Skip to main content

A Perspective on the Interplay Between 5G and Quantum Computing for Secure Algorithm and Software Engineering

  • Conference paper
  • First Online:
Product-Focused Software Process Improvement (PROFES 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14484))

  • 175 Accesses

Abstract

With the advancement of quantum computing technology, a pressing need arises to assess its potential implications on existing systems and infrastructures. In this paper, we delve into the interplay between quantum computing and 5G technology, with a specific focus on its profound impact on cryptography and the emergence of post-quantum techniques. We analyse the potential vulnerabilities quantum computers pose to conventional cryptographic algorithms employed in 5G networks. Our research investigates the challenges and opportunities that arise at the intersection of quantum computing and 5G, ultimately aiming to contribute to the development of secure and future-proof communication systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    For an online database containing a collection of quantum algorithms, we refer to https://quantumalgorithmzoo.org/.

  2. 2.

    https://csrc.nist.gov/Projects/post-quantum-cryptography/selected-algorithms-2022.

  3. 3.

    https://www.idquantique.com/random-number-generation/products/quantis-qrng-chips/.

  4. 4.

    https://www.idquantique.com/id-quantique-and-sk-broadband-expand-the-use-of-quantum-key-distribution-to-protect-critical-information-in-south-korea/.

  5. 5.

    https://newsroom.ibm.com/2023-05-21-IBM-Launches-100-Million-Partnership-with-Global-Universities-to-Develop-Novel-Technologies-Towards-a-100,000-Qubit-Quantum-Centric-Supercomputer.

References

  1. Adnan, M.H., Ahmad Zukarnain, Z., Harun, N.Z.: Quantum key distribution for 5G networks: a review, state of art and future directions. Future Internet 14(3), 73 (2022)

    Article  Google Scholar 

  2. Agyapong, P.K., Iwamura, M., Staehle, D., Kiess, W., Benjebbour, A.: Design considerations for a 5G network architecture. IEEE Commun. Mag. 52(11), 65–75 (2014)

    Article  Google Scholar 

  3. Angelelli, M., Arima, S., Catalano, C., Ciavolino, E.: Cyber-risk perception and prioritization for decision-making and threat intelligence. arXiv preprint arXiv:2302.08348 (2023)

  4. Ayoade, O., Rivas, P., Orduz, J.: Artificial intelligence computing at the quantum level. Data 7(3), 28 (2022). https://doi.org/10.3390/data7030028. https://www.mdpi.com/2306-5729/7/3/28

  5. Barletta, V.S., Caivano, D., De Vincentiis, M., Magrì, A., Piccinno, A.: Quantum optimization for IoT security detection. In: Julián, V., Carneiro, J., Alonso, R.S., Chamoso, P., Novais, P. (eds.) ISAmI 2022. LNNS, vol. 603, pp. 187–196. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-22356-3_18

    Chapter  Google Scholar 

  6. Bhatia, M., Sood, S.K.: Quantum computing-inspired network optimization for IoT applications. IEEE Internet Things J. 7(6), 5590–5598 (2020)

    Article  Google Scholar 

  7. Boella, A., Federico, M., Minerva, G., Rossotto, M.A.: Quantum computing per l’ottimizzazione delle reti mobili (4.5 G e 5G) (2020)

    Google Scholar 

  8. Caivano, D., Fernández-Ropero, M., Pérez-Castillo, R., Piattini, M., Scalera, M.: Artifact-based vs. human-perceived understandability and modifiability of refactored business processes: an experiment. J. Syst. Softw. 144, 143–164 (2018)

    Article  Google Scholar 

  9. Catalano, C., Chezzi, A., Angelelli, M., Tommasi, F.: Deceiving AI-based malware detection through polymorphic attacks. Comput. Ind. 143, 103751 (2022)

    Article  Google Scholar 

  10. Chamola, V., Jolfaei, A., Chanana, V., Parashari, P., Hassija, V.: Information security in the post quantum era for 5G and beyond networks: threats to existing cryptography, and post-quantum cryptography. Comput. Commun. 176, 99–118 (2021)

    Article  Google Scholar 

  11. Chin, W.H., Fan, Z., Haines, R.: Emerging technologies and research challenges for 5G wireless networks. IEEE Wirel. Commun. 21(2), 106–112 (2014)

    Article  Google Scholar 

  12. Clancy, T.C., McGwier, R.W., Chen, L.: Post-quantum cryptography and 5G security: tutorial. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, p. 285 (2019)

    Google Scholar 

  13. Cohen-Tannoudji, C., Diu, B., Laloe, F.: Quantum Mechanics, vol. 1 (1986)

    Google Scholar 

  14. Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pp. 212–219 (1996)

    Google Scholar 

  15. Gyongyosi, L., Imre, S.: A survey on quantum computing technology. Comput. Sci. Rev. 31, 51–71 (2019)

    Article  MathSciNet  Google Scholar 

  16. Jimenez-Navajas, L., Perez-Castillo, R., Piattini, M.: Transforming quantum programs in KDM to quantum design models in UML. Available at SSRN 4074848 (2022)

    Google Scholar 

  17. Joseph, D., et al.: Transitioning organizations to post-quantum cryptography. Nature 605(7909), 237–243 (2022)

    Article  Google Scholar 

  18. Jover, R.P., Marojevic, V.: Security and protocol exploit analysis of the 5G specifications. IEEE Access 7, 24956–24963 (2019)

    Article  Google Scholar 

  19. Kadowaki, T., Nishimori, H.: Quantum annealing in the transverse Ising model. Phys. Rev. E 58(5), 5355 (1998)

    Article  Google Scholar 

  20. Katz, J., Lindell, Y.: Introduction to Modern Cryptography. CRC Press, Boca Raton (2020)

    Book  MATH  Google Scholar 

  21. Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)

    Article  MathSciNet  MATH  Google Scholar 

  22. Ma, X., Yuan, X., Cao, Z., Qi, B., Zhang, Z.: Quantum random number generation. npj Quantum Inf. 2(1), 1–9 (2016)

    Article  Google Scholar 

  23. Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986). https://doi.org/10.1007/3-540-39799-X_31

    Chapter  Google Scholar 

  24. Mitchell, C.J.: The impact of quantum computing on real-world security: a 5G case study. Comput. Secur. 93, 101825 (2020)

    Article  Google Scholar 

  25. Nguyen, H.T., Usman, M., Buyya, R.: iQuantum: a case for modeling and simulation of quantum computing environments. arXiv preprint arXiv:2303.15729 (2023)

  26. Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)

    MATH  Google Scholar 

  27. Ott, D., Peikert, C., et al.: Identifying research challenges in post quantum cryptography migration and cryptographic agility. arXiv preprint arXiv:1909.07353 (2019)

  28. Oughton, E.J., Frias, Z.: The cost, coverage and rollout implications of 5G infrastructure in Britain. Telecommun. Policy 42(8), 636–652 (2018)

    Article  Google Scholar 

  29. Passian, A., Buchs, G., Seck, C.M., Marino, A.M., Peters, N.A.: The concept of a quantum edge simulator: edge computing and sensing in the quantum era. Sensors 23(1), 115 (2023)

    Article  Google Scholar 

  30. Piattini, M., Murillo, J.M.: Quantum software engineering landscape and challenges. In: Serrano, M.A., Pérez-Castillo, R., Piattini, M. (eds.) Quantum Software Engineering, pp. 25–38. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-05324-5_2

    Chapter  Google Scholar 

  31. Serrano, M.A., et al.: Minimizing incident response time in real-world scenarios using quantum computing. Softw. Qual. J. 1–30 (2023). https://doi.org/10.1007/s11219-023-09632-6

  32. Shafi, M., et al.: 5G: a tutorial overview of standards, trials, challenges, deployment, and practice. IEEE J. Sel. Areas Commun. 35(6), 1201–1221 (2017)

    Article  Google Scholar 

  33. Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124–134. IEEE (1994)

    Google Scholar 

Download references

Acknowledgement

Andrea D’Urbano acknowledges the funding received by Deep Consulting s.r.l. within the framework of Ph.D. program in Engineering of Complex Systems.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrea D’Urbano .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

D’Urbano, A., Catalano, C., Corallo, A. (2024). A Perspective on the Interplay Between 5G and Quantum Computing for Secure Algorithm and Software Engineering. In: Kadgien, R., Jedlitschka, A., Janes, A., Lenarduzzi, V., Li, X. (eds) Product-Focused Software Process Improvement. PROFES 2023. Lecture Notes in Computer Science, vol 14484. Springer, Cham. https://doi.org/10.1007/978-3-031-49269-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-49269-3_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-49268-6

  • Online ISBN: 978-3-031-49269-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics