Back to News
quantum-computing

G Networks Gain Quantum Security with New Encryption Methods

Quantum Zeitgeist
Loading...
4 min read
0 likes
⚡ Quantum Brief
Researchers at the University of Minho successfully integrated NIST-standardized post-quantum cryptography (ML-KEM-768 and ML-DSA) into a live 5G core network using a non-disruptive "sidecar proxy" approach. The method avoids modifying existing network functions, addressing a long-standing barrier by enabling quantum-resistant security without overhauls, while adding only 48–49ms of predictable latency to Service-Based Interface communications. Performance tests revealed tightly controlled variance (interquartile range <0.2ms) in the open-source 5G environment, proving consistent operation despite added cryptographic processing, though commercial-scale deployments remain untested. The study highlights a critical gap in 5G data plane security, which remains vulnerable to "Harvest-Now, Decrypt-Later" attacks, even as control-plane signalling gains quantum resilience through this proxy-based solution. Optimization opportunities include tunable certificate validation to reduce delays, with future work targeting data plane protection and scaling the approach for multivendor commercial networks.
G Networks Gain Quantum Security with New Encryption Methods

Summarize this article with:

Ricardo Alves Faval and colleagues at University of Minho integrate post-quantum cryptography into a live 5G core.

The team experimentally implements NIST-standardised cryptographic algorithms within an open-source 5G system, using a new sidecar proxy approach that avoids modifying existing network functions. Comparing classical and post-quantum deployments, they quantified the performance impact, revealing an increase in latency of approximately 54ms, but with predictable and tightly controlled variance. These findings are a key step towards securing mobile networks against evolving cyber threats and establishing a viable pathway for quantum-resilient 5G infrastructure. Non-disruptive post-quantum cryptography integration maintains 5G network performance with minimal Service-Based Interface (SBI) latency increased to approximately 54ms following the integration of post-quantum cryptography, representing a rise of 48-49ms compared to classical deployments. Previously, implementing quantum-resistant algorithms necessitated disruptive code modifications to core network functions, exceeding a key threshold once considered impossible to achieve without substantial network overhauls. The successful integration of NIST-standardized ML-KEM-768 and ML-DSA demonstrates a non-disruptive pathway for securing 5G signalling against future quantum computing threats. This integration was enabled by a ‘sidecar proxy’. A key advantage for maintaining network stability and scalability lies in the proxy’s transparent handling of encryption and decryption, allowing secure communication between network functions without altering existing code. Certificate validation was also quantified as a tunable factor influencing overall communication delay, offering a means of optimisation. Deploying post-quantum cryptography via this ‘sidecar proxy’ introduced a predictable latency increase of 48–49 milliseconds to 5G Service-Based Interface (SBI) communications. Network optimisation benefits from identifying certificate validation as a factor influencing overall delay, providing a tunable parameter. Measurements revealed tightly bounded variance in latency, with an interquartile range of less than 0.2ms and a coefficient of variation below 0.4 percent, indicating consistent performance. However, these figures currently reflect performance within a controlled, open-source free5GC environment and do not yet account for the complexities of large-scale, multivendor commercial deployments. Data plane security is vital for durable 5G networks Cloud-based 5G networks, built on flexible Service-Based Architectures, offer exciting possibilities for scalability but simultaneously introduce new vulnerabilities to sophisticated attacks like Harvest-Now, Decrypt-Later. Evaluations have largely concentrated on control-plane signalling, the network’s ‘brain’, potentially leaving the data plane, responsible for the actual transfer of information, exposed. Although a 54 millisecond latency increase may seem substantial, it delivers a practical pathway to strengthening 5G security against future quantum computer-based attacks. Establishing a viable method for integrating post-quantum cryptography into live 5G networks without disrupting existing functions has now been achieved. NIST-standardised algorithms were successfully deployed within an open-source 5G core by employing a ‘sidecar proxy’, an auxiliary component handling security alongside core network elements. The resulting system demonstrated predictable latency increases of approximately 48-49 milliseconds, a manageable overhead for enhanced security, and directly addresses the gap in data plane security. This approach avoids extensive code modifications, offering a practical pathway to protect against future quantum computing attacks and raises questions regarding extending this protection to the data plane, alongside optimising performance in complex commercial deployments. The research successfully integrated post-quantum cryptography into an open-source 5G core, demonstrating a non-disruptive method for enhancing network security. This integration, utilising ML-KEM-768 and ML-DSA algorithms, resulted in a predictable latency increase of approximately 54 milliseconds for Service-Based Interface signalling. Maintaining tightly bounded variance in performance suggests consistent operation despite the added cryptographic processing. The authors note that further work may focus on extending this protection to the data plane and optimising performance in larger, more complex network environments. 👉 More information 🗞 Empowering Mobile Networks Security Resilience by using Post-Quantum Cryptography 🧠 ArXiv: https://arxiv.org/abs/2603.28626 Tags: Rohail T. As a quantum scientist exploring the frontiers of physics and technology. My work focuses on uncovering how quantum mechanics, computing, and emerging technologies are transforming our understanding of reality. I share research-driven insights that make complex ideas in quantum science clear, engaging, and relevant to the modern world. Latest Posts by Rohail T.: Quantum Computing Solves Two Group Problems with Novel Boolean Algorithm April 2, 2026 Researchers Simulate Thermal Effects to Track Quantum Evolution with High Precision April 2, 2026 Framework Detects Quantum Risks in Codebases with 15 Primitive Classes April 2, 2026

Read Original

Tags

telecommunications
post-quantum-cryptography
quantum-computing
quantum-cryptography

Source Information

Source: Quantum Zeitgeist