=Paper=
{{Paper
|id=Vol-3187/paper15
|storemode=property
|title=Advanced Data Security and Privacy Ensuring Methods in 5G Era
|pdfUrl=https://ceur-ws.org/Vol-3187/paper15.pdf
|volume=Vol-3187
|authors=Maksim Iavich,Dinara Ospanova,Ketevan Grdzelidze,Rashit Brzhanov,Yuliia Polishchuk
|dblpUrl=https://dblp.org/rec/conf/cpits/IavichOGBP21
}}
==Advanced Data Security and Privacy Ensuring Methods in 5G Era==
Advanced Data Security and Privacy Ensuring Methods in 5G Era Maksim Iavich1, Dinara Ospanova2, Ketevan Grdzelidze3, Rashit Brzhanov4, and Yuliia Polishchuk5 1 Caucasus University, 1 P. Saakadze str., Tbilisi, 0102, Georgia 2 Kazakh Humanitarian Juridical Innovative University, 11 Mengilik str., Semey, 070000, Kazakhstan 3 Scientific Cyber Security Association, 26 Otar Lortkipanidze str., Tbilisi, 0114, Georgia 4 Yessenov University, 32 Microdistrict, Aktau, 130000, Kazakhstan 5 National Aviation University, 1 Liubomyr Huzar ave., Kyiv, 03058, Ukraine Abstract The announcement about introduction and launch of 5G internet has sparked great discussion and turmoil all over the world not only, among scientists, but among general population as well. With the digitalization of the network functions and implementation thereof within the virtual machines, the new security threats are posed to the users, as well as other parties involved. In addition, the further development of quantum math and introduction of quantum computers, it is clear, the currently safe algorithms will become easily breakable in the nearest future. The presented paper analyzes the cryptographic algorithms of the 5G networks and outlines possible attacks thereof. It is offered the idea of converting the mentioned algorithms to 5G epoch for data security and privacy ensuring. Keywords 1 5G, Cryptography, cyber security, cryptography, post-quantum cryptography, quantum cryptography, RSA, Diffie-Hellmann, safety, attack, cyberattack, algorithm 1. Introduction The announcement about introduction and launch of 5G internet has sparked great discussion and turmoil all over the world not only, among scientists, but among general population as well. Aside the stereotypical widespread fears with regard to 5G, one of the main concerns within the scientific society remains the security of the internet in 5G era and consequent integrity and authenticity of the data transferred throughout. The present paper discusses major security concerns with regard to the 5G systems, consequent possible solutions and issues of applicability and availability thereof. Contrary to its previous systems, 5G has moved most of the traffic to cloud architectures and „network functions are no longer provided by dedicated hardware devices or components, but are implemented in software and run inside virtual machines [1]. Consequently, with the rise of IoT (Fig. 1) and more digitalization of the world, the security issues can arise at any end of the processes, included but not limited to: vendors, users, service providers, merchandizers, etc. The present paper will attempt to discuss the challenges in communication between the users and the integrity of transferred data within the network. 2. Virtualization of the Processes In August, 2018, the 3rd Generation Partnership Program (3GPP) has released information about security within 5G [2]. In the aforesaid documentation various security enhancements were outlined, compared to 4G. Considering, that 3GPP itself is a platform based on cooperation, the relevant working groups were involved in development of requirements and standards for 5G network [3]. In the initial CPITS-II-2021: Cybersecurity Providing in Information and Telecommunication Systems, October 26, 2021, Kyiv, Ukraine EMAIL: miavich@cu.edu.ge (M. Iavich); ospanova@gmail.com (D. Ospanova); grdzelidze@gmail.com (K. Grdzelidze); brzhanov@mail.ru (R. Brzhanov); polischuk.yu.ya@gmail.com (Y. Polishchuk) ORCID: 0000-0002-3109-7971 (M. Iavich); 0000-0002-2206-7367 (D. Ospanova); 0000-0003-2354-8787 (K. Grdzelidze); 0000-0001-8755- 8207 (R. Brzhanov); 0000-0002-0686-2328 (Y. Polishchuk) © 2022 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings (CEUR-WS.org) 160 release, the improvement of security features, protocols and algorithms were provided. While implementing and adopting 5G network over the world, the importance of quantum computers and quantum cryptography, as well as, postquantum cryptography has become more evident. Figure 1: IoT security issues As stated above, within the 5G environment, most of the communication between users, service providers and other involved parties, have mainly been moved to virtual environment and, consequently, the importance and role of hardware has decreased. This does not mean, that hardware has been removed from the processes overall, merely that the main computing is carried out via software and/or within virtual machines. The update of the hardware and security issues thereof, has proven as a challenge up until now for service providers, as well as for vendors themselves. Consequently, despite the fact, that the security patches are frequently released and the users are informed of corresponding threats, the update of hardware and the network connected thereof has always been difficult due to its’ high cost. In this new era of internet and cellular communication, the so-called virtualization of the processes will vastly reduce the cost of updates and therefore, will provide more secure environment for communication. At the same time, there is a lot of skepticism related to this matter. The software, as well as virtual machines, are not immune to faults and failure. The more the technologies and corresponding security features are developed, the more sophisticated the hackers become. Therefore, despite the fact, that virtualized environment is able to disseminate the information about security related shortcomings as soon as they become available, the update and finding of appropriate solution takes time and the level of threat remain high. Yet it is important to note, that the virtualization of the network functions poses wide scale of challenges and the configuration of the systems, need to be carried out with great attention. Security related functions related to Software Defined Networking include, but of course are not limited to: traffic analysis modules, firewalls, intrusion detection and prevention systems, Deep Packet Inspection systems, programmable and relocatable network probes for detection of modern sophisticated intrusions [4]. With this regard, properly configured and secure encryption of authorization, as well as further encryption of processes plays a vital role. Each part of the network, each function, each slice has to be protected with the level of security according to the sensitivity of the data it entails. With sophistication of cybersecurity protocols and measures, the virtualization of processes also requires higher speed for mobile networks and the algorithms, shall be able to run fast in software, otherwise RAN (Radio Access Network) can’t happen and service providers would lose the benefits of using commercial of the shelf hardware in the cloud platform [5]. It is noteworthy, that today’s digital vendors and communications market is very diverse. Despite the sophisticated security features in 5G network, the threat posed by dishonest or malicious 161 manufacturers/vendors, remain a great threat. Especially considering that they mostly produce relatively cheap products and are able to cover larger portion of market. But this is not the main issue covered by the present paper, thus we will not discuss the matter any further. 3. Slicing of Network Slicing of network was first introduced within 4G, but the new generation provides more sophisticated and highly developed features and role of slicing. In the processes, where the main part of communication processes is virtualized and software based, the division of the processes, both physical and logical, can play great role in ensuring the security and safety of users and transmitted data. With this in mind, within 5G network architecture, the division is also made between control plane and user plane. Running the slices of the network separately enables more advanced security of each slice, avoids overlap and/or leakage of information from one part to another. The division of the control plane and user plane, together with virtualization of the processes, enables to the parties involved to increase the data usage, change the storage, update processes on one end, without affecting the other. It also offers various degrees of security features, according to the slice the specific communication is being implemented [6]. Figure 2: 5G network slices structure [7] Fig. 2 provides information about the types of communications and users, which will be sharing the slices of the network among each other and where each type of communication will take part. It is important to note, that in addition to physical and logical segregation, traffic and resource isolation are also critical. Traffic isolation can be provided by creating specific virtual lanes to serve specific traffic types that can be routed through a specific logical/physical lane pair. Resource isolation should be supported in the underlying infrastructure [8]. 162 4. Authentication in 5G As stated above, as well as its’seen in Fig. 2, the 5G network includes various types of devices, users, service provides in its’ communication processes. The protocol and level of encryption varies according to the type of communication, slice and device itself. The processes are also divided for primary and secondary authentication. In 5G Phase 1 there are two mandatory authentication options: 5G Authentication and Key Agreement (5G-AKA) and Extensible Authentication Protocol (EAP)-AKA', i.e. EAP-AKA'. Optionally, other EAP based authentication mechanisms are also allowed in 5G - for specific cases such as private networks [9]. Figure 3: 5G Authentication Framework In the Release 17 of 3GPP the issue of authentication for users, as well as for other parties involved, and possible types of attacks was addressed and corresponding recommendations were provided for [10]. The network communication can be attacked at various stages, including linkability attack, DDos attack, Man-in-the-middle attacks, also an attack during Device-To-Device (D2D) communication and so on. In the latest (as of March 18, 2021) technical report published within Release 17 by 3GPP, it was outlined, that it is possible for attackers to intercept the communication at the stage of Authentication and Key Agreement. The attack mainly depends on the generation of International Mobile Subscriber Identifier (IMSI) and Subscription Permanent Identifier (SUPI). The attacker is able to pose as a station resulting in the identity request. This on its’ part will require the user to send the identity response, which can enable the attacker to change the location of the station, modify the registration request and forwarding the modified request to the network. This type of attack can be used solely for the purpose of attacking one specific user or types of users, but its’ goal can be to direct the traffic to certain location. The attacker will also be able to gather large number of users through this, giving him/her the ability to carry out planned DDos attack on the slice, where the users are communicating [11]. The proper implementation of authentication protocol and encryption of the primary authentication can play a great role in avoiding the attack and protection of the communication. Service-based architecture (SBA) has been proposed for the 5G core network. Accordingly, new entities and new service requests have also been defined in 5G. Some of the new entities relevant to 5G authentication are listed below. The Security Anchor Function (SEAF) is in a serving network and is a “middleman” during the authentication process between a UE and its home network. It can reject an authentication from the UE, but it relies on the UE’s home network to accept the authentication. The Authentication Server Function (AUSF) is in a home network and performs authentication with a UE. It makes the decision on UE authentication, but it relies on 163 backend service for computing the authentication data and keying materials when 5G-AKA or EAP-AKA’ is used. Unified data management (UDM) is an entity that hosts functions related to data management, such as the Authentication Credential Repository and Processing Function (ARPF), which selects an authentication method based on subscriber identity and configured policy and computes the authentication data and keying materials for the AUSF if needed. The Subscription Identifier De-concealing Function (SIDF) decrypts a Subscription Concealed Identifier (SUCI) to obtain its long-term identity, namely the Subscription Permanent Identifier (SUPI), e.g., the IMSI. In 5G, a subscriber long-term identity is always transmitted over the radio interfaces in an encrypted form. More specifically, a public key- based encryption is used to protect the SUPI. Therefore, only the SIDF has access to the private key associated with a public key distributed to UEs for encrypting their SUPIs. A unified authentication framework has been defined to make 5G authentication both open (e.g., with the support of EAP) and access-network agnostic (e.g., supporting both 3GGP access networks and non-3GPP access networks such as Wi-Fi and cable networks) (see Fig. 3). When EAP (Extensible Authentication Protocol) is used (e.g., EAP-AKA’ or EAP-TLS), EAP authentication is between the UE (an EAP peer) and the AUSF (an EAP server) through the SEAF (functioning as an EAP pass-through authenticator) [23]. When authentication is over untrusted, non-3GPP access networks, a new entity, namely the Non- 3GPP Interworking Function (N3IWF), is required to function as a VPN server to allow the UE to access the 5G core over untrusted, non-3GPP networks through IPsec (IP Security) tunnels. Several security contexts can be established with one authentication execution, allowing the UE to move from a 3GPP access network to a non-3GPP network without having to be reauthenticated. Figure 4: 5G-AKA Authentication Procedure 5G defines new authentication-related services. For example, the AUSF provides authentication service through Nausf_UEAuthentication, and UDM provides its authentication service through Nudm_UEAuthentication. For simplicity, generic messages such as Authentication Request and 164 Authentication Response are used in Fig. 4 without referring to the actual authentication service names. Further, an authentication vector includes a set of data, but only a subset is shown in Fig. 4. In 5G-AKA (Fig. 4), the SEAF may start the authentication procedure after receiving any signaling message from the UE. Note that the UE should send the SEAF a temporary identifier (a 5G-GUTI) or an encrypted permanent identifier (a SUCI) if a 5G-GUTI has not been allocated by the serving network for the UE. The SUCI is the encrypted form of the SUPI using the public key of the home network. Thus, a UE’s permanent identifier, e.g., the IMSI, is never sent in clear text over the radio networks in 5G. This feature is considered a major security improvement over prior generations such as 4G. Figure 5: 4G and 5G authentication comparison The SEAF starts authentication by sending an authentication request to the AUSF, which first verifies that the serving network requesting the authentication service is authorized. Upon success, the AUSF sends an authentication request to UDM/ARPF. If a SUCI is provided by the AUSF, then the SIDF will be invoked to decrypt the SUCI to obtain the SUPI, which is further used to select the 165 authentication method configured for the subscriber. In this case, it is 5G-AKA, which is selected and to be executed. UDM/ARPF starts 5G-AKA by sending the authentication response to the AUSF with an authentication vector consisting of an AUTH token, an XRES token, the key KAUSF, and the SUPI if applicable (e.g., when a SUCI is included in the corresponding authentication request), among other data [23,24]. 5G-AKA differs from 4G EPS-AKA in primarily the following areas: Entities involved in the authentication are different because of the new service-based architecture in 5G. Particularly, the SIDF is new; it does not exist in 4G. The UE always uses the public key of the home network to encrypt the UE permanent identity before it is sent to a 5G network. In 4G, the UE always sends its permanent identifier in clear text to the network, allowing it to be stolen by either a malicious network (e.g., a faked base station) or a passive adversary over the radio links (if communication over radio links is not protected). The home network (e.g., the AUSF) makes the final decision on UE authentication in 5G. In addition, results of UE authentication are also sent to UDM to be logged. In 4G, a home network is consulted during authentication only to generate authentication vectors; it does not make decisions on the authentication results. Key hierarchy is longer in 5G than in 4G because 5G introduces two intermediate keys, KAUSF and KAMF. Note: KSEAF is the anchor key in 5G, equivalent to KASME in 4G. 4G and 5G authentication comparison is presented on Fig. 5. 5. Cryptography in 5G 5G mainly depends on the already existing cryptographic algorithms, some of which are at this point considered secure and have not yet been hacked. Such algorithms include: RSA, EDH and SNOW-V, proposed by Ericsson. Unlike 4G, 5G uses 256-bit encryption, which substantially increases the security of the algorithms already in use. Ephemeral Diffie-Hellman cannot be used for primary authentication, because the key changes regularly. Yet, within the already established and authenticated parties, it can provide strong protection from attacks. Static Diffie-Hellman, if implemented correctly, still remains secure. EDH, providing the possibility of forward secrecy, is considered as the strongest key encryption within Diffie-Hellman algorithms. EDH differs from static Diffie-Hellman through its’ regular update of encryption keys. The regular change of the keys means, that each part of the communication is encrypted differently. In this regard it is essential, that in case throughout the time one set of keys is hacked or part of the communication is decrypted, the forward secrecy ensures that the parts encrypted with different keys remain secure. Consequently, the hacking of previous communication does not affect the security of the later one and does not allow the attacker to gain any further information about the parties involved. Figure 6: Performance comparison of SNOW-V-(GCM) and best OpenSSL’s algorithms. Performance values are given in Gbps [14] 166 Ephemeral Diffie-Hellman – This is considered the most secure implementation because it provides perfect forward secrecy. It is generally combined with an algorithm such as DSA or RSA to authenticate one or both of the parties in the connection [12]. RSA is a public key encryption algorithm, that at this point, has not yet been hacked. Since RSA uses a public key, it is mainly used for authentication purposes. Similar to EDH, if configured correctly, RSA remains secure and with today’s development of technology, it has not yet been hacked. Consequently, 5G using both of the protocols, has built far more secure system for communication. While tackling the diversity of the processes, with corresponding different levels of security, at the same time addressing the matter of the speed, the adoption of new version of already existing SNOW 3G algorithm was proposed. SNOW-V reuses the best design principles of SNOW 3G, but is extremely well suited for software implementation using vectorized instructions and also leverages hardware accelerated CPU instructions for AES Encryption available in all modern CPUs [13]. The speed as well as the security of the SNOW-V has become the reason, for it to gain further acceptance. Further research has proven, that SNOW-V outperforms most of known algorithms in speed (See Fig. 6), but it also is immune to most of the known hacker attacks as of today. As a result of this information, SNOW-V will be responsible for ensuring speed and integrity of the communication. 6. Quantum and Post-Quantum Cryptography Several times already we have mentioned, that the algorithms mainly used within 5G are immune to currently known types of attacks and have not yet been broken. This does not mean, that the status quo will remain the same. The high level of sophistication of the modern cybersecurity does not ensure the comprehensive and life-long safety from hackers, as the more enhanced the security features are, the more developed the hackings become. Even in case the hackers will not be able to decrypt the algorithms used in 5G or any other system, the rise of quantum computers poses a great threat to cybersecurity systems all over the world. It is predicted, that the quantum computers will be able to decrypt RSA and EDH by 2030 [14, 15]. Yet, the quantum systems are highly costly products and therefore, are not accessible to anyone who simply wishes to acquire it. Yet, with the development and advancement of technology, like anything else, the prices will drop down in the coming years. Therefore, they will become more affordable. This has raised serious concerns with regard to network and cyber security overall. In certain parts of the world the attempts of developing quantum computing is actively carried out [16]. This on its’ part has caused the scientists and researchers to work on post-quantum cryptography, which shall ensure the security in the new era, dominated by quantum computers. For example, Verizon, as one of the service providers, has launched its’ trials with regards to quantum key distribution (QKD) [17, 18]. Among quantum technologies (Fig. 7) there are various security directions [25-27]. Figure 7: Quantum technologies of information security Despite the early stages of trials and testing of the new technologies, it is clear, that the level of security provided by quantum cryptography and mathematics, as a basis thereof, is unparalleled in todays’ world [18-20]. We offer to integrate lattice based cryptography instead of existing asymmetric cryptography schemes. We offer to use NTRU as it was selected as a finalist in the NIST PQC standardization competition [21-22, 28-30]. 167 7. Conclusion 5G network offers the wide range of opportunities, possibilities and higher speed of communication, at the same time providing higher level of security and safety to its’ users. The slicing and visualization of the network allow for service providers to localize the attack, to swiftly solve the problems. At the same time, the rise of quantum computers and development of quantum cryptography, while providing large amount of security, also poses great threats in long term. Unless the whole cybersecurity system will shift towards post-quantum cryptography, the threat posed not only to the data transferred through the network, but by the level of control that can be gained over the devices, can prove to be fatal. As discussed above, the cryptographic algorithms, that are considered safe as of today, will be easily decryptable through quantum computers within the upcoming years. Considering the speed of development of smart technologies, AI, machine learning systems, increasing level of distribution of IoT and the amount of dependability on technology by humans, it is impossible to imagine the amount of damage that can be caused by crumbling security system. While deploying the 5G network, the configuration and proper usage of the cybersecurity protocols will play a vital role. At the same time, the virtualization and division of the network will allow for creation of malware, attack and/or malfunction detection software, which can play great role in securitization of the network. At the same time, the quantum cryptography will remain as a major solution for ensuring the greater security and its’ development shall be the main topic on the agenda of security-driven entities. As 5G security scheme includes asymmetrical cryptography schemes and by means of this, it will be vulnerable to the attacks of quantum computers, it is offered to integrate lattice- based cryptography. 8. References [1] G. Bianchi, “5G Security.” 5G Italy White Book: from Research to Market, November 2018, https://www.5gitaly.eu/2018/wp-content/uploads/2019/04/5G-Italy-White-eBook.pdf. [2] A.R. Prasad, M. C. Soveri, A. Escott, and A. Zugenmaier, “5GPP 5G Security.” 3GPP 5G Security. 3GPP, August 6, 2018. https://www.3gpp.org/news-events/1975-sec_5g [3] About 3GPP Home, 3GPP, accessed April 15, 2021, https://www.3gpp.org/about- 3gpp/about-3gpp. [4] Bessalov A., Sokolov V. Skladannyi P., Zhyltsov O. Computing of odd degree isogenies on supersingular twisted Edwards curves. Proceedings of the Workshop on Cybersecurity Providing in Information and Telecommunication Systems, Jan. 28, 2021 vol. 2923, pp. 1-11. [5] P. Ekdahl and A. Maximov, “Encryption in Virtualized 5G Environments.” Ericsson. June 2, 2020. https://www.ericsson.com/en/blog/2020/6/encryption-in-virtualized-5g-environments. [6] 5G Americas. “Security Considerations for the 5G Era 2020.” 5G Americas, July 2020. https://doi.org/[Online]. p. 8. [7] K. Samdanis, X. Costa-Perez, and V. Sciancalepore, “From Network Sharing to Multi- Tenancy: The 5G Network Slice Broker.” IEEE Communications Magazine 54, no. 7 (2016): 32–39.p.38 https://doi.org/10.1109/mcom.2016.7514161. [8] A. Kuznetsov, O. Smirnov, D. Kovalchuk et al, “Formation of Pseudorandom Sequences with Special Correlation Properties,” 2019 3rd International Conference on Advanced Information and Communications Technologies (AICT), 2019, pp. 395-399. [9] A.R. Prasad, M. C. Soveri, A. Escott, and A. Zugenmaier, “5GPP 5G Security.” 3GPP 5G Security. 3GPP, August 6, 2018. https://www.3gpp.org/news-events/1975-sec_5g. [10] “3GPP TR 33.846, V0.11.0 Technichal Report.” TDoc S3-211287. 3GPP, March 18, 2021. https://portal.3gpp.org/ngppapp/CreateTdoc.aspx?mode=view&contributionUid=S3-211287 [11] “Security architecture and procedures for 5G System”, 3GPP TS 33.501, V17.1.0, (3GPP, April 6, 2021), https://www.3gpp.org/ftp/Specs/archive/33_series/33.501/p.10 [12] J. Lake, “What Is the Diffie–Hellman Key Exchange and How Does It Work?” Comparitech, March 23, 2021. https://www.comparitech.com/blog/information-security/diffie-hellman- key-exchange/. 168 [13] A. Bessalov, et al., “Analysis of 2-isogeny properties of generalized form Edwards curves”, in: Proceedings of the Workshop on Cybersecurity Providing in Information and Telecommunication Systems, July 7, 2020, vol. 2746, pp. 1-13. [14] A. Bessalov, V. Sokolov, P. Skladannyi, “Modeling of 3- and 5-isogenies of supersingular Edwards curves”, in: Proceedings of the 2nd International Workshop on Modern Machine Learning Technologies and Data Science, June 2–3, 2020, no. I, vol. 2631, pp. 30–39. [15] T.C Clancy, R. W. McGwier, and L. Chen, “Post-Quantum Cryptography and 5G Security.” Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019. https://doi.org/10.1145/3317549.3324882. [16] “Quantum-Safe Security in a 5G World.” QuantumXC. Quantumxc, July 15, 2019. https://quantumxc.com/quantum-safe-security-in-a-5g-world/. [17] S. Gnatyuk, T. Okhrimenko, M. Iavich and R. Berdibayev, “Intruder Control Mode Simulation of Deterministic Quantum Cryptography Protocol for Depolarized Quantum Channel”, Proc. of 2019 Intern. Scien.-Pract. Conf. on the Problems of Infocommunications. Science and Technology, pp. 825-828, October 08-11, 2019. [18] T.C Clancy, R. W. McGwier, and L. Chen, “Post-Quantum Cryptography and 5G Security.” Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019. https://doi.org/10.1145/3317549.3324882. [19] J.L Hardcastle, “Verizon Boosts 5G Security, Deploys Quantum Key Distribution” Sdxcentral. September 3, 2020. https://www.sdxcentral.com/articles/news/verizon-boosts- 5g-security-deploys-quantum-key-distribution/2020/09/. [20] M. Iavich, A. Gagnidze, G. Iashvili, S. Gnatyuk, V. Vialkova: Lattice based Merkle. CEUR Workshop Proceedings, vol. 2470, pp. 13–16 (2019) [21] A.G. Gagnidze, M.P. Iavich, G.U. Iashvili: Analysis of post quantum cryptography use in practice. Bull. Georgian Natl. Acad. Sci. 11(2), 29–36 (2017) [22] Hermans, F. Vercauteren, B. Preneel (2010) Speed Records for NTRU. In: Pieprzyk J. (eds) Topics in Cryptology - CT-RSA 2010. CT-RSA 2010. Lecture Notes in Computer Science, vol 5985. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11925-5_6 [23] Altaf Shaik, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi, and Jean-Pierre Seifert, “Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems,” Proceedings of the Internet Society Symposium on Network and Distributed System Security (NDSS) (Feburary 2016). [24] David Basin, Jannik Dreier, Lucca Hirschi, Saša Radomirovic, Ralf Sasse, and Vincent Stettler, “A Formal Analysis of 5G Authentication,” Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS '18) (October 2018). [25] Korchenko O., Vasiliu Y., Gnatyuk S. “Modern quantum technologies of information security against cyber-terrorist attacks”, Aviation, Vol. 14, №3, рр. 58-69, 2010. [26] Z. Hu, S. Gnatyuk, T. Okhrimenko, V. Kinzeryavyy, M. Iavich, Kh. Yubuzova, “High-Speed Privaсy Amplification Method for Deterministic Quantum Cryptography Protocols Using Pairs of Entangled Qutrits”, CEUR Workshop Proceedings, Vol. 2393, pp. 810-821, 2019. [27] Gnatyuk S., Okhrimenko T., Azarenko O., Fesenko A., Berdibayev R. “Experimental Study of Secure PRNG for Q-trits Quantum Cryptography Protocols”, Proceedings of the 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT 2020), Kyiv, Ukraine, May 14, 2020, pp. 183-188. [28] Labadze G., Iavich M., Iashvili G., Gagnidze A., Gnatyuk S. “Post-quantum digital signature scheme with BB84 protocol”, CEUR Workshop Proceedings, Vol. 2915, pp. 35-44, 2021. [29] Iavich M., Kuchukhidze T., Gnatyuk S., Fesenko A. “Novel certification method for quantum random number generators”, International Journal of Computer Network and Information Security, Volume 13, Issue 3, pp. 28-38, 2021. [30] Iavich M., Gnatyuk S., Arakelian A., Iashvili G., Polishchuk Y., Prysiazhnyy D., “Improved Post-quantum Merkle Algorithm Based on Threads”, Advances in Intelligent Systems and Computing, Vol. 1247 AISC, pp. 454-464, 2021. 169