Abstract
With the advancement of quantum computing technology, a pressing need arises to assess its potential implications on existing systems and infrastructures. In this paper, we delve into the interplay between quantum computing and 5G technology, with a specific focus on its profound impact on cryptography and the emergence of post-quantum techniques. We analyse the potential vulnerabilities quantum computers pose to conventional cryptographic algorithms employed in 5G networks. Our research investigates the challenges and opportunities that arise at the intersection of quantum computing and 5G, ultimately aiming to contribute to the development of secure and future-proof communication systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
For an online database containing a collection of quantum algorithms, we refer to https://quantumalgorithmzoo.org/.
- 2.
- 3.
- 4.
- 5.
References
Adnan, M.H., Ahmad Zukarnain, Z., Harun, N.Z.: Quantum key distribution for 5G networks: a review, state of art and future directions. Future Internet 14(3), 73 (2022)
Agyapong, P.K., Iwamura, M., Staehle, D., Kiess, W., Benjebbour, A.: Design considerations for a 5G network architecture. IEEE Commun. Mag. 52(11), 65–75 (2014)
Angelelli, M., Arima, S., Catalano, C., Ciavolino, E.: Cyber-risk perception and prioritization for decision-making and threat intelligence. arXiv preprint arXiv:2302.08348 (2023)
Ayoade, O., Rivas, P., Orduz, J.: Artificial intelligence computing at the quantum level. Data 7(3), 28 (2022). https://doi.org/10.3390/data7030028. https://www.mdpi.com/2306-5729/7/3/28
Barletta, V.S., Caivano, D., De Vincentiis, M., Magrì, A., Piccinno, A.: Quantum optimization for IoT security detection. In: Julián, V., Carneiro, J., Alonso, R.S., Chamoso, P., Novais, P. (eds.) ISAmI 2022. LNNS, vol. 603, pp. 187–196. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-22356-3_18
Bhatia, M., Sood, S.K.: Quantum computing-inspired network optimization for IoT applications. IEEE Internet Things J. 7(6), 5590–5598 (2020)
Boella, A., Federico, M., Minerva, G., Rossotto, M.A.: Quantum computing per l’ottimizzazione delle reti mobili (4.5 G e 5G) (2020)
Caivano, D., Fernández-Ropero, M., Pérez-Castillo, R., Piattini, M., Scalera, M.: Artifact-based vs. human-perceived understandability and modifiability of refactored business processes: an experiment. J. Syst. Softw. 144, 143–164 (2018)
Catalano, C., Chezzi, A., Angelelli, M., Tommasi, F.: Deceiving AI-based malware detection through polymorphic attacks. Comput. Ind. 143, 103751 (2022)
Chamola, V., Jolfaei, A., Chanana, V., Parashari, P., Hassija, V.: Information security in the post quantum era for 5G and beyond networks: threats to existing cryptography, and post-quantum cryptography. Comput. Commun. 176, 99–118 (2021)
Chin, W.H., Fan, Z., Haines, R.: Emerging technologies and research challenges for 5G wireless networks. IEEE Wirel. Commun. 21(2), 106–112 (2014)
Clancy, T.C., McGwier, R.W., Chen, L.: Post-quantum cryptography and 5G security: tutorial. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, p. 285 (2019)
Cohen-Tannoudji, C., Diu, B., Laloe, F.: Quantum Mechanics, vol. 1 (1986)
Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pp. 212–219 (1996)
Gyongyosi, L., Imre, S.: A survey on quantum computing technology. Comput. Sci. Rev. 31, 51–71 (2019)
Jimenez-Navajas, L., Perez-Castillo, R., Piattini, M.: Transforming quantum programs in KDM to quantum design models in UML. Available at SSRN 4074848 (2022)
Joseph, D., et al.: Transitioning organizations to post-quantum cryptography. Nature 605(7909), 237–243 (2022)
Jover, R.P., Marojevic, V.: Security and protocol exploit analysis of the 5G specifications. IEEE Access 7, 24956–24963 (2019)
Kadowaki, T., Nishimori, H.: Quantum annealing in the transverse Ising model. Phys. Rev. E 58(5), 5355 (1998)
Katz, J., Lindell, Y.: Introduction to Modern Cryptography. CRC Press, Boca Raton (2020)
Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)
Ma, X., Yuan, X., Cao, Z., Qi, B., Zhang, Z.: Quantum random number generation. npj Quantum Inf. 2(1), 1–9 (2016)
Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986). https://doi.org/10.1007/3-540-39799-X_31
Mitchell, C.J.: The impact of quantum computing on real-world security: a 5G case study. Comput. Secur. 93, 101825 (2020)
Nguyen, H.T., Usman, M., Buyya, R.: iQuantum: a case for modeling and simulation of quantum computing environments. arXiv preprint arXiv:2303.15729 (2023)
Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)
Ott, D., Peikert, C., et al.: Identifying research challenges in post quantum cryptography migration and cryptographic agility. arXiv preprint arXiv:1909.07353 (2019)
Oughton, E.J., Frias, Z.: The cost, coverage and rollout implications of 5G infrastructure in Britain. Telecommun. Policy 42(8), 636–652 (2018)
Passian, A., Buchs, G., Seck, C.M., Marino, A.M., Peters, N.A.: The concept of a quantum edge simulator: edge computing and sensing in the quantum era. Sensors 23(1), 115 (2023)
Piattini, M., Murillo, J.M.: Quantum software engineering landscape and challenges. In: Serrano, M.A., Pérez-Castillo, R., Piattini, M. (eds.) Quantum Software Engineering, pp. 25–38. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-05324-5_2
Serrano, M.A., et al.: Minimizing incident response time in real-world scenarios using quantum computing. Softw. Qual. J. 1–30 (2023). https://doi.org/10.1007/s11219-023-09632-6
Shafi, M., et al.: 5G: a tutorial overview of standards, trials, challenges, deployment, and practice. IEEE J. Sel. Areas Commun. 35(6), 1201–1221 (2017)
Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124–134. IEEE (1994)
Acknowledgement
Andrea D’Urbano acknowledges the funding received by Deep Consulting s.r.l. within the framework of Ph.D. program in Engineering of Complex Systems.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
D’Urbano, A., Catalano, C., Corallo, A. (2024). A Perspective on the Interplay Between 5G and Quantum Computing for Secure Algorithm and Software Engineering. In: Kadgien, R., Jedlitschka, A., Janes, A., Lenarduzzi, V., Li, X. (eds) Product-Focused Software Process Improvement. PROFES 2023. Lecture Notes in Computer Science, vol 14484. Springer, Cham. https://doi.org/10.1007/978-3-031-49269-3_9
Download citation
DOI: https://doi.org/10.1007/978-3-031-49269-3_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-49268-6
Online ISBN: 978-3-031-49269-3
eBook Packages: Computer ScienceComputer Science (R0)