Iranian Journal of Information Processing and Management

Iranian Journal of Information Processing and Management

Quantum Key Distribution Protocols for Enhancing Cryptographic Resilience in Next-Generation 5G Network Infrastructures

Document Type : Original Article

Authors
1 Al-Turath University, Baghdad 10013, Iraq
2 Al-Mansour University College, Baghdad 10067, Iraq
3 Osh State University, Osh City 723500, Kyrgyzstan
4 Al-Rafidain University College Baghdad 10064, Iraq
5 Madenat Alelem University College, Baghdad 10006, Iraq
Abstract
 
ABSTRACT
Background: Quantum computing has posed a profound threat to the classical cryptographic systems as it is advancing at an exponential rate with the help of quantum algorithms like Shor’s and Grover’s which can easily decipher the Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) algorithms. Huge requirements for cryptographic frameworks that can withstand quantum hacking have inspired Quantum Key Distribution (QKD), Post-Quantum Cryptography (PQC), and systems that use both.
Objective: The aim of this article is to review the performance, scalability and integration of quantum-secure cryptographic services, with a practical lens on how they can be used in real-time environments like self-driving cars, industrial IoT, and intelligent health systems. It also aims at establishing the drawback of the current model and directions for further enhancement.
Methods: The study employs simulative experimentation to understand lest exposures to quantum algorithms and rates cryptographic systems on standards such as latency, Quantum Bit Error Rate (QBER), computational overhead, scalability, and cost. Comparative assessment furniture integrated analysis of QKD, PQC, and hybrid system by identifying the advantages and disadvantage of each system.
Results: As a result, adopting hybrid systems provided the best or comparable median results with lowest latency in real-time applications of ~45 ms or lower compared to alternative Multi-Access Edge Computing (MEC) architectures and types of security elements at high scalability. Thus, QKD, while being exceptional in security, has the problem of scalability, while PQC had average results on the given parameters.
Conclusion: Quantum threats are adequately dealt with by hybrid cryptographic systems as this study has also pointed out. It is seen that initiation to future work may someday distribute resources effectively, expedite PQC standardization, and embrace artificially intelligent network frameworks for flexibility and expansiveness across different networks.
Keywords

References

Abbas, T. N. A., Hameed, R., Kadhim, A. A., and Qasim, N. H. (2024). Artificial intelligence and criminal liability: exploring the legal implications of ai-enabled crimes.  Encuentros. Revista de Ciencias Humanas, Teoría Social y Pensamiento Crítico., (22 ), 140-159. https://doi.org/10.5281/zenodo.13386675
Ahn, J., Kwon, H.-Y., Ahn, B., Park, K., Kim, T., Lee, M.-K., Kim, J., et al. (2022). Toward Quantum Secured Distributed Energy Resources: Adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD). Energies, 15 (3). https://doi.org/10.3390/en15030714.
Aizpurua, B., Bermejo, P., Martinez, J. E., and Orus, R. (2023). Hacking Cryptographic Protocols with Advanced Variational Quantum Attacks.  arXiv preprint arXiv:2311.02986. https://doi.org/10.48550/arXiv.2311.02986
Cheng, J. K., Lim, E. M., Krikorian, Y. Y., Sklar, D. J., and Kong, V. J. (2021). A Survey of Encryption Standard and Potential Impact Due to Quantum Computing. 2021 IEEE Aerospace Conference (50100), 6-13 March 2021. https://doi.org/10.1109/AERO50100.2021.9438392.
Dharani, D., Soorya, R. M., Kumari, K. A. . (2023). Quantum Resistant Cryptographic Systems for Blockchain Network. 2023 3rd International Conference on Intelligent Technologies (CONIT), 23-25 June. https://doi.org/10.1109/CONIT59222.2023.10205646.
Eich, B., Grote, O., and Ahrens, A. (2023). A Quantum-Safe Public-Key-Algorithms Approach with Lattice-Based Scheme. 2023 International Interdisciplinary PhD Workshop (IIPhDW), 3-5 May. https://doi.org/10.1109/IIPhDW54739.2023.10124431.
Farooq, S., Altaf, A., Iqbal, F., Thompson, E. B., Vargas, D. L., Díez, I. D., and Ashraf, I. (2023). Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. Sensors, 23 (12). https://doi.org/10.3390/s23125379.
Faruk, M. J. H., Tahora, S., Tasnim, M., Shahriar, H., and Sakib, N. (2022). A Review of Quantum Cybersecurity: Threats, Risks and Opportunities. 2022 1st International Conference on AI in Cybersecurity (ICAIC), 24-26 May. https://doi.org/10.1109/ICAIC53980.2022.9896970.
Iyer, V. V., and Yilmaz, A. E. (2021). Using the ANOVA F-Statistic to Rapidly Identify Near-Field Vulnerabilities of Cryptographic Modules. 2021 IEEE MTT-S International Microwave Symposium (IMS), 7-25 June. https://doi.org/10.1109/IMS19712.2021.9575028.
Joshi, S., Bairwa, A. K., Pljonkin, A. P., Garg, P., and Agrawal, K. (2023). From Pre-Quantum to Post-Quantum RSA. Proceedings of the 6th International Conference on Networking, Intelligent Systems & Security, Larache, Morocco. https://doi.org/10.1145/3607720.3607721
Khlaponin, Y., Izmailova, O., Krasovska, H., Krasovska, K., Bodnar, N., and Abbas, S. Q. (2024). Base of Models of the Information Security Risks Assessment System. 2024 35th Conference of Open Innovations Association (FRUCT). https://doi.org/10.23919/FRUCT61870.2024.10516397.
Mashatan, A., and Heintzman, D. (2021). The Complex Path to Quantum Resistance: Is your organization prepared?  Queue, 19 (2), Pages 20. https://doi.org/10.1145/3466132.3466779
Pedone, I., Atzeni, A., Canavese, D., and Lioy, A. (2021). Toward a Complete Software Stack to Integrate Quantum Key Distribution in a Cloud Environment.  IEEE Access, 9, 115270-115291. https://doi.org/10.1109/ACCESS.2021.3102313
Qasim, N., Jawad, A., and Majeed, M. (2023). The Usages of Cybersecurity in Marine Communications.  Transport Development, 3 (18). https://doi.org/10.33082/td.2023.3-18.05
Qasim, N. H., Jumaa, D. A., Rahim, F., Jawad, A. M., Khaleefah, A. M., Zhyrov, G., and Ali, H. (2024). Simplifying IP multimedia systems by introducing next-generation networks with scalable architectures.  Edelweiss Applied Science and Technology, 8 (4), 2042-2054. https://doi.org/10.55214/25768484.v8i4.1580
Qasim, N. H., Vyshniakov, V., Khlaponin, Y., and Poltorak, V. (2021). Concept in information security technologies development in e-voting systems.  International Research Journal of Modernization in Engineering Technology and Science (IRJMETS), 3 (9), 40-54. https://www.irjmets.com/uploadedfiles/paper/volume_3/issue_9_september_2021/15985/final/fin_irjmets1630649545.pdf
Raya, J. E., Yahya, A. S., and Ahmad, E. K. (2023). Protection from A Quantum Computer Cyber-Attack: survey.  Technium: Romanian Journal of Applied Sciences and Technology, 5, 1-12. https://doi.org/10.47577/technium.v5i.8293
Rodas, R. N. P., Lin, Y. D., Lu, S. L., and Chang, K. J. (2021). O2MD²: A New Post-Quantum Cryptosystem With One-to-Many Distributed Key Management Based on Prime Modulo Double Encapsulation.  IEEE Access, 9, 109260-109288. https://doi.org/10.1109/ACCESS.2021.3100551
Septien-Hernandez, J.-A., Arellano-Vazquez, M., Contreras-Cruz, M. A., and Ramirez-Paredes, J.-P. (2022). A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications. Sensors, 22 (2). https://doi.org/10.3390/s22020489.
Solanki, B., and Saini, A. (2023). Review Paper on Quantum Computing and Quantum Cryptography.  International Journal of Advanced Research in Science, Communication and Technology, 7-13. https://doi.org/10.48175/IJARSCT-10712
Tom, J. J., Anebo, N. P.  Onyekwelu, B. A.,, and Wilfred, A., Eyo, R. E. (2023). Quantum Computers and Algorithms: A Threat to Classical Cryptographic Systems.  International Journal of Engineering and Advanced Technology, 12 (5), 25-38. https://doi.org/10.35940/ijeat.E4153.0612523
Venkatesh, R., and Hanumantha, B. S. (2023). A Privacy-Preserving Quantum Blockchain Technique for Electronic Medical Records.  IEEE Engineering Management Review, 51 (4), 137-144. https://doi.org/10.1109/EMR.2023.3319376
Wang, J.-Y., Chang, X., and Wang, H. J. (2023). How to use Classical Operation in Digital Bits to Simulate Quantum Bits for the RSA Cryptosystem.  Advanced Computer Science and Information Technology Trends, 367-376. https://doi.org/10.5121/csit.2023.131328
Yang, Y.-H., Li, P.-Y., Ma, S.-Z., Qian, X.-C., Zhang, K.-Y., Wang, L.-J., Zhang, W.-L., et al. (2021). All optical metropolitan quantum key distribution network with post-quantum cryptography authentication. Optics Express, 29 (16), 25859-25867. https://doi.org/10.1364/OE.432944
Yousif, O., Dawood, M., Jassem, F. T., and Qasim, N. H. (2024). Curbing crypto deception: evaluating risks, mitigating practices and regulatory measures for preventing fraudulent transactions in the middle east.  Encuentros: Revista de Ciencias Humanas, Teoría Social y Pensamiento Crítico, (22), 311-334. https://doi.org/10.5281/zenodo.13732337
Yu, Y. (2021). Preface to special topic on lattice-based cryptography.  National Science Review, 8 (9), nwab154. https://doi.org/10.1093/nsr/nwab154
Zapatero, V., van Leent, T., Arnon-Friedman, R., Liu, W.-Z., Zhang, Q., Weinfurter, H., and Curty, M. (2023). Advances in device-independent quantum key distribution.  npj Quantum Information, 9 (1), 10. https://doi.org/10.1038/s41534-023-00684-x
Zhang, Q., Ayoub, O., Wu, J., Lin, X., and Tornatore, M. (2023). IC-QKD: An Information-Centric Quantum Key Distribution Network.  IEEE Communications Magazine, 61 (12), 148-154. https://doi.org/10.1109/MCOM.004.2200763