NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Post-Quantum Cryptography and 5G Security: Tutorial
Published
Author(s)
T. Charles Clancy, Robert W. McGwier, Lidong Chen
Abstract
The Fifth Generation (5G) mobile broadband standards make a fundamental shift in cryptography. Prior generations based their security and privacy principally on symmetric key cryptography. The Subscriber Identity Module (SIM) and its successors contain a shared key used to authenticate the User Equipment (UE) to the network, and vice versa. However 5G is shifting its core network over to a microservices, cloud-first architecture and is heavily leveraging protocols like TLS andOAuth2.0 to authenticate and authorize transactions. As a result, it is shifting to a PKI-based trust model. This shift is happening just as quantum computing threatens to unravel the security of traditional ciphers such as RSA and ECC. In this paper we highlight the need to advance the 3GPP 5G standards and NIST post-quantum cryptography standards in tandem, with the goal of launching a "quantum ready" 5G core network.
Clancy, T.
, McGwier, R.
and Chen, L.
(2019),
Post-Quantum Cryptography and 5G Security: Tutorial, Proceedings of ACM WiSec, Miami, FL, US, [online], https://doi.org/10.1145/3317549.3324882, https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=927805
(Accessed October 8, 2025)