This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Open AccessArticle
Post-Quantum Key Exchange and Subscriber Identity Encryption in 5G Using ML-KEM (Kyber) †
by
Qaiser Khan
Qaiser Khan *
,
Sourav Purification
Sourav Purification
and
Sang-Yoon Chang
Sang-Yoon Chang *
Department of Computer Science, University of Colorado Colorado Springs, Colorado Springs, CO 80918, USA
*
Authors to whom correspondence should be addressed.
†
This paper is an extended version of our paper, Q. Khan, S. Purification, and S.-Y. Chang, “Post-Quantum Key Exchange and ID Encryption Analyses for 5G Mobile Networking,” published in the proceedings of IEEE/IFIP Network Operations and Management Symposium, Honolulu, HI, USA, 12–16 May 2025.
Information 2025, 16(7), 617; https://doi.org/10.3390/info16070617 (registering DOI)
Submission received: 20 June 2025
/
Revised: 16 July 2025
/
Accepted: 16 July 2025
/
Published: 19 July 2025
Abstract
Fifth-generation technology addresses user privacy concerns in cellular networking by encrypting a subscriber identifier with elliptic-curve-based encryption and then transmitting it as ciphertext known as a Subscriber Concealed Identifier (SUCI). However, an adversary equipped with a quantum computer can break a discrete-logarithm-based elliptic curve algorithm. Consequently, the user privacy in 5G is at stake against quantum attacks. In this paper, we study the incorporation of the post-quantum ciphers in the SUCI calculation both at the user equipment and at the core network, which involves the shared-key exchange and then using the resulting key for the ID encryption. We experiment on different hardware platforms to analyze the PQC key exchange and encryption using NIST-standardized CRYSTALS-Kyber (which is now called an ML-KEM after the standardization selection by NIST). Our analyses focus on the performances and compare the Kyber-based key exchange and encryption with the current (pre-quantum) elliptic curve Diffie–Hellman (ECDH). The performance analyses are critical because mobile networking involves resource-limited and battery-operating mobile devices. We measure and analyze not only the time and CPU-processing performances but also the energy and power performances. Our analyses show that Kyber-512 is the most efficient and even has better performance (i.e., faster computations and lower energy consumption) than ECDH.
Share and Cite
MDPI and ACS Style
Khan, Q.; Purification, S.; Chang, S.-Y.
Post-Quantum Key Exchange and Subscriber Identity Encryption in 5G Using ML-KEM (Kyber). Information 2025, 16, 617.
https://doi.org/10.3390/info16070617
AMA Style
Khan Q, Purification S, Chang S-Y.
Post-Quantum Key Exchange and Subscriber Identity Encryption in 5G Using ML-KEM (Kyber). Information. 2025; 16(7):617.
https://doi.org/10.3390/info16070617
Chicago/Turabian Style
Khan, Qaiser, Sourav Purification, and Sang-Yoon Chang.
2025. "Post-Quantum Key Exchange and Subscriber Identity Encryption in 5G Using ML-KEM (Kyber)" Information 16, no. 7: 617.
https://doi.org/10.3390/info16070617
APA Style
Khan, Q., Purification, S., & Chang, S.-Y.
(2025). Post-Quantum Key Exchange and Subscriber Identity Encryption in 5G Using ML-KEM (Kyber). Information, 16(7), 617.
https://doi.org/10.3390/info16070617
Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details
here.
Article Metrics
Article Access Statistics
For more information on the journal statistics, click
here.
Multiple requests from the same IP address are counted as one view.