CSIDH-Based Quantum-Safe Authentication Protocol for Cross-Slice Communication in 5G Networks

Read the full article See related articles

Listed in

This article is not in any list yet, why not save it to one of your lists.
Log in to save this article

Abstract

Fifth-generation (5G) network technology is not just an improved extension of the fourth generation; it possesses several key properties, including high capacity, network slicing, low latency, high throughput, and network virtualisation.5G aims to provide a better-quality network. Users can access a variety of web services from any location at any time, thanks to the rapid advancements in wireless communication technologies and the increasing popularity of mobile devices. To provide secure communication, numerous schemes have been developed using the elliptic curve and problems based on the hardness of integer factorisation. However, these problems can be solved by quantum computers in polynomial time. Hence, these protocols are no longer safe on quantum computers. This article proposes a quantum-safe and efficient 5G cross-network slice authentication scheme to counter quantum adversaries. We have utilised the CSIDH-based key exchange protocol to enhance its security against quantum attacks. This scheme is based on the mathematical hard problem of computing the action of an ideal over an elliptic curve that is a commutative isogeny Diffie-Hellman problem (CSIDH). The security of the protocol is proved on the BPR model. Additionally, a comparison of all possible post-quantum 5G solutions using key exchange protocols such as Kyber, Classic McEliece, and SPHINCS+5G has been made.

Article activity feed