D2.1 Post-quantum analysis report
Authors/Creators
Description
The main purpose of the document is to describe how 6G can be made resistant to quantum attackers and thus provide better long-term security with a special focus on data confidentiality and privacy-preserving computation enablers. To this end, this document identifies where 6G will require post-quantum secure building blocks to decrease the susceptibility against quantum attackers. Moreover, it sketches ways to migrate towards a post-quantum secure implementations and infrastructure. The analysis aims at extending existing constructions, where possible, to maximize code reuse. New cryptographic primitives should accommodate the specific constraints of 6G. Moreover, complex protocols should be proven secure while relying on post-quantum security models.
Files
CONFIDENTIAL6G_D2.1_Post-quantum Analysis Report_v1.0.pdf
Files
(449.3 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:dcc3cea4185a74bcccd667bf347b1c94
|
449.3 kB | Preview Download |