Quantum-resilience for fifth-generation mobile telecommunication networks and beyond
Localisation in Lannion or Massy / please apply following the link - precise Lannion if you are interested in that localisation
As the tech firm that created the mobile world, and with more than 54,000 patents to our name, we’ve made it our business to make a mark. When joining our team at Ericsson you are empowered to learn, lead and perform at your best, shaping the future of technology. This is a place where you're welcomed as your own perfectly unique self, and celebrated for the skills, talent, and perspective you bring to the team. Are you in?
Come, and be where it begins.
We are now looking for a PhD student that will undertake joint research involved into Ericsson R&D team.
In 5G, a functional split is operated in both RAN and core in order to cater to the ultra-low latency and ultra-high efficiency requirements of 5G verticals. Notably, RAN functions are split into services deployed in the cloud, with interfacing abilities. This new architecture has tremendous impact on the efficient implementation of security processes. A key challenge in the deployment of secure 5G networks is the analysis of how current cryptographic algorithms for secure authentication and data transmission can adapt in order to provide secure authentication between services, as well as secure data encryption, whilst ensuring that the stringent efficiency requirements are met.
In the first part of the thesis, a forensic analysis of current cryptographic algorithms is to be realised, in order to design efficient cryptographic protocols adapted to the service-based architecture of 5G RAN, with potential leeway for the study of 5G core.
In the second part of the thesis, a taxonomy of different threats and challenges to consider in the implementation of post-quantum cryptographic algorithms in 5G networks is to be completed, prior to developing a framework for secure quantum key distribution and the implementation of NIST-standardised algorithms in 5G RAN.
The objective of this thesis is to provide solutions for the challenges introduced by 5G New Radio (NR), as well as new 5G verticals in terms of secure and efficient key management and mutual authentication between RAN functions. The solutions should subsequently lead to post-quantum variants, which use the newly standardized NIST algorithms.
In a first part, the PhD candidate will examine the different cryptographic algorithms involved in the implementation of security protocols on both the user and control plane in 5G networks. The applicant will investigate the shift from symmetric-key to public-key cryptography for different 5G verticals. He will then develop a framework for an automated process in the issuance and management of certificates by NFs.
The candidate will then perform a detailed study of the proposed post-quantum algorithms being standardized by the NIST, in terms of performance, applicability, with regards to data confidentiality (post-quantum encryption schemes), identification and authentication (post-quantum digital signature schemes) for a variety of 5G use cases.
Based on the results of the study, the candidate will propose new requirements and restrictions in terms of security and scalability, which will be used as a baseline for the implementation of post-quantum algorithms in 5G networks.
The outcomes of the proposal will lead to publications at international conferences and journals, as well as participation in symposiums and conferences paving the way for the deployment of real-world security solutions in a post-quantum world. The thesis will also contribute to standardization activities related to 5G, and the deployment of quantum-resistant security solutions for 5G networks.
- You will drive research leading to the development cryptographic algorithms, in the area of standards for the secure deployment of 5G networks in a classical and a post-quantum world.
- Perform continuous analysis experimental research.
- Develop input to Ericsson standardization, specification, IPR and research portfolio.
- Develop competence in technical domain, mainly Crypto usage in RAN/Core networks.
- Education: Master 2 level
- Minimum experience: New graduate
- A university degree (MSc or BSc) in Computer science, Cryptography, Math, Security
- Working with people and networking!
- Innovating, adapting, and responding to change!
- Delivering results and meeting customer expectations
- Planning and Organizing
- Is connected to the Conventions Industrielles de Formation par la REcherche (Cifre).
Ericsson provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, sexual orientation, marital status, pregnancy, parental status, national origin, ethnic background, age, disability, political opinion, social status, veteran status, union membership or genetics.
Ericsson complies with applicable country, state and all local laws governing nondiscrimination in employment in every location across the world in which the company has facilities. In addition, Ericsson supports the UN Guiding Principles for Business and Human Rights and the United Nations Global Compact.
This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, training and development.
Ericsson expressly prohibits any form of workplace harassment based on race, color, religion, sex, sexual orientation, marital status, pregnancy, parental status, national origin, ethnic background, age, disability, political opinion, social status, veteran status, union membership or genetic information.