Rec. ITU-T X.1811 (04/2021) Security guidelines for applying quantum-safe algorithms in IMT-2020 systems
Summary
History
FOREWORD
Table of Contents
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview
7 Introduction to security components of IMT-2020 systems
     7.1 Security of the infrastructure layer
          7.1.1 Security of SDN
          7.1.2 Security of the NFVI layer
     7.2 Security of the network layer
          7.2.1 Security of the access network
               7.2.1.1 Subscriber privacy
               7.2.1.2 Authentication
               7.2.1.3 Key hierarchy
               7.2.1.4 Security of NAS signalling, AS signalling, and user data
               7.2.1.5 NDS/IP
               7.2.1.6 Security of non-3GPP access
          7.2.2 Security of the core network
               7.2.2.1 Within a PLMN
               7.2.2.2 Inter-PLMNs
     7.3 Security of the management plane
     7.4 Summary of the cryptographic algorithms used in IMT-2020 system
8 Security assessment of IMT-2020 systems under quantum computing
     8.1 Threats to conventional cryptographic algorithms
          8.1.1 Asymmetric cryptographic algorithms
          8.1.2 Symmetric cryptographic algorithms
          8.1.3 Hash algorithms
          8.1.4 Key derivation functions
     8.2 Prediction of the timeline for large-scale quantum computer
     8.3 Impacts on IMT-2020 systems
          8.3.1 Impacts on IPsec, TLS and DTLS
          8.3.2 Impacts on the infrastructure layer
          8.3.3 Impacts on the access network
               8.3.3.1 Subscriber privacy
               8.3.3.2 Authentication
               8.3.3.3 Key hierarchy
               8.3.3.4 NAS signalling, AS signalling, and user data
               8.3.3.5 NDS/IP
               8.3.3.6 Security of non-3GPP access
          8.3.4 Impacts on the core network
               8.3.4.1 Within a PLMN
               8.3.4.2 Inter-PLMNs
          8.3.5 Impacts on the management plane
9 Quantum-safe cryptographic algorithms
     9.1 Quantum-safe symmetric key algorithms
     9.2 Quantum-safe asymmetric key algorithms
          9.2.1 Lattice-based algorithms
          9.2.2 Hash-based algorithms
          9.2.3 Code-based algorithms
          9.2.4 Multivariate algorithms
          9.2.5 Supersingular isogeny-based algorithms
10 Guidelines for usage of quantum-safe cryptographic algorithms in IMT-2020 systems
     10.1 Message size
     10.2 IPsec, TLS and DTLS
     10.3 Infrastructure layer
     10.4 IMT-2020 access network
          10.4.1 Subscriber privacy
          10.4.2 Authentication
          10.4.3 Key hierarchy
          10.4.4 Security of NAS signalling, AS signalling and user data
          10.4.5 Security of non-3GPP access
     10.5 IMT-2020 core network
          10.5.1 Within a PLMN
          10.5.2 Inter-PLMNs
Appendix I  Overview of IMT-2020 system
     I.1 General architecture
     I.2 SDN
     I.3 Access network
     I.4 Core network
     I.5 Management plane
Appendix II  Quantum-safe asymmetric key cryptographic algorithms
     II.1 Lattice-based algorithms
     II.2 Hash-based algorithms
     II.3 Code-based algorithms
     II.4 Multivariate algorithms
     II.5 NIST standardization of post quantum cryptography
Appendix III  Impact of quantum computing on common cryptographic algorithms
Appendix IV  Assessment criteria for quantum-safe cryptography
     IV.1 Security
     IV.2 Cost
     IV.3 Algorithm and implementation characteristics
Bibliography
<\pre>