Previous Article in Journal
Private Blockchain-Driven Digital Evidence Management Systems: A Collaborative Mining and NFT-Based Framework
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Post-Quantum Key Exchange and Subscriber Identity Encryption in 5G Using ML-KEM (Kyber) †

Department of Computer Science, University of Colorado Colorado Springs, Colorado Springs, CO 80918, USA
*
Authors to whom correspondence should be addressed.
This paper is an extended version of our paper, Q. Khan, S. Purification, and S.-Y. Chang, “Post-Quantum Key Exchange and ID Encryption Analyses for 5G Mobile Networking,” published in the proceedings of IEEE/IFIP Network Operations and Management Symposium, Honolulu, HI, USA, 12–16 May 2025.
Information 2025, 16(7), 617; https://doi.org/10.3390/info16070617 (registering DOI)
Submission received: 20 June 2025 / Revised: 16 July 2025 / Accepted: 16 July 2025 / Published: 19 July 2025
(This article belongs to the Special Issue Public Key Cryptography and Privacy Protection)

Abstract

Fifth-generation technology addresses user privacy concerns in cellular networking by encrypting a subscriber identifier with elliptic-curve-based encryption and then transmitting it as ciphertext known as a Subscriber Concealed Identifier (SUCI). However, an adversary equipped with a quantum computer can break a discrete-logarithm-based elliptic curve algorithm. Consequently, the user privacy in 5G is at stake against quantum attacks. In this paper, we study the incorporation of the post-quantum ciphers in the SUCI calculation both at the user equipment and at the core network, which involves the shared-key exchange and then using the resulting key for the ID encryption. We experiment on different hardware platforms to analyze the PQC key exchange and encryption using NIST-standardized CRYSTALS-Kyber (which is now called an ML-KEM after the standardization selection by NIST). Our analyses focus on the performances and compare the Kyber-based key exchange and encryption with the current (pre-quantum) elliptic curve Diffie–Hellman (ECDH). The performance analyses are critical because mobile networking involves resource-limited and battery-operating mobile devices. We measure and analyze not only the time and CPU-processing performances but also the energy and power performances. Our analyses show that Kyber-512 is the most efficient and even has better performance (i.e., faster computations and lower energy consumption) than ECDH.
Keywords: post-quantum cryptography; 5G; SUCI; elliptic curve integrated encrypted scheme; CRYSTALS-Kyber; ML-KEM post-quantum cryptography; 5G; SUCI; elliptic curve integrated encrypted scheme; CRYSTALS-Kyber; ML-KEM

Share and Cite

MDPI and ACS Style

Khan, Q.; Purification, S.; Chang, S.-Y. Post-Quantum Key Exchange and Subscriber Identity Encryption in 5G Using ML-KEM (Kyber). Information 2025, 16, 617. https://doi.org/10.3390/info16070617

AMA Style

Khan Q, Purification S, Chang S-Y. Post-Quantum Key Exchange and Subscriber Identity Encryption in 5G Using ML-KEM (Kyber). Information. 2025; 16(7):617. https://doi.org/10.3390/info16070617

Chicago/Turabian Style

Khan, Qaiser, Sourav Purification, and Sang-Yoon Chang. 2025. "Post-Quantum Key Exchange and Subscriber Identity Encryption in 5G Using ML-KEM (Kyber)" Information 16, no. 7: 617. https://doi.org/10.3390/info16070617

APA Style

Khan, Q., Purification, S., & Chang, S.-Y. (2025). Post-Quantum Key Exchange and Subscriber Identity Encryption in 5G Using ML-KEM (Kyber). Information, 16(7), 617. https://doi.org/10.3390/info16070617

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop