Partala J. (2021) Post-quantum Cryptography in 6G. In: Wu Y. et al. (eds) 6G Mobile Wireless Networks. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-72777-2_20
Post-quantum cryptography in 6G
1Center for Machine Vision and Signal Analysis, University of Oulu, Finland
|Online Access:||PDF Full Text (PDF, 0.2 MB)|
|Persistent link:|| http://urn.fi/urn:nbn:fi-fe202201178891
|Publish Date:|| 2022-03-22
The quantum computing paradigm is fundamentally different from the classical one. There are computational problems we are not able to solve on a contemporary computer, but which we can efficiently solve on a quantum one. One of these problems is the discrete logarithm problem (DLP) which is the basis of modern asymmetric cryptography. Once large-scale quantum computing becomes a reality, these cryptographic primitives need to be replaced with quantum-secure ones. While we are still in the early stages of quantum computing, steps have been taken to prepare for the shift to cryptography that is secure in the post-quantum world. According to the current knowledge, contemporary symmetric cryptography remains secure for the most part even after the advent of quantum computing. Asymmetric primitives based on integer factorization and the DLP need to be replaced. In this chapter, we take a look at the post-quantum secure alternatives for key establishment, public-key encryption and digital signatures. We also discuss their properties and the effect on the performance of the future 6G networks.
Computer communications and networks
|Pages:||431 - 448|
6G mobile wireless networks
|Host publication editor:||
Dhillon, Harpreet S.
Kanagarathinam, Madhan Raj
|Type of Publication:||
A3 Book chapter
|Field of Science:||
113 Computer and information sciences
213 Electronic, automation and communications engineering, electronics
This work is supported by the TrustedMaaS project by the Infotech institute of the University of Oulu, and the Academy of Finland 6Genesis Flagship (grant 318927).
|Academy of Finland Grant Number:||
318927 (Academy of Finland Funding decision)
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2021. This is a post-peer-review, pre-copyedit version of an article published in Computer Communications and Networks. The final authenticated version is available online at https://doi.org/10.1007/978-3-030-72777-2_20.