical 5G Networks: A Survey and Future Research Directions

TL;DR: In this article, the authors explore and survey security architecture and enablers for prioritized public safety communication in 5G networks, identifying security threat scenarios and analyzing enabling vulnerabilities, threat actors, attacks vectors, as well as risk levels.
Journal ArticleDOI

A Systematic Analysis of 5G Networks With a Focus on 5G Core Security

TL;DR: This paper provides a concise review of some 5G’s new features, including the Service Based Architecture (SBA) and key Network Functions (NFs), the new security features in User Equipment and Radio Access Network (RAN), and the new trust model and security mechanisms (e.g. the 5G AKA protocol).
Proceedings ArticleDOI

A Post-Quantum Secure Subscription Concealed Identifier for 6G

TL;DR: A post-quantum secure scheme for the SUCI calculation scheme, \textttKEMSUCI, which exhibits faster execution speed and only little communication overhead, and evaluation of all of the NIST PQC finalists under these aspects and identifies Kyber and Saber as the best fit.
Journal ArticleDOI

Quantum Key Distribution for 5G Networks: A Review, State of Art and Future Directions

TL;DR: The current state of the art of 5G technology in the merger of unconditional security requirements referred to as Quantum Cryptography is discussed and research gaps covering critical aspects of how quantum Cryptography can be realized and effectively utilized in 5G networks are identified.
References
More filters
Proceedings ArticleDOI

Algorithms for quantum computation: discrete logarithms and factoring

TL;DR: Las Vegas algorithms for finding discrete logarithms and factoring integers on a quantum computer that take a number of steps which is polynomial in the input size, e.g., the number of digits of the integer to be factored are given.
Journal ArticleDOI

Quantum Mechanics Helps in Searching for a Needle in a Haystack

TL;DR: In this article, a phone directory containing $N$ names arranged in completely random order is presented, and the desired phone number can be obtained in only O(sqrt{N})$ accesses to the database.

HMAC: Keyed-Hashing for Message Authentication

TL;DR: This document describes HMAC, a mechanism for message authentication using cryptographic hash functions that can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key.

HTTP Over TLS

Eric Rescorla
TL;DR: This memo describes how to use TLS to secure HTTP connections over the Internet, distinguishing secured traffic from insecure traffic by the use of a different server port.

Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)

TL;DR: This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Authentication and Key Agreement (AKA) mechanism used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and cdma2000.
Related Papers (5)