Skip navigation
Decoding the enigma of quantum-safe cryptography to ensure confidentiality in mobile communication networks

Decoding quantum-safe cryptography

Key to ensuring confidentiality in networks

Addressing the potential threat of quantum computers on 5G networks

The rapid advancements in quantum computing pose a threat to the security of mobile networks. Implementing standardized quantum-resistant cryptography and protocols is crucial to mitigate this threat. Additionally, intergovernmental and international policy coordination is necessary to ensure globally secure and interoperable use of quantum-resistant cryptography.

Report
Decoding quantum safe encryption: Key to ensuring confidentiality in networks

The rapid technological advancements in quantum physics are leading to the emergence of quantum computers. This development is expected to bring new computational benefits but also comes with security concerns. At some stage of the quantum computer advancement path many cryptographic algorithms that are currently in use are expected to be broken. This will, among others, compromise the security of current telecommunication networks.

This paper examines the potential threat of quantum computers on the security of telecommunication networks and how the telecommunication industry, including Ericsson, is addressing these threats. The paper describes the use of cryptography in modern 5G networks, and how it is impacted by the projected emergence of sufficiently capable quantum computers in the next decades. It discusses the ongoing development of quantum-resistant algorithms and protocols and their future adoption in networks.

Insights

Securing modern telecommunication networks

Securing modern telecommunication networks

Mobile networks rely on maintaining the confidentiality and integrity of the identity of participants and their communication using cryptographic algorithms and protocols such as AES and TLS. Thus, the network can protect sensitive customer data and individual subscribers from traffic inspection and exploitation, and provide secure connectivity to individual applications and services.

Quantum computing

Quantum computing

Quantum computing is not yet widely available, but it has the potential to speed up many previously intractable computational problems in fields such as financial modeling, pharmaceutical research, and materials research. It is useful to distinguish between industrially useful quantum computing and cryptographically relevant, that is, threat to existing cryptographic algorithms, quantum computers.

Pathway to quantum-safe networks

Pathway to quantum-safe networks

The most effective and efficient approach to mitigate the threat of advanced quantum computers is by implementing standardized and widely accepted quantum-resistant cryptography and protocols. Global harmonization and interoperability of quantum-resistant protocols should be ensured through intergovernmental and international policy coordination work.

Related content