Analysis of Post-Quantum Cryptography in User Equipment in 5G and Beyond
By: Sanzida Hoque , Abdullah Aydeger , Engin Zeydan and more
Potential Business Impact:
Makes phones safe from future computer attacks.
The advent of quantum computing threatens the security of classical public-key cryptographic systems, prompting the transition to post-quantum cryptography (PQC). While PQC has been analyzed in theory, its performance in practical wireless communication environments remains underexplored. This paper presents a detailed implementation and performance evaluation of NIST-selected PQC algorithms in user equipment (UE) to UE communications over 5G networks. Using a full 5G emulation stack (Open5GS and UERANSIM) and PQC-enabled TLS 1.3 via BoringSSL and liboqs, we examine key encapsulation mechanisms and digital signature schemes across realistic network conditions. We evaluate performance based on handshake latency, CPU and memory usage, bandwidth, and retransmission rates, under varying cryptographic configurations and client loads. Our findings show that ML-KEM with ML-DSA offers the best efficiency for latency-sensitive applications, while SPHINCS+ and HQC combinations incur higher computational and transmission overheads, making them unsuitable for security-critical but time-sensitive 5G scenarios.
Similar Papers
Performance Analysis and Deployment Considerations of Post-Quantum Cryptography for Consumer Electronics
Cryptography and Security
Makes phones and gadgets safe from future computer hacks.
Hybrid Schemes of NIST Post-Quantum Cryptography Standard Algorithms and Quantum Key Distribution for Key Exchange and Digital Signature
Cryptography and Security
Makes secret messages safer from future computers.
Assessing the Impact of Post-Quantum Digital Signature Algorithms on Blockchains
Cryptography and Security
Secures online money from future super-computers.