TY - JOUR
T1 - Information security in the post quantum era for 5G and beyond networks
T2 - Threats to existing cryptography, and post-quantum cryptography
AU - Chamola, Vinay
AU - Jolfaei, Alireza
AU - Chanana, Vaibhav
AU - Parashari, Prakhar
AU - Hassija, Vikas
PY - 2021/8/1
Y1 - 2021/8/1
N2 - Quantum computing is an emerging field that uses the concepts of quantum mechanics to outperform classical computers. Quantum computing finds plethora of applications in the 5G and Beyond networks. It can process data at an exponential rate, which can address numerous business and scientific challenges. In this paper, we provide a detailed review of the field, starting from the most important applications of quantum computers and then diving into the future of cryptography. The major applications of quantum computing include unstructured search, quantum simulation, and optimization. It can also provide improvements in terms of speed and accuracy for some existing technologies, such as machine learning. These technologies have numerous applications in 5G and beyond networks. However, due to such abilities of quantum computing, it can also pose a serious risk to many existing security systems, especially the asymmetric key cryptography schemes. The risk of quantum computing has also influenced the mobile broadband standards to move from a symmetric key cryptography techniques to PKI-based trust model. We also discuss in detail various alternate cryptosystems based on mathematical problems that are believed to be hard even for a quantum computer to solve. In parallel, we discuss the developments in the field of quantum key distribution that makes use of quantum phenomenon to develop a quantum-resistant crypto systems. Such quantum-resistant systems have a great potential in provisioning secure 5G and beyond networks.
AB - Quantum computing is an emerging field that uses the concepts of quantum mechanics to outperform classical computers. Quantum computing finds plethora of applications in the 5G and Beyond networks. It can process data at an exponential rate, which can address numerous business and scientific challenges. In this paper, we provide a detailed review of the field, starting from the most important applications of quantum computers and then diving into the future of cryptography. The major applications of quantum computing include unstructured search, quantum simulation, and optimization. It can also provide improvements in terms of speed and accuracy for some existing technologies, such as machine learning. These technologies have numerous applications in 5G and beyond networks. However, due to such abilities of quantum computing, it can also pose a serious risk to many existing security systems, especially the asymmetric key cryptography schemes. The risk of quantum computing has also influenced the mobile broadband standards to move from a symmetric key cryptography techniques to PKI-based trust model. We also discuss in detail various alternate cryptosystems based on mathematical problems that are believed to be hard even for a quantum computer to solve. In parallel, we discuss the developments in the field of quantum key distribution that makes use of quantum phenomenon to develop a quantum-resistant crypto systems. Such quantum-resistant systems have a great potential in provisioning secure 5G and beyond networks.
KW - 5G and beyond networks
KW - Cryptography
KW - Post-quantum cryptography
KW - Quantum algorithms
KW - Quantum communication
KW - Quantum computing
KW - Simulation
UR - http://www.scopus.com/inward/record.url?scp=85107628888&partnerID=8YFLogxK
U2 - 10.1016/j.comcom.2021.05.019
DO - 10.1016/j.comcom.2021.05.019
M3 - Article
AN - SCOPUS:85107628888
SN - 0140-3664
VL - 176
SP - 99
EP - 118
JO - Computer Communications
JF - Computer Communications
ER -