POST-QUANTUM CRYPTOGRAPHY FOR SECURE 5G AND IOT: LATTICE-BASED ENCRYPTION SCHEMES

ICTACT Journal on Communication Technology ( Volume: 16 , Issue: 3 )

Abstract

The impending advent of cryptographically relevant quantum computers threatens classical public-key primitives that underpin 5G and IoT security, including key exchange, authentication, and device onboarding. Ultra-dense networks, constrained endpoints, and long device lifetimes heighten exposure to “harvest-now, decrypt-later” risks. Mobile operators and IoT platform providers need migration ready cryptography that fits radio-access latency budgets, scales to billions of low-power nodes, and integrates cleanly with 3GPP and IETF protocols without degrading quality of service. Many post quantum options impose prohibitive bandwidth and compute costs or lack deployment guidance tuned to network slices and massive machine-type communications. We propose a lattice-based encryption and key-encapsulation framework grounded in Module-LWE/LWR assumptions. The design pairs an IND-CCA-secure KEM for control plane bootstrapping with lightweight AEAD for user-plane data, delivered through a hybrid handshake combining classical ECDH with a post-quantum KEM to ensure continuity during transition. Parameter tiers align with eMBB, URLLC, and mMTC device classes. Implementation emphasizes constant-time polynomial arithmetic, NTT-accelerated convolution, centered-binomial noise sampling, public-key compression, and stateless hash-based signatures for attestation. A gNB-assisted enrollment workflow and session-key rotation via 5G NAS/RRC are specified. Analytical modeling and prototype measurements indicate sub-millisecond encapsulation on ARM Cortex-M33 microcontrollers and ~1.5 ms on RAN baseband paths, while handshake message growth remains within existing NAS and RRC budgets. In ns-3 simulations of dense mMTC topologies, the hybrid handshake achieves >99.99% success under 1% packet loss, and energy profiling shows <5% battery impact for weekly rekeying. Security analysis demonstrates resistance to known lattice attacks at NIST Levels 3–5, forward secrecy via ephemeral KEMs, downgrade resistance through authenticated algorithm negotiation, and post compromise security with frequent rekeying.

Authors

M Poomani1, Bikash Chandra Saha2
Sethu Institute of Technology, India1, Cambridge Institute of Technology, India2

Keywords

Post-Quantum Cryptography, Lattice-based KEM, 5G Security, IoT Devices, Hybrid Key Exchange

Published By
ICTACT
Published In
ICTACT Journal on Communication Technology
( Volume: 16 , Issue: 3 )
Date of Publication
September 2025
Pages
3608 - 3615
Page Views
155
Full Text Views
3

ICT Academy is an initiative of the Government of India in collaboration with the state Governments and Industries. ICT Academy is a not-for-profit society, the first of its kind pioneer venture under the Public-Private-Partnership (PPP) model

Contact Us

ICT Academy
Module No E6 -03, 6th floor Block - E
IIT Madras Research Park
Kanagam Road, Taramani,
Chennai 600 113,
Tamil Nadu, India

For Journal Subscription: journalsales@ictacademy.in

For further Queries and Assistance, write to us at: ictacademy.journal@ictacademy.in