Connects decision-makers and solutions creators to what's next in quantum computing

MWC 2023: Telcos Prepare for Quantum Cybersecurity ThreatsMWC 2023: Telcos Prepare for Quantum Cybersecurity Threats

IBM, Vodafone, GSMA members set ways for telcos to secure data, infrastructure

Berenice Baker, Editor, Enter Quantum, co-editor AI Business

March 1, 2023

1 Min Read
Members of GSMA on stage drinking sparkling wine at the opening of MWC 2023
Members of GSMA celebrate the opening of MWC 2023GSMA/MWC

The telecoms industry association GSMA has published a report detailing the quantum security threats facing the telecommunications industry and setting out solutions to prepare for them.

Released to coincide with Mobile World Congress (MWC) 2023, the Post Quantum Telco Network Impact Assessment was written in collaboration with GSMA members IBM, Vodafone and others.

The report includes:

  • A telco-specific assessment of the business risk of quantum cyber threats, including four of the highest impact attack types: store now, decrypt later; code signing and digital signatures; rewriting history; and key management attacks.

  • Discussion of standardization for hardware and software changes, such as SIM cards, public key infrastructure, digital certificates and CPE devices.

  • Specific approaches to quantum-safe algorithms and risk assessment frameworks, including code-based, lattice-based, hash-based, multivariate-based, and hybrid approaches.

  • Timelines of several government plans that have been launched to implement quantum-safe encryption (Australia, Canada, China, France, Germany, Japan, New Zealand, Singapore, South Korea, the U.K. and the U.S.).

  • Examples of quantum-safe applications in several telco domains, including devices, 5G networks, SIMs, operating systems, enterprise resource planning, infrastructure and the cloud.

Related:Quantum at Mobile World Congress 2023

According to the report, quantum computers will be sufficiently powerful to threaten current cryptographic approaches by 2032. The industry and operators need to prepare now because threats such as “harvest now, decrypt later” mean threat actors are stealing and storing encrypted data now to decrypt when they can access sufficiently capable quantum computers.

The report says operators should prepare by undertaking the following steps:

  • Establish a cryptographic inventory: understand where cryptographic algorithms are used in systems or vendor products.

  • Plan a cryptography risk assessment.

  • Develop expertise in Post-Quantum Cryptography and security.

  • Support standardization and open source.

  • Support related research.

  • Engage with customers and vendors for requirements.

  • Develop a Post-Quantum Cryptography transition plan.

About the Author

Berenice Baker

Editor, Enter Quantum, co-editor AI Business, Informa TechTarget

Berenice is the editor of Enter Quantum and co-editor of AI Business. She has over 20 years of experience as a technology journalist, having previously worked at The Engineer and Global Defence Technology.

Before that, she worked as an IT consultant, fuelling her passion for technology and innovation. She graduated with one of the country's first-ever IT degrees so long ago it coincided with Tim Berners-Lee inventing the World Wide Web.

Berenice lives in north London with her cat Huxley. In her spare time, she enjoys going to music gigs, museums and galleries, dabbling in art and playing guitar (badly).

Sign Up for the Newsletter
The most up-to-date news and insights into the latest emerging technologies ... delivered right to your inbox!

You May Also Like