<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Advanced Data Security and Privacy Ensuring Methods in 5G Era</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Maksim Iavich</string-name>
          <email>miavich@cu.edu.ge</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dinara Ospanova</string-name>
          <email>ospanova@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ketevan Grdzelidze</string-name>
          <email>grdzelidze@gmail.com</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rashit Brzhanov</string-name>
          <email>brzhanov@mail.ru</email>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yuliia Polishchuk</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Caucasus University</institution>
          ,
          <addr-line>1 P. Saakadze str., Tbilisi, 0102</addr-line>
          ,
          <country country="GE">Georgia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Kazakh Humanitarian Juridical Innovative University</institution>
          ,
          <addr-line>11 Mengilik str., Semey, 070000</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>1 Liubomyr Huzar ave., Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Scientific Cyber Security Association</institution>
          ,
          <addr-line>26 Otar Lortkipanidze str., Tbilisi, 0114</addr-line>
          ,
          <country country="GE">Georgia</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Yessenov University</institution>
          ,
          <addr-line>32 Microdistrict, Aktau, 130000</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
      </contrib-group>
      <fpage>160</fpage>
      <lpage>169</lpage>
      <abstract>
        <p>The announcement about introduction and launch of 5G internet has sparked great discussion and turmoil all over the world not only, among scientists, but among general population as well. With the digitalization of the network functions and implementation thereof within the virtual machines, the new security threats are posed to the users, as well as other parties involved. In addition, the further development of quantum math and introduction of quantum computers, it is clear, the currently safe algorithms will become easily breakable in the nearest future. The presented paper analyzes the cryptographic algorithms of the 5G networks and outlines possible attacks thereof. It is offered the idea of converting the mentioned algorithms to 5G epoch for data security and privacy ensuring.</p>
      </abstract>
      <kwd-group>
        <kwd>1 5G</kwd>
        <kwd>Cryptography</kwd>
        <kwd>cyber security</kwd>
        <kwd>cryptography</kwd>
        <kwd>post-quantum cryptography</kwd>
        <kwd>quantum cryptography</kwd>
        <kwd>RSA</kwd>
        <kwd>Diffie-Hellmann</kwd>
        <kwd>safety</kwd>
        <kwd>attack</kwd>
        <kwd>cyberattack</kwd>
        <kwd>algorithm</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The announcement about introduction and launch of 5G internet has sparked great discussion and
turmoil all over the world not only, among scientists, but among general population as well. Aside the
stereotypical widespread fears with regard to 5G, one of the main concerns within the scientific society
remains the security of the internet in 5G era and consequent integrity and authenticity of the data
transferred throughout.</p>
      <p>
        The present paper discusses major security concerns with regard to the 5G systems, consequent
possible solutions and issues of applicability and availability thereof. Contrary to its previous systems,
5G has moved most of the traffic to cloud architectures and „network functions are no longer provided
by dedicated hardware devices or components, but are implemented in software and run inside virtual
machines [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Consequently, with the rise of IoT (Fig. 1) and more digitalization of the world, the
security issues can arise at any end of the processes, included but not limited to: vendors, users, service
providers, merchandizers, etc. The present paper will attempt to discuss the challenges in
communication between the users and the integrity of transferred data within the network.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Virtualization of the Processes</title>
      <p>
        In August, 2018, the 3rd Generation Partnership Program (3GPP) has released information about
security within 5G [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. In the aforesaid documentation various security enhancements were outlined,
compared to 4G. Considering, that 3GPP itself is a platform based on cooperation, the relevant working
groups were involved in development of requirements and standards for 5G network [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. In the initial
release, the improvement of security features, protocols and algorithms were provided. While
implementing and adopting 5G network over the world, the importance of quantum computers and
quantum cryptography, as well as, postquantum cryptography has become more evident.
      </p>
      <p>As stated above, within the 5G environment, most of the communication between users, service
providers and other involved parties, have mainly been moved to virtual environment and,
consequently, the importance and role of hardware has decreased. This does not mean, that hardware
has been removed from the processes overall, merely that the main computing is carried out via software
and/or within virtual machines. The update of the hardware and security issues thereof, has proven as a
challenge up until now for service providers, as well as for vendors themselves. Consequently, despite
the fact, that the security patches are frequently released and the users are informed of corresponding
threats, the update of hardware and the network connected thereof has always been difficult due to its’
high cost. In this new era of internet and cellular communication, the so-called virtualization of the
processes will vastly reduce the cost of updates and therefore, will provide more secure environment
for communication.</p>
      <p>At the same time, there is a lot of skepticism related to this matter. The software, as well as virtual
machines, are not immune to faults and failure. The more the technologies and corresponding security
features are developed, the more sophisticated the hackers become. Therefore, despite the fact, that
virtualized environment is able to disseminate the information about security related shortcomings as
soon as they become available, the update and finding of appropriate solution takes time and the level
of threat remain high.</p>
      <p>
        Yet it is important to note, that the virtualization of the network functions poses wide scale of
challenges and the configuration of the systems, need to be carried out with great attention. Security
related functions related to Software Defined Networking include, but of course are not limited to:
traffic analysis modules, firewalls, intrusion detection and prevention systems, Deep Packet Inspection
systems, programmable and relocatable network probes for detection of modern sophisticated
intrusions [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. With this regard, properly configured and secure encryption of authorization, as well as
further encryption of processes plays a vital role. Each part of the network, each function, each slice
has to be protected with the level of security according to the sensitivity of the data it entails. With
sophistication of cybersecurity protocols and measures, the virtualization of processes also requires
higher speed for mobile networks and the algorithms, shall be able to run fast in software, otherwise
RAN (Radio Access Network) can’t happen and service providers would lose the benefits of using
commercial of the shelf hardware in the cloud platform [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>It is noteworthy, that today’s digital vendors and communications market is very diverse. Despite
the sophisticated security features in 5G network, the threat posed by dishonest or malicious
manufacturers/vendors, remain a great threat. Especially considering that they mostly produce relatively
cheap products and are able to cover larger portion of market. But this is not the main issue covered by
the present paper, thus we will not discuss the matter any further.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Slicing of Network</title>
      <p>
        Slicing of network was first introduced within 4G, but the new generation provides more
sophisticated and highly developed features and role of slicing. In the processes, where the main part
of communication processes is virtualized and software based, the division of the processes, both
physical and logical, can play great role in ensuring the security and safety of users and transmitted
data. With this in mind, within 5G network architecture, the division is also made between control plane
and user plane. Running the slices of the network separately enables more advanced security of each
slice, avoids overlap and/or leakage of information from one part to another. The division of the control
plane and user plane, together with virtualization of the processes, enables to the parties involved to
increase the data usage, change the storage, update processes on one end, without affecting the other. It
also offers various degrees of security features, according to the slice the specific communication is
being implemented [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Authentication in 5G</title>
      <p>As stated above, as well as its’seen in Fig. 2, the 5G network includes various types of devices, users,
service provides in its’ communication processes. The protocol and level of encryption varies according
to the type of communication, slice and device itself. The processes are also divided for primary and
secondary authentication.</p>
      <p>
        In 5G Phase 1 there are two mandatory authentication options: 5G Authentication and Key
Agreement (5G-AKA) and Extensible Authentication Protocol (EAP)-AKA', i.e. EAP-AKA'.
Optionally, other EAP based authentication mechanisms are also allowed in 5G - for specific cases such
as private networks [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        In the Release 17 of 3GPP the issue of authentication for users, as well as for other parties involved,
and possible types of attacks was addressed and corresponding recommendations were provided for
[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. The network communication can be attacked at various stages, including linkability attack, DDos
attack, Man-in-the-middle attacks, also an attack during Device-To-Device (D2D) communication and
so on.
      </p>
      <p>In the latest (as of March 18, 2021) technical report published within Release 17 by 3GPP, it was
outlined, that it is possible for attackers to intercept the communication at the stage of Authentication
and Key Agreement. The attack mainly depends on the generation of International Mobile Subscriber
Identifier (IMSI) and Subscription Permanent Identifier (SUPI).</p>
      <p>
        The attacker is able to pose as a station resulting in the identity request. This on its’ part will require
the user to send the identity response, which can enable the attacker to change the location of the station,
modify the registration request and forwarding the modified request to the network. This type of attack
can be used solely for the purpose of attacking one specific user or types of users, but its’ goal can be
to direct the traffic to certain location. The attacker will also be able to gather large number of users
through this, giving him/her the ability to carry out planned DDos attack on the slice, where the users
are communicating [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. The proper implementation of authentication protocol and encryption of the
primary authentication can play a great role in avoiding the attack and protection of the communication.
      </p>
      <p>Service-based architecture (SBA) has been proposed for the 5G core network. Accordingly, new
entities and new service requests have also been defined in 5G. Some of the new entities relevant to 5G
authentication are listed below.</p>
      <p> The Security Anchor Function (SEAF) is in a serving network and is a “middleman” during
the authentication process between a UE and its home network. It can reject an
authentication from the UE, but it relies on the UE’s home network to accept the
authentication.
 The Authentication Server Function (AUSF) is in a home network and performs
authentication with a UE. It makes the decision on UE authentication, but it relies on
backend service for computing the authentication data and keying materials when 5G-AKA
or EAP-AKA’ is used.</p>
      <p>Unified data management (UDM) is an entity that hosts functions related to data
management, such as the Authentication Credential Repository and Processing Function
(ARPF), which selects an authentication method based on subscriber identity and configured
policy and computes the authentication data and keying materials for the AUSF if needed.
The Subscription Identifier De-concealing Function (SIDF) decrypts a Subscription
Concealed Identifier (SUCI) to obtain its long-term identity, namely the Subscription
Permanent Identifier (SUPI), e.g., the IMSI. In 5G, a subscriber long-term identity is always
transmitted over the radio interfaces in an encrypted form. More specifically, a public
keybased encryption is used to protect the SUPI. Therefore, only the SIDF has access to the
private key associated with a public key distributed to UEs for encrypting their SUPIs.</p>
      <p>A unified authentication framework has been defined to make 5G authentication both open (e.g.,
with the support of EAP) and access-network agnostic (e.g., supporting both 3GGP access networks
and non-3GPP access networks such as Wi-Fi and cable networks) (see Fig. 3).</p>
      <p>When EAP (Extensible Authentication Protocol) is used (e.g., EAP-AKA’ or EAP-TLS), EAP
authentication is between the UE (an EAP peer) and the AUSF (an EAP server) through the SEAF
(functioning as an EAP pass-through authenticator) [23].</p>
      <p>When authentication is over untrusted, non-3GPP access networks, a new entity, namely the
Non3GPP Interworking Function (N3IWF), is required to function as a VPN server to allow the UE to
access the 5G core over untrusted, non-3GPP networks through IPsec (IP Security) tunnels.</p>
      <p>Several security contexts can be established with one authentication execution, allowing the UE to
move from a 3GPP access network to a non-3GPP network without having to be reauthenticated.</p>
      <p>5G defines new authentication-related services. For example, the AUSF provides authentication
service through Nausf_UEAuthentication, and UDM provides its authentication service through
Nudm_UEAuthentication. For simplicity, generic messages such as Authentication Request and
Authentication Response are used in Fig. 4 without referring to the actual authentication service
names. Further, an authentication vector includes a set of data, but only a subset is shown in Fig. 4.</p>
      <p>In 5G-AKA (Fig. 4), the SEAF may start the authentication procedure after receiving any signaling
message from the UE. Note that the UE should send the SEAF a temporary identifier (a 5G-GUTI) or
an encrypted permanent identifier (a SUCI) if a 5G-GUTI has not been allocated by the serving network
for the UE. The SUCI is the encrypted form of the SUPI using the public key of the home network.
Thus, a UE’s permanent identifier, e.g., the IMSI, is never sent in clear text over the radio networks in
5G. This feature is considered a major security improvement over prior generations such as 4G.</p>
      <p>The SEAF starts authentication by sending an authentication request to the AUSF, which first
verifies that the serving network requesting the authentication service is authorized. Upon success, the
AUSF sends an authentication request to UDM/ARPF. If a SUCI is provided by the AUSF, then the
SIDF will be invoked to decrypt the SUCI to obtain the SUPI, which is further used to select the
authentication method configured for the subscriber. In this case, it is 5G-AKA, which is selected and
to be executed.</p>
      <p>UDM/ARPF starts 5G-AKA by sending the authentication response to the AUSF with an
authentication vector consisting of an AUTH token, an XRES token, the key KAUSF, and the SUPI if
applicable (e.g., when a SUCI is included in the corresponding authentication request), among other
data [23,24].</p>
      <p>5G-AKA differs from 4G EPS-AKA in primarily the following areas:
 Entities involved in the authentication are different because of the new service-based
architecture in 5G. Particularly, the SIDF is new; it does not exist in 4G.
 The UE always uses the public key of the home network to encrypt the UE permanent
identity before it is sent to a 5G network. In 4G, the UE always sends its permanent identifier
in clear text to the network, allowing it to be stolen by either a malicious network (e.g., a
faked base station) or a passive adversary over the radio links (if communication over radio
links is not protected).
 The home network (e.g., the AUSF) makes the final decision on UE authentication in 5G.</p>
      <p>In addition, results of UE authentication are also sent to UDM to be logged. In 4G, a home
network is consulted during authentication only to generate authentication vectors; it does
not make decisions on the authentication results.
 Key hierarchy is longer in 5G than in 4G because 5G introduces two intermediate keys,</p>
      <p>KAUSF and KAMF. Note: KSEAF is the anchor key in 5G, equivalent to KASME in 4G.
4G and 5G authentication comparison is presented on Fig. 5.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Cryptography in 5G</title>
      <p>5G mainly depends on the already existing cryptographic algorithms, some of which are at this point
considered secure and have not yet been hacked. Such algorithms include: RSA, EDH and SNOW-V,
proposed by Ericsson. Unlike 4G, 5G uses 256-bit encryption, which substantially increases the security
of the algorithms already in use.</p>
      <p>Ephemeral Diffie-Hellman cannot be used for primary authentication, because the key changes
regularly. Yet, within the already established and authenticated parties, it can provide strong protection
from attacks. Static Diffie-Hellman, if implemented correctly, still remains secure. EDH, providing the
possibility of forward secrecy, is considered as the strongest key encryption within Diffie-Hellman
algorithms. EDH differs from static Diffie-Hellman through its’ regular update of encryption keys. The
regular change of the keys means, that each part of the communication is encrypted differently. In this
regard it is essential, that in case throughout the time one set of keys is hacked or part of the
communication is decrypted, the forward secrecy ensures that the parts encrypted with different keys
remain secure. Consequently, the hacking of previous communication does not affect the security of
the later one and does not allow the attacker to gain any further information about the parties involved.</p>
      <p>
        Ephemeral Diffie-Hellman – This is considered the most secure implementation because it provides
perfect forward secrecy. It is generally combined with an algorithm such as DSA or RSA to authenticate
one or both of the parties in the connection [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>RSA is a public key encryption algorithm, that at this point, has not yet been hacked. Since RSA
uses a public key, it is mainly used for authentication purposes. Similar to EDH, if configured correctly,
RSA remains secure and with today’s development of technology, it has not yet been hacked.
Consequently, 5G using both of the protocols, has built far more secure system for communication.</p>
      <p>While tackling the diversity of the processes, with corresponding different levels of security, at the
same time addressing the matter of the speed, the adoption of new version of already existing SNOW
3G algorithm was proposed. SNOW-V reuses the best design principles of SNOW 3G, but is extremely
well suited for software implementation using vectorized instructions and also leverages hardware
accelerated CPU instructions for AES Encryption available in all modern CPUs [13]. The speed as well
as the security of the SNOW-V has become the reason, for it to gain further acceptance. Further research
has proven, that SNOW-V outperforms most of known algorithms in speed (See Fig. 6), but it also is
immune to most of the known hacker attacks as of today. As a result of this information, SNOW-V will
be responsible for ensuring speed and integrity of the communication.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Quantum and Post-Quantum Cryptography</title>
      <p>Several times already we have mentioned, that the algorithms mainly used within 5G are immune to
currently known types of attacks and have not yet been broken. This does not mean, that the status quo
will remain the same.</p>
      <p>The high level of sophistication of the modern cybersecurity does not ensure the comprehensive
and life-long safety from hackers, as the more enhanced the security features are, the more developed
the hackings become. Even in case the hackers will not be able to decrypt the algorithms used in 5G or
any other system, the rise of quantum computers poses a great threat to cybersecurity systems all over
the world.</p>
      <p>It is predicted, that the quantum computers will be able to decrypt RSA and EDH by 2030 [14, 15].
Yet, the quantum systems are highly costly products and therefore, are not accessible to anyone who
simply wishes to acquire it. Yet, with the development and advancement of technology, like anything
else, the prices will drop down in the coming years. Therefore, they will become more affordable. This
has raised serious concerns with regard to network and cyber security overall. In certain parts of the
world the attempts of developing quantum computing is actively carried out [16]. This on its’ part has
caused the scientists and researchers to work on post-quantum cryptography, which shall ensure the
security in the new era, dominated by quantum computers. For example, Verizon, as one of the service
providers, has launched its’ trials with regards to quantum key distribution (QKD) [17, 18]. Among
quantum technologies (Fig. 7) there are various security directions [25-27].</p>
      <p>Despite the early stages of trials and testing of the new technologies, it is clear, that the level of
security provided by quantum cryptography and mathematics, as a basis thereof, is unparalleled in
todays’ world [18-20]. We offer to integrate lattice based cryptography instead of existing asymmetric
cryptography schemes. We offer to use NTRU as it was selected as a finalist in the NIST PQC
standardization competition [21-22, 28-30].
7. Conclusion</p>
      <p>5G network offers the wide range of opportunities, possibilities and higher speed of communication,
at the same time providing higher level of security and safety to its’ users. The slicing and visualization
of the network allow for service providers to localize the attack, to swiftly solve the problems. At the
same time, the rise of quantum computers and development of quantum cryptography, while providing
large amount of security, also poses great threats in long term. Unless the whole cybersecurity system
will shift towards post-quantum cryptography, the threat posed not only to the data transferred through
the network, but by the level of control that can be gained over the devices, can prove to be fatal. As
discussed above, the cryptographic algorithms, that are considered safe as of today, will be easily
decryptable through quantum computers within the upcoming years. Considering the speed of
development of smart technologies, AI, machine learning systems, increasing level of distribution of
IoT and the amount of dependability on technology by humans, it is impossible to imagine the amount
of damage that can be caused by crumbling security system.</p>
      <p>While deploying the 5G network, the configuration and proper usage of the cybersecurity protocols
will play a vital role. At the same time, the virtualization and division of the network will allow for
creation of malware, attack and/or malfunction detection software, which can play great role in
securitization of the network. At the same time, the quantum cryptography will remain as a major
solution for ensuring the greater security and its’ development shall be the main topic on the agenda of
security-driven entities. As 5G security scheme includes asymmetrical cryptography schemes and by
means of this, it will be vulnerable to the attacks of quantum computers, it is offered to integrate
latticebased cryptography.</p>
    </sec>
    <sec id="sec-7">
      <title>8. References</title>
      <p>[13] A. Bessalov, et al., “Analysis of 2-isogeny properties of generalized form Edwards curves”,
in: Proceedings of the Workshop on Cybersecurity Providing in Information and
Telecommunication Systems, July 7, 2020, vol. 2746, pp. 1-13.
[14] A. Bessalov, V. Sokolov, P. Skladannyi, “Modeling of 3- and 5-isogenies of supersingular
Edwards curves”, in: Proceedings of the 2nd International Workshop on Modern Machine
Learning Technologies and Data Science, June 2–3, 2020, no. I, vol. 2631, pp. 30–39.
[15] T.C Clancy, R. W. McGwier, and L. Chen, “Post-Quantum Cryptography and 5G Security.”
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile
Networks, 2019. https://doi.org/10.1145/3317549.3324882.
[16] “Quantum-Safe Security in a 5G World.” QuantumXC. Quantumxc, July 15, 2019.</p>
      <p>https://quantumxc.com/quantum-safe-security-in-a-5g-world/.
[17] S. Gnatyuk, T. Okhrimenko, M. Iavich and R. Berdibayev, “Intruder Control Mode
Simulation of Deterministic Quantum Cryptography Protocol for Depolarized Quantum
Channel”, Proc. of 2019 Intern. Scien.-Pract. Conf. on the Problems of Infocommunications.</p>
      <p>Science and Technology, pp. 825-828, October 08-11, 2019.
[18] T.C Clancy, R. W. McGwier, and L. Chen, “Post-Quantum Cryptography and 5G Security.”
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile
Networks, 2019. https://doi.org/10.1145/3317549.3324882.
[19] J.L Hardcastle, “Verizon Boosts 5G Security, Deploys Quantum Key Distribution”
Sdxcentral. September 3, 2020.
https://www.sdxcentral.com/articles/news/verizon-boosts5g-security-deploys-quantum-key-distribution/2020/09/.
[20] M. Iavich, A. Gagnidze, G. Iashvili, S. Gnatyuk, V. Vialkova: Lattice based Merkle. CEUR</p>
      <p>Workshop Proceedings, vol. 2470, pp. 13–16 (2019)
[21] A.G. Gagnidze, M.P. Iavich, G.U. Iashvili: Analysis of post quantum cryptography use in
practice. Bull. Georgian Natl. Acad. Sci. 11(2), 29–36 (2017)
[22] Hermans, F. Vercauteren, B. Preneel (2010) Speed Records for NTRU. In: Pieprzyk J. (eds)
Topics in Cryptology - CT-RSA 2010. CT-RSA 2010. Lecture Notes in Computer Science,
vol 5985. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11925-5_6
[23] Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi, and Jean-Pierre Seifert,
“Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication
Systems,” Proceedings of the Internet Society Symposium on Network and Distributed
System Security (NDSS) (Feburary 2016).
[24] David Basin, Jannik Dreier, Lucca Hirschi, Saša Radomirovic, Ralf Sasse, and Vincent
Stettler, “A Formal Analysis of 5G Authentication,” Proceedings of the 2018 ACM SIGSAC
Conference on Computer and Communications Security (CCS '18) (October 2018).
[25] Korchenko O., Vasiliu Y., Gnatyuk S. “Modern quantum technologies of information security
against cyber-terrorist attacks”, Aviation, Vol. 14, №3, рр. 58-69, 2010.
[26] Z. Hu, S. Gnatyuk, T. Okhrimenko, V. Kinzeryavyy, M. Iavich, Kh. Yubuzova, “High-Speed
Privaсy Amplification Method for Deterministic Quantum Cryptography Protocols Using
Pairs of Entangled Qutrits”, CEUR Workshop Proceedings, Vol. 2393, pp. 810-821, 2019.
[27] Gnatyuk S., Okhrimenko T., Azarenko O., Fesenko A., Berdibayev R. “Experimental Study
of Secure PRNG for Q-trits Quantum Cryptography Protocols”, Proceedings of the 2020 IEEE
11th International Conference on Dependable Systems, Services and Technologies
(DESSERT 2020), Kyiv, Ukraine, May 14, 2020, pp. 183-188.
[28] Labadze G., Iavich M., Iashvili G., Gagnidze A., Gnatyuk S. “Post-quantum digital signature
scheme with BB84 protocol”, CEUR Workshop Proceedings, Vol. 2915, pp. 35-44, 2021.
[29] Iavich M., Kuchukhidze T., Gnatyuk S., Fesenko A. “Novel certification method for quantum
random number generators”, International Journal of Computer Network and Information
Security, Volume 13, Issue 3, pp. 28-38, 2021.
[30] Iavich M., Gnatyuk S., Arakelian A., Iashvili G., Polishchuk Y., Prysiazhnyy D., “Improved
Post-quantum Merkle Algorithm Based on Threads”, Advances in Intelligent Systems and
Computing, Vol. 1247 AISC, pp. 454-464, 2021.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>G.</given-names>
            <surname>Bianchi</surname>
          </string-name>
          , “5G Security.
          <article-title>” 5G Italy White Book: from Research to Market</article-title>
          ,
          <year>November 2018</year>
          , https://www.5gitaly.eu/2018/wp-content/uploads/2019/04/5G-
          <string-name>
            <surname>Italy-</surname>
          </string-name>
          White-eBook.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.R.</given-names>
            <surname>Prasad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Soveri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Escott</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Zugenmaier</surname>
          </string-name>
          ,
          <source>“5GPP 5G Security.” 3GPP 5G Security. 3GPP, August</source>
          <volume>6</volume>
          ,
          <year>2018</year>
          . https://www.3gpp.org/news-events/1975-sec_5g
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <source>[3] About 3GPP Home, 3GPP, accessed April 15</source>
          ,
          <year>2021</year>
          , https://www.3gpp.org/about3gpp/about-3gpp.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Bessalov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sokolov</surname>
            <given-names>V. Skladannyi P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhyltsov</surname>
            <given-names>O</given-names>
          </string-name>
          .
          <article-title>Computing of odd degree isogenies on supersingular twisted Edwards curves</article-title>
          .
          <source>Proceedings of the Workshop on Cybersecurity Providing in Information and Telecommunication Systems, Jan. 28</source>
          ,
          <year>2021</year>
          vol.
          <volume>2923</volume>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>P.</given-names>
            <surname>Ekdahl</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Maximov</surname>
          </string-name>
          , “
          <source>Encryption in Virtualized 5G Environments.” Ericsson. June 2</source>
          ,
          <year>2020</year>
          . https://www.ericsson.com/en/blog/2020/6/encryption-in-virtualized
          <string-name>
            <surname>-</surname>
          </string-name>
          5g-environments.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <source>[6] 5G Americas. “Security Considerations for the 5G Era</source>
          <year>2020</year>
          .” 5G Americas,
          <year>July 2020</year>
          . https://doi.org/[Online]. p.
          <fpage>8</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>K.</given-names>
            <surname>Samdanis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Costa-Perez</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V.</given-names>
            <surname>Sciancalepore</surname>
          </string-name>
          , “
          <article-title>From Network Sharing to MultiTenancy: The 5G Network Slice Broker</article-title>
          .
          <source>” IEEE Communications Magazine</source>
          <volume>54</volume>
          , no.
          <issue>7</issue>
          (
          <year>2016</year>
          ):
          <fpage>32</fpage>
          -
          <lpage>39</lpage>
          .p.
          <volume>38</volume>
          https://doi.org/10.1109/
          <string-name>
            <surname>mcom</surname>
          </string-name>
          .
          <year>2016</year>
          .
          <volume>7514161</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Smirnov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Kovalchuk</surname>
          </string-name>
          et al, “
          <article-title>Formation of Pseudorandom Sequences with Special Correlation Properties</article-title>
          ,”
          <source>2019 3rd International Conference on Advanced Information and Communications Technologies (AICT)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>395</fpage>
          -
          <lpage>399</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.R.</given-names>
            <surname>Prasad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Soveri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Escott</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Zugenmaier</surname>
          </string-name>
          ,
          <source>“5GPP 5G Security.” 3GPP 5G Security. 3GPP, August</source>
          <volume>6</volume>
          ,
          <year>2018</year>
          . https://www.3gpp.org/news-events/1975-sec_5g.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <source>[10] “3GPP TR 33.846, V0.11.0 Technichal Report.” TDoc S3-211287. 3GPP, March</source>
          <volume>18</volume>
          ,
          <year>2021</year>
          . https://portal.3gpp.org/ngppapp/CreateTdoc.aspx?mode=view&amp;contributionUid=
          <fpage>S3</fpage>
          -
          <lpage>211287</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11] “
          <article-title>Security architecture and procedures for 5G System”</article-title>
          ,
          <source>3GPP TS 33</source>
          .501,
          <issue>V17</issue>
          .1.0, (
          <issue>3GPP</issue>
          , April 6,
          <year>2021</year>
          ), https://www.3gpp.org/ftp/Specs/archive/33_series/33.501/p.
          <fpage>10</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Lake</surname>
          </string-name>
          , “
          <article-title>What Is the Diffie-Hellman Key Exchange</article-title>
          and How Does It Work?” Comparitech, March
          <volume>23</volume>
          ,
          <year>2021</year>
          . https://www.comparitech.com/blog/information-security/diffie-hellmankey-exchange/.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>