DSpace Repository

Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography

Show simple item record

dc.contributor.author Chamola, Vinay
dc.date.accessioned 2023-03-16T10:10:10Z
dc.date.available 2023-03-16T10:10:10Z
dc.date.issued 2021-08
dc.identifier.uri https://www.sciencedirect.com/science/article/pii/S0140366421002036
dc.identifier.uri http://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/9788
dc.description.abstract Quantum computing is an emerging field that uses the concepts of quantum mechanics to outperform classical computers. Quantum computing finds plethora of applications in the 5G and Beyond networks. It can process data at an exponential rate, which can address numerous business and scientific challenges. In this paper, we provide a detailed review of the field, starting from the most important applications of quantum computers and then diving into the future of cryptography. The major applications of quantum computing include unstructured search, quantum simulation, and optimization. It can also provide improvements in terms of speed and accuracy for some existing technologies, such as machine learning. These technologies have numerous applications in 5G and beyond networks. However, due to such abilities of quantum computing, it can also pose a serious risk to many existing security systems, especially the asymmetric key cryptography schemes. The risk of quantum computing has also influenced the mobile broadband standards to move from a symmetric key cryptography techniques to PKI-based trust model. We also discuss in detail various alternate cryptosystems based on mathematical problems that are believed to be hard even for a quantum computer to solve. In parallel, we discuss the developments in the field of quantum key distribution that makes use of quantum phenomenon to develop a quantum-resistant crypto systems. Such quantum-resistant systems have a great potential in provisioning secure 5G and beyond networks en_US
dc.language.iso en en_US
dc.publisher Elsevier en_US
dc.subject EEE en_US
dc.subject Quantum computing en_US
dc.subject 5G and beyond networks en_US
dc.subject Quantum algorithms en_US
dc.subject Simulation en_US
dc.subject Cryptography en_US
dc.title Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography en_US
dc.type Article en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account