Exploring the Vulnerabilities of Next-Generation Wireless Networks to Quantum Computing-Based Cryptographic Attacks and Potential Countermeasures
Keywords:
Quantum computing, post-quantum cryptography, wireless security, 5G and 6G networks, quantum key distribution, cryptographic attacksAbstract
Next-generation wireless networks (5G and beyond) are expected to provide unprecedented connectivity, low latency, and high security. However, the rapid advancements in quantum computing pose a significant threat to classical cryptographic protocols, particularly those used in securing wireless communications. This paper explores the vulnerabilities of next-generation wireless networks to quantum-based cryptographic attacks and evaluates potential countermeasures, such as post-quantum cryptography (PQC) and quantum key distribution (QKD). We review the latest pre-2023 research on quantum threats to cryptographic security in wireless networks and propose an analytical framework for assessing network resilience. Additionally, we present graphical representations of attack scenarios and countermeasure efficacy.
References
Bennett, Charles H., and Gilles Brassard. "Quantum Cryptography: Public Key Distribution and Coin Tossing." Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, 1984, pp. 175–179.
Bernstein, Daniel J. "Introduction to Post-Quantum Cryptography." Springer Berlin Heidelberg, 2009, pp. 1–14.
Boneh, Dan, and Richard J. Lipton. "Quantum Cryptanalysis of Hidden Linear Functions." Advances in Cryptology – CRYPTO, 2013, pp. 424–437.
Diamanti, Eleni, Hoi-Kwong Lo, Bing Qi, and Zhen Yuan. "Practical Challenges in Quantum Key Distribution." npj Quantum Information, vol. 7, no. 1, 2021, pp. 1–10.
Gisin, Nicolas, Grégoire Ribordy, Wolfgang Tittel, and Hugo Zbinden. "Quantum Cryptography." Review of Modern Physics, vol. 74, no. 1, 2019, pp. 145–195.
Hoffstein, Jeffrey, Jill Pipher, and Joseph H. Silverman. An Introduction to Mathematical Cryptography. Springer Science & Business Media, 2017.
Liao, Sheng-Kai, et al. "Satellite-to-Ground Quantum Key Distribution." Nature, vol. 549, no. 7671, 2018, pp. 43–47.
National Institute of Standards and Technology (NIST). Post-Quantum Cryptography: Standardization Project. 2016. nist.gov.
Pirandola, Stefano, et al. "Advances in Quantum Cryptography." Advances in Optics and Photonics, vol. 12, no. 4, 2020, pp. 1012–1236.
Shor, Peter W. "Algorithms for Quantum Computation: Discrete Logarithms and Factoring." Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 1994, pp. 124–134.
Arrazola, Juan Miguel, and Norbert Lütkenhaus. "Quantum Cryptography for the Future Internet." Nature Photonics, vol. 13, 2019, pp. 509–517.
Chen, Lily, Stephen Jordan, and Yi-Kai Liu. Report on Post-Quantum Cryptography. National Institute of Standards and Technology (NIST), 2017.
Dang, Jimmy, and Michele Mosca. "Quantum Computing Threats to Cybersecurity." Journal of Cybersecurity, vol. 6, no. 1, 2021, pp. 1–15.
Elkouss, David, and Stephanie Wehner. "Quantum Cryptography Beyond Quantum Key Distribution." Nature Physics, vol. 14, no. 12, 2020, pp. 1231–1235.
Grover, Lov K. "A Fast Quantum Mechanical Algorithm for Database Search." Proceedings of the 28th Annual ACM Symposium on Theory of Computing, 1996, pp. 212–219.
Mosca, Michele. "Cybersecurity in an Era with Quantum Computers: Will We Be Ready?" IEEE Security & Privacy, vol. 16, no. 1, 2018, pp. 38–41.
Preskill, John. "Quantum Computing in the NISQ Era and Beyond." Quantum, vol. 2, 2018, pp. 79.
Sasaki, Masahide, et al. "Quantum Key Distribution Network in Tokyo." Nature Communications, vol. 11, 2020, pp. 1–9.
Stebila, Douglas, and Michele Mosca. "Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project." International Conference on Selected Areas in Cryptography, 2016, pp. 14–37.
Xu, Feihu, et al. "Secure Quantum Key Distribution with Realistic Devices." Reviews of Modern Physics, vol. 92, no. 2, 2020, pp. 025002.