cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Caute_cautim
Community Champion

Post-Quantum Cryptography in a Modern 5G Call: A Step-by-Step Breakdown

Hi All

 

Modern telecommunications networks rely on multiple layers of cryptography at every step of a call or data session. Understanding the complexity of the process and the amount of cryptography involved is critical for post-quantum migration planning – an initiative some of my advanced telecommunications clients are kicking off these days. Many are widely underestimating how much cryptography is used. From the moment a user’s device connects to the network, through call setup (or SMS delivery), across roaming interfaces, and into back-end billing, dozens (hundreds?) of cryptographic mechanisms are at work.

To illustrate the complexity of preparing for post-quantum cryptography migration, I will try to briefly walk through key steps in a representative telecommunications use case – a 5G voice call with roaming – and identify every instance of cryptography involved. This step-by-step journey illustrates the complexity of securing telecom systems and why identifying quantum-vulnerable spots is such a challenge.

 

https://postquantum.com/post-quantum/cryptography-telecommunications-5g/

 

Regards

 

Caute_cautim

 

 

0 Replies