Abstract
This survey overviews the potential use of cryptographic primitives in the fifth-generation mobile communications system (aka 5G) and beyond. It discusses the new security challenges that come with 5G and presents the upcoming security architecture. It shows the use of current cryptographic algorithms and discusses new algorithms or modifications of existing ones, that can be relevant. It also discusses the need for lightweight algorithms to meet the new use cases as well as the general demand for algorithms secure even when large quantum computers are available.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
ITU-R. IMT Vision-Framework and overall objectives of the future development of IMT for 2020 and beyond. Recommendation ITU-R M.2083-0. https://www.itu.int/dms_pubrec/itu-r/rec/rn/R-REC-M.2083-0-201509-I!!PDF-E.pdf
ITU-R. Minimum requirements related to technical performance for IMT-2020 radio interface. Report ITU-R M.2410-0. https://www.itu.int/dms_pub/itu-r/opb/rep/R-REP-M.2410-2017-PDF-E.pdf
3rd Generation Partnership Project. Technical Specification Group Services and System Aspects; 3GPP System Architecture Evolution (SAE); Security Architecture (Release 16). 3GPP TS 33.401 (V16.1.0). https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2296
Gabriel B. Cloud RAN & the Next-Generation Mobile Network Architecture. White Paper. https://www-file.huawei.com/-/media/CORPORATE/PDF/mbb/cloud-ran-the-next-generation-mobile-network-architecture.pdf?la=en
3rd Generation Partnership Project. Technical Specification Group Services and System Aspects; System Architecture for the 5G System (5GS); Stage 2 (Release 16). 3GPP TS 23.501 (V16.3.0). https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144
3rd Generation Partnership Project. Technical Specification Group Services and System Aspects; Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) (Release 16). 3GPP TS 33.220 (V16.0.0). https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2280
3rd Generation Partnership Project. Technical Specification Group Services and System Aspects; Security Architecture and Procedures for 5G system (Release 16). 3GPP TS 33.501 (V16.1.0). https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3169
3rd Generation Partnership Project. Technical Specification Group Services and Systems Aspects; Security Aspects; Study on the support of 256-bit Algorithms for 5G (Release 16). 3GPP TS 33.841 (V16.1.0). https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3422
3rd Generation Partnership Project. Technical Specification Group Core Network and Terminals; Numbering, Addressing and Identification (Release 16). 3GPP TS 23.003 (V16.1.0). https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=729
Huawei. Partnering with the Industry for 5G Security Assurance. White Paper, 2019. https://www-file.huawei.com/-/media/corporate/pdf/trust-center/huawei-5g-security-white-paper-4th.pdf
Yang J, Thomas J, Alexander M. Vectorized linear approximations for attacks on SNOW 3G. In: Proceedings of the 27th Annual Fast Software Encryption Conference, 2020
Yang J, Thomas J, Alexander M. Spectral analysis of ZUC-256. In: Proceedings of the 27th Annual Fast Software Encryption Conference, 2020
Patrik E, Thomas J, Maximov A, et al. A new SNOW stream cipher called SNOW-V. IACR Trans Symmetric Cryptol, 2019, 20: 1–42
ZUC Design Team. The ZUC-256 Stream Cipher. 2018. http://www.is.cas.cn/ztzl2016/zouchongzhi/201801/W020180126529970733243.pdf
NIST. Announcing the advanced encryption standard (AES). Federal Information Processing Standards Publication 197. https://www.cisco.com/c/dam/en/us/products/collateral/security/anyconnect-secure-mobility-client/fips.pdf
International Organization for Standardization. Information Technology — Security Techniques — Lightweight Cryptography — Part 2: Block Ciphers. ISO/IEC 29192-2:2012. https://www.iso.org/standard/56552.html
International Organization for Standardization. Information Technology — Security Techniques — Lightweight Cryptography — Part 3: Stream Ciphers. ISO/IEC 29192-3:2012. https://www.iso.org/standard/56426.html
International Organization for Standardization. Information Technology — Security Techniques — Lightweight Cryptography — Part 5: Hash-functions. ISO/IEC 29192-5:2016. https://www.iso.org/standard/67173.html
International Organization for Standardization. Information Technology — Security Techniques — Lightweight Cryptography — Part 4: Mechanisms Using Asymmetric Techniques. ISO/IEC 29192-4:2013. https://www.iso.org/standard/56427.html
CRYPTREC Lightweight Cryptography Working Group. CRYPTREC Cryptographic Technology Guideline (Lightweight Cryptography). 2017. https://www.cryptrec.go.jp/report/cryptrec-gl-2003-2016en.pdf
Alex B, Léo P. State of the art in lightweight symmetric cryptography. IACR Cryptology ePrint Archive, 2017. https://www.semanticscholar.org/paper/State-of-the-Art-in-Lightweight-Symmetric-Biryukov-Perrin/532441547d905feae7a65f635594585c96d2987b
Nicholas J H, Manuel B. Secure human identification protocols. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2001. 52–66
Ari J, Stephen A W. Authenticating pervasive devices with human protocols. In: Proceedings of Annual International Cryptology Conference. Berlin: Springer, 2005. 293–308
Julien B, Herv C, Emmanuelle D. HB++: a lightweight authentication protocol secure against some attacks. In: Proceedings of the 2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2006. 28–33
Stefan H, Eike K, Vadim L, et al. Lapin: an efficient authentication protocol based on ring-LPN. In: Proceedings of International Workshop on Fast Software Encryption. Berlin: Springer, 2012. 346–365
Frederik A, Matthias H, Vasily M. Lightweight authentication protocols on ultra-constrained RFIDs — myths and facts. In: Radio Frequency Identification: Security and Privacy Issues. Cham: Springer, 2015. 1–18
Buchanan W J, Li S C, Asif R. Lightweight cryptography methods. J Cyber Secur Tech, 2017, 1: 187–201
Markku-Juhani O S. Ring-LWE ciphertext compression and error correction: tools for lightweight post-quantum cryptography. In: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, 2017. 15–22
SECG. SEC 1: Recommended Elliptic Curve Cryptography (Version 2.0). 2009. http://www.secg.org/sec1-v2.pdf
SECG. SEC 2: Recommended Elliptic Curve Domain Parameters (Version 2.0). 2010. http://www.secg.org/sec2-v2.pdf
Adam L, Mike M, Sean T. Elliptic curves for security. IETF RFC 7748, 2016. https://www.rfc-editor.org/info/rfc7748
Hugo K, Mihir B, Ran C. HMAC: keyed-hashing for message authentication. IETF RFC 2104, 1997. https://www.rfc-editor.org/rfc/pdfrfc/rfc2104.txt.pdf
International Organization for Standardization. Information Technology — Security Techniques — Hash-Functions — Part 3: Dedicated Hash-Functions. ISO/IEC 10118-3:2004. https://www.iso.org/standard/39876.html
ETSI SAGE. Observations and questions on 256-bit security goals. S3-200929. https://www.3gpp.org/FTP/tsg_sa/WG3_Security/TSGS3_99e/Docs
ETSI SAGE. Expectations and requirements for 256-bit algorithms. S3-190107. https://www.3gpp.org/DynaReport/TDocExMtg—S3-94—33863.htm
ETSI SAGE. 256-bit algorithm candidates. S3-194534. https://www.3gpp.org/FTP/Meetings_3GPP_SYNC/SA3/Docs
Rei U, Sumio M, Naofumi H, et al. A high throughput/gate aes hardware architecture by compressing encryption and decryption datapaths toward efficient cbc-mode implementation. Cryptology ePrint Archive, 2016. https://eprint.iacr.org/2016/595
Andrey B, Dmitry K, Christian R. Biclique cryptanalysis of the full AES. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2011
Gupta S S, Chattopadhyay A, Khalid A. Designing integrated accelerator for stream ciphers with structural similarities. Cryptogr Commun, 2013, 5: 19–47
Roberto A, Billy B B. Faster 128-EEA3 and 128-EIA3 software. In: Proceedings of the 16th International Conference on Information Security, Cham: Springer, 2015. 199–208
Liu Z B, Zhang Q L, Ma C Q, et al. HPAZ: a high-throughput pipeline architecture of ZUC in hardware. In: Proceedings of Design, Automation & Test in Europe Conference & Exhibition (DATE), 2016. 269–272
ETSI/SAGE. Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2, Document 2: SNOW 3G Specification (version 1.1). 2006
Carlos C, Matthew D, Sean M. A security evaluation of the SNOW-V stream cipher. Private Correspondence, 2020
Jiao L, Li Y Q, Hao Y L. A guess-and-determine attack on SNOW-V stream cipher. Comput J, 2020. doi: https://doi.org/10.1093/comjnl/bxaa003
ETSI/SAGE. Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3, Document 2: ZUC Specification. 2011. https://www.gsma.com/aboutus/wp-content/uploads/2014/12/eea3eia3zucv16.pdf
Guang G. Securing Internet-of-Things. In: Proceedings of International Symposium on Foundations and Practice of Security. Berlin: Springer, 2018. 3–16
Andrey B, Lars R K, Gregor L, et al. PRESENT: an ultra-lightweight block cipher. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems. Berlin: Springer, 2007. 450–466
Shirai T, Kyoji S, Toru A, et al. The 128-bit blockcipher CLEFIA. In: Proceedings of International Workshop on Fast Software Encryption. Berlin: Springer, 2007. 181–195
Christophe D C. Trivium: a stream cipher construction inspired by block cipher design principles. In: Proceedings of International Conference on Information Security. Berlin: Springer, 2006
Dai W, Kota I, Jun K, et al. Enocoro-80: a hardware oriented stream cipher. In: Proceedings of the 3rd International Conference on Availability, Reliability and Security, Barcelona, 2008. 1294–1300
Guo J, Peyrin T, Poschmann A. The PHOTON family of lightweight hash functions family. In: Proceedings of Advances in Cryptology-Crypto. Berlin: Springer, 2011. 222–239
Bogdanov A, Knežević M, Leander G, et al. SPONGENT: the design space of lightweight cryptographic hashing. IEEE Trans Comput, 2012, 62: 2041–2053
Hirose S, Ideguchi K, Kuwakado H, et al. A lightweight 256-bit hash function for hardware and low-end devices: Lesamnta-LW. In: Proceedings of International Conference on Information Security and Cryptology. Berlin: Springer, 2011. 151–168
Ågren M, Hell M, Johansson T, et al. Grain-128a: a new version of Grain-128 with optional authentication. Int J Wirel Mobile Comput, 2011, 5: 48–59
Mitsuru M. New block encryption algorithm MISTY. In: Proceedings of International Workshop on Fast Software Encryption. Berlin: Springer, 1997
Deukjo H, Jaechul S, Seokhie H, et al. HIGHT: a new block cipher suitable for low-resource device. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems. Berlin: Springer, 2006
María N P. Lightweight cryptography. In: Proceedings of Summer School on Real-world Crypto and Privacy, Sibenik, 2018
Frederik A, Vasily M. On lightweight stream ciphers with shorter internal states. In: Proceedings of International Workshop on Fast Software Encryption. Berlin: Springer, 2015
Martin H, Thomas J, Meier W, et al. Grain-128AEAD-A lightweight AEAD stream cipher. NIST Lightweight Cryptography project, Round 2. https://csrc.nist.gov/Projects/lightweight-cryptography/round-2-candidates
Jonathan S, Martin H, Mattias S, et al. Efficient hardware implementations of Grain-128AEAD. In: Proceedings of International Conference on Cryptology in India. Cham: Springer, 2019. 495–513
Eisenbarth T, Kumar S, Paar C, et al. A survey of lightweight-cryptography implementations. IEEE Design Test Comput, 2007, 24: 522–533
Eric L, Pirre-Alain F. An improved LPN algorithm. In: Proceedings of International Conference on Security and Cryptography for Networks. Berlin: Springer, 2006. 348–359
Jonathan K, Ji S S. Parallel and concurrent security of the HB and HB+ protocols. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2006. 73–87
Katz J, Shin J S, Smith A. Parallel and concurrent security of the HB and HB+ protocols. J Cryptol, 2010, 23: 402–421
Martin F, Sandra D, Johannes W. Strong authentication for RFID systems using the AES algorithm. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems. Berlin: Springer, 2004. 357–370
Chen L, Stephen J, Yi-Kai L, et al. Report on post-quantum cryptography (NISTIR 8105). 2016. https://nvlpubs.nist.gov/nistpubs/ir/2016/nist.ir.8105.pdf
Lu X H, Liu Y M, Jia D D, et al. LAC. 2019. https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Round-2-Submissions
Tim G, Tobias O. Towards lightweight identity-based encryption for the post-quantum-secure Internet of Things. In: Proceedings of 2017 18th International Symposium on Quality Electronic Design (ISQED), 2017. 319–324
NIST. Post-Quantum Cryptography Standardization Project. https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Post-Quantum-Cryptography-Standardization
Acknowledgements
This work was in part financially supported by Swedish Foundation for Strategic Research (Grant No. RIT17-0005), and ELLIIT Research Program. The author Jing YANG is also supported by the scholarship from National Digital Switching System Engineering and Technological Research Center, China. We would like to thank all anonymous reviewers for providing valuable comments to the manuscript.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Yang, J., Johansson, T. An overview of cryptographic primitives for possible use in 5G and beyond. Sci. China Inf. Sci. 63, 220301 (2020). https://doi.org/10.1007/s11432-019-2907-4
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-019-2907-4