Summary

This Recommendation identifies threats raised by quantum computing to fifth generation (5G) systems through assessing the security strength of currently used cryptographic algorithms. This Recommendation briefly reviewed quantum safe algorithms, including both symmetric and asymmetric types, and provides guidelines for applying quantum safe algorithms in 5G systems.