IMPLEMENTATION OF POST-QUANTUM CRYPTOGRAPHY IN NEXT-GENERATION TELECOM INFRASTRUCTURE

Authors

  • Ergashova Durdona Khusniddin kizi Tashkent University of Information Technologies named after Muhammad al Khwarazmiy 3rd year student of the Faculty of Mobile Communication Technology Author

Keywords:

Post-Quantum Cryptography, PQC, Telecom Security, 5G/6G, Kyber, Dilithium, NIST PQC, TLS, IPsec, Quantum-Safe Infrastructure, Quantum-Safe Security, Telecom Networks, Network Security, Hybrid Cryptography, MEC, Edge Security.

Abstract

The arrival of practical quantum computing poses a critical threat to classical cryptographic algorithms widely used in telecom infrastructure. RSA, ECC, and Diffie–Hellman—all fundamental to authentication, key exchange, and encryption—can be broken by Shor’s algorithm running on a large-scale quantum computer. This paper explores the integration of Post-Quantum Cryptography (PQC) into next-generation telecom systems (5G, 6G, and beyond). We analyze the computational performance, key sizes, and latency trade-offs of various NIST-standardized PQC algorithms (e.g., Kyber, Dilithium, BIKE), and evaluate their suitability for different layers of telecom architecture including RAN, core, and edge networks. Our findings reveal that PQC can be integrated with manageable overheads, but raises new challenges in key management, backward compatibility, and standardization.

References

1. National Institute of Standards and Technology (NIST), “Post-Quantum Cryptography Standardization Project,” 2024. [Online]. Available: https://csrc.nist.gov/projects/post-quantum-cryptography

2. M. Mosca, “Cybersecurity in an era with quantum computers: Will we be ready?,” IEEE Security & Privacy, vol. 16, no. 5, pp. 38–41, Sept./Oct. 2018.

3. J. Alkim, L. Ducas, T. Pöppelmann, and P. Schwabe, “Post-quantum key exchange — A new hope,” in Proc. 25th USENIX Security Symposium, 2016, pp. 327–343.

4. D. J. Bernstein et al., “SPHINCS+: Submission to the NIST Post-Quantum Project,” 2020. [Online]. Available: https://sphincs.org/

5. P. Schwabe, K. Gaj, and J. Großschädl, “Software and hardware performance of post-quantum cryptography,” in Post-Quantum Cryptography, Springer, 2018, pp. 245–283.

6. Open Quantum Safe Project, “liboqs: C library for quantum-resistant cryptographic algorithms,” 2023. [Online]. Available: https://openquantumsafe.org

7. R. Perlner and D. Cooper, “Quantum-resistant public key cryptography: A survey,” NIST Internal Report 8105, Apr. 2016.

8. ETSI, “Quantum-Safe Cryptography and Security: An ETSI White Paper,” ETSI, 2022. [Online]. Available: https://www.etsi.org

9. M. Campagna et al., “Hybrid key exchange in TLS 1.3,” Internet Engineering Task Force (IETF) Draft, Oct. 2023. [Online]. Available: https://datatracker.ietf.org

10. A. Hülsing et al., “CRYSTALS-Kyber and Dilithium in TLS 1.3,” Internet Draft, IETF, 2022. [Online]. Available: https://datatracker.ietf.org/doc/draft-ietf-tls-ctls

Downloads

Published

2026-03-30