Skip to main content
Top

2024 | OriginalPaper | Chapter

A Perspective on the Interplay Between 5G and Quantum Computing for Secure Algorithm and Software Engineering

Authors : Andrea D’Urbano, Christian Catalano, Angelo Corallo

Published in: Product-Focused Software Process Improvement

Publisher: Springer Nature Switzerland

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the advancement of quantum computing technology, a pressing need arises to assess its potential implications on existing systems and infrastructures. In this paper, we delve into the interplay between quantum computing and 5G technology, with a specific focus on its profound impact on cryptography and the emergence of post-quantum techniques. We analyse the potential vulnerabilities quantum computers pose to conventional cryptographic algorithms employed in 5G networks. Our research investigates the challenges and opportunities that arise at the intersection of quantum computing and 5G, ultimately aiming to contribute to the development of secure and future-proof communication systems.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Adnan, M.H., Ahmad Zukarnain, Z., Harun, N.Z.: Quantum key distribution for 5G networks: a review, state of art and future directions. Future Internet 14(3), 73 (2022)CrossRef Adnan, M.H., Ahmad Zukarnain, Z., Harun, N.Z.: Quantum key distribution for 5G networks: a review, state of art and future directions. Future Internet 14(3), 73 (2022)CrossRef
2.
go back to reference Agyapong, P.K., Iwamura, M., Staehle, D., Kiess, W., Benjebbour, A.: Design considerations for a 5G network architecture. IEEE Commun. Mag. 52(11), 65–75 (2014)CrossRef Agyapong, P.K., Iwamura, M., Staehle, D., Kiess, W., Benjebbour, A.: Design considerations for a 5G network architecture. IEEE Commun. Mag. 52(11), 65–75 (2014)CrossRef
3.
go back to reference Angelelli, M., Arima, S., Catalano, C., Ciavolino, E.: Cyber-risk perception and prioritization for decision-making and threat intelligence. arXiv preprint arXiv:2302.08348 (2023) Angelelli, M., Arima, S., Catalano, C., Ciavolino, E.: Cyber-risk perception and prioritization for decision-making and threat intelligence. arXiv preprint arXiv:​2302.​08348 (2023)
6.
go back to reference Bhatia, M., Sood, S.K.: Quantum computing-inspired network optimization for IoT applications. IEEE Internet Things J. 7(6), 5590–5598 (2020)CrossRef Bhatia, M., Sood, S.K.: Quantum computing-inspired network optimization for IoT applications. IEEE Internet Things J. 7(6), 5590–5598 (2020)CrossRef
7.
go back to reference Boella, A., Federico, M., Minerva, G., Rossotto, M.A.: Quantum computing per l’ottimizzazione delle reti mobili (4.5 G e 5G) (2020) Boella, A., Federico, M., Minerva, G., Rossotto, M.A.: Quantum computing per l’ottimizzazione delle reti mobili (4.5 G e 5G) (2020)
8.
go back to reference Caivano, D., Fernández-Ropero, M., Pérez-Castillo, R., Piattini, M., Scalera, M.: Artifact-based vs. human-perceived understandability and modifiability of refactored business processes: an experiment. J. Syst. Softw. 144, 143–164 (2018)CrossRef Caivano, D., Fernández-Ropero, M., Pérez-Castillo, R., Piattini, M., Scalera, M.: Artifact-based vs. human-perceived understandability and modifiability of refactored business processes: an experiment. J. Syst. Softw. 144, 143–164 (2018)CrossRef
9.
go back to reference Catalano, C., Chezzi, A., Angelelli, M., Tommasi, F.: Deceiving AI-based malware detection through polymorphic attacks. Comput. Ind. 143, 103751 (2022)CrossRef Catalano, C., Chezzi, A., Angelelli, M., Tommasi, F.: Deceiving AI-based malware detection through polymorphic attacks. Comput. Ind. 143, 103751 (2022)CrossRef
10.
go back to reference Chamola, V., Jolfaei, A., Chanana, V., Parashari, P., Hassija, V.: Information security in the post quantum era for 5G and beyond networks: threats to existing cryptography, and post-quantum cryptography. Comput. Commun. 176, 99–118 (2021)CrossRef Chamola, V., Jolfaei, A., Chanana, V., Parashari, P., Hassija, V.: Information security in the post quantum era for 5G and beyond networks: threats to existing cryptography, and post-quantum cryptography. Comput. Commun. 176, 99–118 (2021)CrossRef
11.
go back to reference Chin, W.H., Fan, Z., Haines, R.: Emerging technologies and research challenges for 5G wireless networks. IEEE Wirel. Commun. 21(2), 106–112 (2014)CrossRef Chin, W.H., Fan, Z., Haines, R.: Emerging technologies and research challenges for 5G wireless networks. IEEE Wirel. Commun. 21(2), 106–112 (2014)CrossRef
12.
go back to reference Clancy, T.C., McGwier, R.W., Chen, L.: Post-quantum cryptography and 5G security: tutorial. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, p. 285 (2019) Clancy, T.C., McGwier, R.W., Chen, L.: Post-quantum cryptography and 5G security: tutorial. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, p. 285 (2019)
13.
go back to reference Cohen-Tannoudji, C., Diu, B., Laloe, F.: Quantum Mechanics, vol. 1 (1986) Cohen-Tannoudji, C., Diu, B., Laloe, F.: Quantum Mechanics, vol. 1 (1986)
14.
go back to reference Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pp. 212–219 (1996) Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pp. 212–219 (1996)
15.
16.
go back to reference Jimenez-Navajas, L., Perez-Castillo, R., Piattini, M.: Transforming quantum programs in KDM to quantum design models in UML. Available at SSRN 4074848 (2022) Jimenez-Navajas, L., Perez-Castillo, R., Piattini, M.: Transforming quantum programs in KDM to quantum design models in UML. Available at SSRN 4074848 (2022)
17.
go back to reference Joseph, D., et al.: Transitioning organizations to post-quantum cryptography. Nature 605(7909), 237–243 (2022)CrossRef Joseph, D., et al.: Transitioning organizations to post-quantum cryptography. Nature 605(7909), 237–243 (2022)CrossRef
18.
go back to reference Jover, R.P., Marojevic, V.: Security and protocol exploit analysis of the 5G specifications. IEEE Access 7, 24956–24963 (2019)CrossRef Jover, R.P., Marojevic, V.: Security and protocol exploit analysis of the 5G specifications. IEEE Access 7, 24956–24963 (2019)CrossRef
19.
go back to reference Kadowaki, T., Nishimori, H.: Quantum annealing in the transverse Ising model. Phys. Rev. E 58(5), 5355 (1998)CrossRef Kadowaki, T., Nishimori, H.: Quantum annealing in the transverse Ising model. Phys. Rev. E 58(5), 5355 (1998)CrossRef
20.
22.
go back to reference Ma, X., Yuan, X., Cao, Z., Qi, B., Zhang, Z.: Quantum random number generation. npj Quantum Inf. 2(1), 1–9 (2016)CrossRef Ma, X., Yuan, X., Cao, Z., Qi, B., Zhang, Z.: Quantum random number generation. npj Quantum Inf. 2(1), 1–9 (2016)CrossRef
24.
go back to reference Mitchell, C.J.: The impact of quantum computing on real-world security: a 5G case study. Comput. Secur. 93, 101825 (2020)CrossRef Mitchell, C.J.: The impact of quantum computing on real-world security: a 5G case study. Comput. Secur. 93, 101825 (2020)CrossRef
25.
go back to reference Nguyen, H.T., Usman, M., Buyya, R.: iQuantum: a case for modeling and simulation of quantum computing environments. arXiv preprint arXiv:2303.15729 (2023) Nguyen, H.T., Usman, M., Buyya, R.: iQuantum: a case for modeling and simulation of quantum computing environments. arXiv preprint arXiv:​2303.​15729 (2023)
26.
go back to reference Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)MATH Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)MATH
27.
go back to reference Ott, D., Peikert, C., et al.: Identifying research challenges in post quantum cryptography migration and cryptographic agility. arXiv preprint arXiv:1909.07353 (2019) Ott, D., Peikert, C., et al.: Identifying research challenges in post quantum cryptography migration and cryptographic agility. arXiv preprint arXiv:​1909.​07353 (2019)
28.
go back to reference Oughton, E.J., Frias, Z.: The cost, coverage and rollout implications of 5G infrastructure in Britain. Telecommun. Policy 42(8), 636–652 (2018)CrossRef Oughton, E.J., Frias, Z.: The cost, coverage and rollout implications of 5G infrastructure in Britain. Telecommun. Policy 42(8), 636–652 (2018)CrossRef
29.
go back to reference Passian, A., Buchs, G., Seck, C.M., Marino, A.M., Peters, N.A.: The concept of a quantum edge simulator: edge computing and sensing in the quantum era. Sensors 23(1), 115 (2023)CrossRef Passian, A., Buchs, G., Seck, C.M., Marino, A.M., Peters, N.A.: The concept of a quantum edge simulator: edge computing and sensing in the quantum era. Sensors 23(1), 115 (2023)CrossRef
32.
go back to reference Shafi, M., et al.: 5G: a tutorial overview of standards, trials, challenges, deployment, and practice. IEEE J. Sel. Areas Commun. 35(6), 1201–1221 (2017)CrossRef Shafi, M., et al.: 5G: a tutorial overview of standards, trials, challenges, deployment, and practice. IEEE J. Sel. Areas Commun. 35(6), 1201–1221 (2017)CrossRef
33.
go back to reference Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124–134. IEEE (1994) Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124–134. IEEE (1994)
Metadata
Title
A Perspective on the Interplay Between 5G and Quantum Computing for Secure Algorithm and Software Engineering
Authors
Andrea D’Urbano
Christian Catalano
Angelo Corallo
Copyright Year
2024
DOI
https://doi.org/10.1007/978-3-031-49269-3_9

Premium Partner