Publication:
Quantum Secure Communication Between Service Provider and SIM

dc.authorscopusid55292926300
dc.authorscopusid57214011617
dc.authorscopusid15833929800
dc.authorwosidKarakaya, Aykut/Aeb-7326-2022
dc.authorwosidAkleylek, Sedat/D-2090-2015
dc.contributor.authorKaracan, Engin
dc.contributor.authorKarakaya, Aykut
dc.contributor.authorAkleylek, Sedat
dc.contributor.authorIDKarakaya, Aykut/0000-0001-6970-3239
dc.contributor.authorIDAkleylek, Sedat/0000-0001-7005-6489
dc.date.accessioned2025-12-11T01:13:27Z
dc.date.issued2022
dc.departmentOndokuz Mayıs Üniversitesien_US
dc.department-temp[Karacan, Engin] Ondokuz Mayis Univ, Grad Sch Sci, Computat Sci Program, TR-55270 Samsun, Turkey; [Karakaya, Aykut] Bulent Ecevit Univ, Dept Comp Technol, TR-67100 Zonguldak, Turkey; [Akleylek, Sedat] Ondokuz Mayis Univ, Fac Engn, Dept Comp Engn, TR-55270 Samsun, Turkeyen_US
dc.descriptionKarakaya, Aykut/0000-0001-6970-3239; Akleylek, Sedat/0000-0001-7005-6489en_US
dc.description.abstractIn resource-constrained devices such as Subscriber Identity Module (SIM), the possibility of using authentication and key exchange methods, which include the mutual verification of two parties to ensure the security of communication, provides a significant advantage. As the cost efficient computations may not be efficiently performed on resource-constrained devices, security is the main problem for SIMs. With the advancing technology and the use of quantum computers, it is predicted that this may lead to threats. It is a well-known fact that security on traditional public key cryptosystems will become vulnerable by using quantum computers due to Shor's algorithm. In this paper, two different resistant to quantum attacks structures are proposed to ensure secure communication between SIM and service providers. In the proposed methods, Advanced Encryption Standard (AES-256) is used for communication with resource-constrained devices, and N-th degree Truncated polynomial Ring Units (NTRU) encryption system is used for communication with servers. Two methods are proposed, one with the private key and one without the private key in the production phase. This protocol provides authentication, data privacy and integrity for post-quantum SIM cards. The proposed method is inspired by the FLAT (Federated Lightweight Authentication) protocol. However, the main difference from the FLAT protocol is that it has more nodes and is resistant to quantum attacks.en_US
dc.description.sponsorshipOMU [PYO.MUH.1908.22.020]en_US
dc.description.sponsorshipThis paper was partially supported by OMU under grant no.PYO.MUH.1908.22.020.en_US
dc.description.woscitationindexScience Citation Index Expanded
dc.identifier.doi10.1109/ACCESS.2022.3186306
dc.identifier.endpage69146en_US
dc.identifier.issn2169-3536
dc.identifier.scopus2-s2.0-85133780652
dc.identifier.scopusqualityQ1
dc.identifier.startpage69135en_US
dc.identifier.urihttps://doi.org/10.1109/ACCESS.2022.3186306
dc.identifier.urihttps://hdl.handle.net/20.500.12712/42119
dc.identifier.volume10en_US
dc.identifier.wosWOS:000838378500001
dc.identifier.wosqualityQ2
dc.language.isoenen_US
dc.publisherIEEE-inst Electrical Electronics Engineers incen_US
dc.relation.ispartofIEEE Accessen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectProtocolsen_US
dc.subjectSecurityen_US
dc.subjectEncryptionen_US
dc.subjectAuthenticationen_US
dc.subjectQuantum Computingen_US
dc.subjectLatticesen_US
dc.subjectResistanceen_US
dc.subjectPost-Quantum Cryptographyen_US
dc.subjectSIMen_US
dc.subjectCommunication Securityen_US
dc.subjectFlat Protocolen_US
dc.titleQuantum Secure Communication Between Service Provider and SIMen_US
dc.typeArticleen_US
dspace.entity.typePublication

Files