Tesi etd-02102026-143947 |
Link copiato negli appunti
Tipo di tesi
Tesi di laurea magistrale
Autore
PANTANI, LEONARDO
URN
etd-02102026-143947
Titolo
Post-Quantum Cryptography in 5G Core Networks: Implementation and Cost Analysis in Open5GS
Dipartimento
INGEGNERIA DELL'INFORMAZIONE
Corso di studi
CYBERSECURITY
Relatori
relatore Prof. Garroppo, Rosario Giuseppe
supervisore Prof. Pagano, Michele
supervisore Fiorini, Francesco
supervisore Prof. Pagano, Michele
supervisore Fiorini, Francesco
Parole chiave
- 5G core
- digital signatures
- key exchange
- network functions
- performance evaluation
- post-quantum cryptography
- service-based architecture
- TLS
Data inizio appello
27/02/2026
Consultabilità
Non consultabile
Data di rilascio
27/02/2096
Riassunto (Inglese)
Riassunto (Italiano)
The evolution of quantum computing brings not only new opportunities but also significant challenges. The most recently deployed cellular network technology, 5G, is now used worldwide to connect people and enable a broad range of applications.
The Core Network itself is composed of several Network Functions (NFs), each responsible for a specific task. Starting with 5G, these NFs are primarily implemented using a service-based architecture that relies on the same protocols and technologies commonly adopted by modern web applications. Communication between NFs must therefore be adequately protected. Although not strictly mandatory, such communications are typically secured using conventional cryptographic key exchange mechanisms, such as Diffie-Hellman (DH) or Elliptic-Curve Diffie-Hellman (ECDH). However, these algorithms are expected to be vulnerable to attacks from next-generation quantum computers.
In this work, we integrate post-quantum secure key exchange algorithms into a simulated 5G Core Network environment based on Open5GS, and we evaluate their impact in terms of resource consumption by the Network Functions and the latency required to register a User Equipment within the Core Network.
The Core Network itself is composed of several Network Functions (NFs), each responsible for a specific task. Starting with 5G, these NFs are primarily implemented using a service-based architecture that relies on the same protocols and technologies commonly adopted by modern web applications. Communication between NFs must therefore be adequately protected. Although not strictly mandatory, such communications are typically secured using conventional cryptographic key exchange mechanisms, such as Diffie-Hellman (DH) or Elliptic-Curve Diffie-Hellman (ECDH). However, these algorithms are expected to be vulnerable to attacks from next-generation quantum computers.
In this work, we integrate post-quantum secure key exchange algorithms into a simulated 5G Core Network environment based on Open5GS, and we evaluate their impact in terms of resource consumption by the Network Functions and the latency required to register a User Equipment within the Core Network.
File
| Nome file | Dimensione |
|---|---|
Tesi non consultabile. |
|