
浏览全部资源
扫码关注微信
1.中国电信股份有限公司研究院,上海 201315
2.云网基础设施安全国家工程研究中心,上海 201315
[ "王靖然(1995- ),女,中国电信股份有限公司研究院工程师、云网基础设施安全国家工程研究中心工程师,主要研究方向为网络安全技术、密码协议、后量子密码等。" ]
[ "王聪丽(1994- ),女,中国电信股份有限公司研究院工程师、云网基础设施安全国家工程研究中心工程师,主要研究方向为公钥密码基础设施、密码应用、商用密码应用安全性评估、5G安全、量子安全等。" ]
[ "宋伟(1994- ),男,中国电信股份有限公司研究院工程师,主要研究方向为网络安全运营。" ]
[ "陈勇量(1991- ),男,中国电信股份有限公司研究院工程师,主要研究方向为网络安全运营。" ]
[ "薛伟佳(1990- ),女,博士,中国电信股份有限公司研究院工程师、云网基础设施安全国家工程研究中心工程师,主要研究方向为密码应用、商用密码及密评、量子保密通信与密码融合应用等。" ]
[ "王锦华(1982- ),男,中国电信股份有限公司研究院工程师、云网基础设施安全国家工程研究中心工程师,主要研究方向为云计算、大数据安全、终端安全、密码应用、量子安全等。" ]
收稿日期:2025-01-22,
修回日期:2025-04-29,
纸质出版日期:2025-08-20
移动端阅览
王靖然,王聪丽,宋伟等.后量子密码算法在电信领域的应用研究[J].电信科学,2025,41(08):186-196.
WANG Jingran,WANG Congli,SONG Wei,et al.Research on the application of post-quantum cryptographic algorithms in the telecommunications field[J].Telecommunications Science,2025,41(08):186-196.
王靖然,王聪丽,宋伟等.后量子密码算法在电信领域的应用研究[J].电信科学,2025,41(08):186-196. DOI: 10.11959/j.issn.1000-0801.2025123.
WANG Jingran,WANG Congli,SONG Wei,et al.Research on the application of post-quantum cryptographic algorithms in the telecommunications field[J].Telecommunications Science,2025,41(08):186-196. DOI: 10.11959/j.issn.1000-0801.2025123.
密码作为国家重要的战略资源,在网络与信息安全领域发挥着核心作用。近年来,量子计算技术的快速发展,有效推动了学术界、产业界等对后量子密码(post-quantum cryptography,PQC)的研究与应用。基于此,研究了量子计算对经典密码算法的安全威胁,调研了PQC的发展现状,分析了电信领域典型场景的量子安全影响,最后开展了PQC签名算法模块化格基数字签名标准(module-lattice-based digital signature standard,ML-DSA)的迁移验证与测试分析。实验结果表明,ML-DSA算法能够满足系统的高并发、高可用要求。
As a vital strategic resource
cryptography plays a core role in the field of network and information security. In recent years
the rapid development of quantum computing has effectively promoted the research and application of post-quantum cryptography (PQC) algorithms in academia and industry. Based on this
the security threats posed by quantum computing to classical cryptographic algorithms were studied
the current development status of PQC was surveyed
the quantum security impacts on typical scenarios in the telecommunications field were analyzed
and finally
migration verification and testing analysis were conducted for the PQC signature algorithm (module-lattice-based digital signature standard) ML-DSA. The experimental results indicate that the ML-DSA algorithm can meet the requirements of high concurrency and high availability of the system.
COCCIA M , ROSHANI S . Evolutionary phases in emerging quantum technologies: general theoretical and managerial implications for driving technological evolution [J ] . IEEE Transactions on Engineering Management , 2024 , 71 : 8323 - 8338 .
YANG Z B , ZOLANVARI M , JAIN R . A survey of important issues in quantum computing and communications [J ] . IEEE Communications Surveys & Tutorials , 2023 , 25 ( 2 ): 1059 - 1094 .
杨波 . 现代密码学 [M ] . 5版 . 北京 : 清华大学出版社 , 2022 .
YANG B . Modern cryptography [M ] . 5th Edition . Beijing : Tsinghua University Press , 2022 .
马彰超 . 量子时代的网络安全挑战及其应对研究 [J ] . 信息通信技术与政策 , 2019 ( 10 ): 37 - 42 .
MA Z C . The cyber security challenge in the quantum era and its countermeasures [J ] . Information and Communications Technology and Policy , 2019 ( 10 ): 37 - 42 .
HASAN K F , SIMPSON L , ALI REZAZADEH BAEE M , et al . A framework for migrating to post-quantum cryptography: security dependency analysis and case studies [J ] . IEEE Access , 2024 , 12 : 23427 - 23450 .
RAND Corporation . Securing communications in the quantum computing age [R ] . 2020 .
BSI . Securing tomorrow, today: transitioning to post-quantum cryptography [R ] . 2024 .
NIST . FIPS 203 module-lattice-based key-encapsulation mechanism standard [S ] . 2024 .
NIST . FIPS 204 module-lattice-based digital signature standard [S ] . 2024 .
NIST . FIPS 205 stateless hash-based digital signature standard [S ] . 2024 .
NSA . Commercial national security algorithm suite 2.0 [R ] . 2022 .
MACE N , KHANNA R . H .R. 7535 : Quantum Computing Cybersecurity Preparedness Act[EB ] . 2022 .
NIST . Migration to post-quantum cryptography [EB ] . 2025 .
ETSI . Quantum-safe cryptography (QSC) [EB ] . 2025 .
中国密码学会 . 关于全国密码算法设计竞赛算法评选结果的公示 [EB ] . 2020 .
China Cryptography Society . Public notice on the results of the National Cryptographic Algorithm Design Competition algorithm evaluation [EB ] . 2020 .
孙思维 , 刘田雨 , 关志 , 等 . SPHINCS + -SM3: 基于SM3的无状态数字签名算法 [J ] . 密码学报 , 2023 , 10 ( 6 ): 1266 - 1278 .
SUN S W , LIU T Y , GUAN Z , et al . SPHINCS + -SM3: SM3-based stateless digital signatu re scheme [J ] . Journal of Cryptologic Research , 2023 , 10 ( 6 ): 1266 - 1278 .
LIANG Z C , FANG B Y , ZHENG J Y , et al . Compact and efficient KEMs over NTRU lattices [J ] . Computer Standards & Interfaces , 2024 , 89 : 103828 .
密码行业标准化技术委员会 . 2023年度密码行业标准制修订任务(商用密码领域) [EB ] . 2023 .
Cryptography Standardization Technical Committee (CSTC) . 2023 annual encryption industry standard formulation and revision tasks (commercial encryption field) [EB ] . 2023 .
CHATTOPADHYAY A , BHASIN S , GÜNEYSU T , et al . Quantum-safe Internet of Things [J ] . IEEE Design & Test , 2024 , 41 ( 5 ): 36 - 45 .
FERNÁNDEZ-CARAMÉS T M . From pre-quantum to post-quantum IoT security: a survey on quantum-resistant cryptosystems for the Internet of Things [J ] . IEEE Internet of Things Journal , 2020 , 7 ( 7 ): 6457 - 6480 .
GSMA . Post-quantum telco-network impact assessment whitepaper (Version1.0) [R ] . 2023 .
3GPP TS 33.501. Security architecture and procedures for 5G system V18.6.0 (Release 18) [S ] . 2024 .
BUDIYANTO S , GUNAWAN D . Comparative analysis of VPN protocols at layer 2 focusing on voice over Internet protocol [J ] . IEEE Access , 2023 , 11 : 60853 - 60865 .
IETF . Draft-IETF-TLS-Hybrid-design-09: hybrid key exchange in TLS 1.3 [S ] . 2023 .
IETF . RFC 9370: multiple key exchanges in the Internet key exchange protocol version 2 (IKEv2) [S ] . 2023 .
IETF . Draft-IETF-Lamps-Kyber-certificates-06: Internet X.509 public key infrastructure-algorithm identifiers for the module-lattice-based key-encapsulation mechanism (ML-KEM) [S ] . 2024 .
0
浏览量
0
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构
京公网安备11010802024621