{"id":21062,"date":"2024-10-04T10:54:36","date_gmt":"2024-10-04T09:54:36","guid":{"rendered":"https:\/\/www.gsma.com\/newsroom\/?post_type=gsma_theme_resources&#038;p=21062"},"modified":"2024-10-04T12:54:43","modified_gmt":"2024-10-04T11:54:43","slug":"pq-03-post-quantum-cryptography-guidelines-for-telecom-use-cases","status":"publish","type":"gsma_theme_resources","link":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/pq-03-post-quantum-cryptography-guidelines-for-telecom-use-cases\/","title":{"rendered":"PQ.03 Post Quantum Cryptography \u2013 Guidelines for Telecom Use Cases v2.0"},"content":{"rendered":"<p>The scope of this document is to provide a set of best practice guidelines that can be used to support the journey to Quantum safe cryptography in the context of the telecom ecosystem. The work builds directly on the outcome of the first impact assessment [<a href=\"https:\/\/www.gsma.com\/newsroom\/wp-content\/uploads\/PQ.1-Post-Quantum-Telco-Network-Impact-Assessment-Whitepaper-Version1.0.pdf\">GSMA-PQ.01<\/a>] and takes into consideration the risk assessment framework(s) being adopted by the wider industry and the implementation roadmap for PQC. This document presents a phased approach to migration allowing prioritisation of the actions required. It facilitates forward planning of transformation programmes with key stakeholder groups such as network operators.<\/p>\n<p>This new revision (V2.0) of the document focuses on migration, highlighting both common and use case specific aspects.<\/p>\n<p>The document highlights the known technical challenges and areas of uncertainty, to raise awareness with stakeholders. Within each use case there is a detailed analysis of aspects such as standards, government guidelines, functional architecture and performance implications.<\/p>\n<h4><span style=\"color: #ff0000;\"><strong><a style=\"color: #ff0000;\" href=\"https:\/\/www.gsma.com\/newsroom\/post-quantum-government-initiatives-by-country-and-region\/\" target=\"_blank\" rel=\"noopener\">Goverment Initatives &#8211; Click Here<\/a><\/strong><\/span><\/h4>\n<h4>Resources<\/h4>\n","protected":false},"excerpt":{"rendered":"<p>The scope of this document is to provide a set of best practice guidelines that can be used to support the journey to Quantum safe cryptography in the context of the telecom ecosystem. The work builds directly on the outcome of the first impact assessment [GSMA-PQ.01] and takes into consideration the risk assessment framework(s) being [&hellip;]<\/p>\n","protected":false},"author":107,"featured_media":0,"template":"","meta":{"image":null,"json":{"gsma_resources_type":"Multiple_Documents","gsma_resources_thumb":"null","gsma_resources_file":"null","gsma_resources_multi":[{"version":"PQ.03 v2.0","offsite":"No","file":"[21648]","url":"","video":"","desc":"","image":""},{"version":"PQ.03 v2.0 Executive Summary","offsite":"No","file":"[21649]","url":"","video":"","desc":"","image":""}],"gsma_resources_wgr":[{"title":"","file":"[]"},{"title":"","file":"[]"},{"title":"Post Quantum Cryptograpy v2.0","file":"[21648]"},{"title":"Post Quantum Cryptography  Executive Summary v2.0","file":"[21649]"}],"gsma_resources_video":"","gsma_resources_image":"null","gsma_resources_url":"","gsma_resources_date":"","gsma_resources_button":""}},"tags":[],"resource_categories":[],"algolia_discover_type":[6631],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v22.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>PQ.03 Post Quantum Cryptography \u2013 Guidelines for Telecom Use Cases v2.0 - Newsroom<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/pq-03-post-quantum-cryptography-guidelines-for-telecom-use-cases\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PQ.03 Post Quantum Cryptography \u2013 Guidelines for Telecom Use Cases v2.0\" \/>\n<meta property=\"og:description\" content=\"The scope of this document is to provide a set of best practice guidelines that can be used to support the journey to Quantum safe cryptography in the context of the telecom ecosystem. The work builds directly on the outcome of the first impact assessment [GSMA-PQ.01] and takes into consideration the risk assessment framework(s) being [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/pq-03-post-quantum-cryptography-guidelines-for-telecom-use-cases\/\" \/>\n<meta property=\"og:site_name\" content=\"Newsroom\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/gsma\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-04T11:54:43+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@GSMA\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"PQ.03 Post Quantum Cryptography \u2013 Guidelines for Telecom Use Cases v2.0 - Newsroom","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/pq-03-post-quantum-cryptography-guidelines-for-telecom-use-cases\/","og_locale":"en_GB","og_type":"article","og_title":"PQ.03 Post Quantum Cryptography \u2013 Guidelines for Telecom Use Cases v2.0","og_description":"The scope of this document is to provide a set of best practice guidelines that can be used to support the journey to Quantum safe cryptography in the context of the telecom ecosystem. The work builds directly on the outcome of the first impact assessment [GSMA-PQ.01] and takes into consideration the risk assessment framework(s) being [&hellip;]","og_url":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/pq-03-post-quantum-cryptography-guidelines-for-telecom-use-cases\/","og_site_name":"Newsroom","article_publisher":"https:\/\/www.facebook.com\/gsma\/","article_modified_time":"2024-10-04T11:54:43+00:00","twitter_card":"summary_large_image","twitter_site":"@GSMA","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/pq-03-post-quantum-cryptography-guidelines-for-telecom-use-cases\/","url":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/pq-03-post-quantum-cryptography-guidelines-for-telecom-use-cases\/","name":"PQ.03 Post Quantum Cryptography \u2013 Guidelines for Telecom Use Cases v2.0 - Newsroom","isPartOf":{"@id":"https:\/\/www.gsma.com\/newsroom\/#website"},"datePublished":"2024-10-04T09:54:36+00:00","dateModified":"2024-10-04T11:54:43+00:00","breadcrumb":{"@id":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/pq-03-post-quantum-cryptography-guidelines-for-telecom-use-cases\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gsma.com\/newsroom\/gsma_resources\/pq-03-post-quantum-cryptography-guidelines-for-telecom-use-cases\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.gsma.com\/newsroom\/gsma_resources\/pq-03-post-quantum-cryptography-guidelines-for-telecom-use-cases\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.gsma.com\/newsroom\/"},{"@type":"ListItem","position":2,"name":"PQ.03 Post Quantum Cryptography \u2013 Guidelines for Telecom Use Cases v2.0"}]},{"@type":"WebSite","@id":"https:\/\/www.gsma.com\/newsroom\/#website","url":"https:\/\/www.gsma.com\/newsroom\/","name":"Newsroom","description":"","publisher":{"@id":"https:\/\/www.gsma.com\/newsroom\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gsma.com\/newsroom\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.gsma.com\/newsroom\/#organization","name":"GSMA","url":"https:\/\/www.gsma.com\/newsroom\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.gsma.com\/newsroom\/#\/schema\/logo\/image\/","url":"https:\/\/www.gsma.com\/newsroom\/wp-content\/uploads\/\/GSMA_logo_colour_web.jpg","contentUrl":"https:\/\/www.gsma.com\/newsroom\/wp-content\/uploads\/\/GSMA_logo_colour_web.jpg","width":1000,"height":1000,"caption":"GSMA"},"image":{"@id":"https:\/\/www.gsma.com\/newsroom\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/gsma\/","https:\/\/x.com\/GSMA","https:\/\/www.instagram.com\/gsmaonline\/","https:\/\/www.linkedin.com\/company\/12380","https:\/\/www.youtube.com\/user\/GSMAOnline"]}]}},"cats":[{"term_id":4754,"name":"All Documents","slug":"all-documents","term_group":0,"term_taxonomy_id":4757,"taxonomy":"resource_categories","description":"","parent":0,"count":181,"filter":"raw"},{"term_id":6633,"name":"Blog","slug":"blog","term_group":0,"term_taxonomy_id":6636,"taxonomy":"resource_categories","description":"","parent":0,"count":0,"filter":"raw"},{"term_id":4759,"name":"Configuration","slug":"configuration","term_group":0,"term_taxonomy_id":4762,"taxonomy":"resource_categories","description":"","parent":5080,"count":2,"filter":"raw"},{"term_id":6368,"name":"COVID-19","slug":"covid-19","term_group":0,"term_taxonomy_id":6371,"taxonomy":"resource_categories","description":"","parent":0,"count":5,"filter":"raw"},{"term_id":4760,"name":"Fraud and Security Group","slug":"fraud-and-security-group","term_group":0,"term_taxonomy_id":4763,"taxonomy":"resource_categories","description":"","parent":5081,"count":10,"filter":"raw"},{"term_id":4762,"name":"GSMA Corporate Documents","slug":"gsma-corporate-documents","term_group":0,"term_taxonomy_id":4765,"taxonomy":"resource_categories","description":"","parent":5080,"count":2,"filter":"raw"},{"term_id":4761,"name":"Internet Group","slug":"web-working-group","term_group":0,"term_taxonomy_id":4764,"taxonomy":"resource_categories","description":"","parent":5081,"count":6,"filter":"raw"},{"term_id":4764,"name":"Market Intelligence","slug":"market-intelligence","term_group":0,"term_taxonomy_id":4767,"taxonomy":"resource_categories","description":"","parent":5080,"count":7,"filter":"raw"},{"term_id":4758,"name":"Networks Group","slug":"networks-group","term_group":0,"term_taxonomy_id":4761,"taxonomy":"resource_categories","description":"","parent":5081,"count":55,"filter":"raw"},{"term_id":4763,"name":"OMTP Documents","slug":"omtp-documents","term_group":0,"term_taxonomy_id":4766,"taxonomy":"resource_categories","description":"","parent":5080,"count":5,"filter":"raw"},{"term_id":6600,"name":"Post Quantum Telco Network","slug":"post-quantum-telco-network","term_group":0,"term_taxonomy_id":6603,"taxonomy":"resource_categories","description":"","parent":5081,"count":0,"filter":"raw"},{"term_id":6599,"name":"Post Quantum Telco Network Task Force","slug":"post-quantum-telco-network-task-force","term_group":0,"term_taxonomy_id":6602,"taxonomy":"resource_categories","description":"","parent":0,"count":2,"filter":"raw"},{"term_id":4757,"name":"SIM Working Group","slug":"sim-working-group","term_group":0,"term_taxonomy_id":4760,"taxonomy":"resource_categories","description":"","parent":5081,"count":25,"filter":"raw"},{"term_id":4755,"name":"Technical Documents","slug":"technical-documents","term_group":0,"term_taxonomy_id":4758,"taxonomy":"resource_categories","description":"","parent":5080,"count":34,"filter":"raw"},{"term_id":4756,"name":"Terminal Steering Group","slug":"terminal-steering-group","term_group":0,"term_taxonomy_id":4759,"taxonomy":"resource_categories","description":"","parent":5081,"count":32,"filter":"raw"},{"term_id":5080,"name":"Type","slug":"type","term_group":0,"term_taxonomy_id":5083,"taxonomy":"resource_categories","description":"","parent":0,"count":0,"filter":"raw"},{"term_id":5086,"name":"Web Working Group","slug":"web-working-group-2","term_group":0,"term_taxonomy_id":5089,"taxonomy":"resource_categories","description":"","parent":0,"count":0,"filter":"raw"},{"term_id":5081,"name":"Working Group","slug":"working-group","term_group":0,"term_taxonomy_id":5084,"taxonomy":"resource_categories","description":"","parent":0,"count":4,"filter":"raw"}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/gsma_theme_resources\/21062"}],"collection":[{"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/gsma_theme_resources"}],"about":[{"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/types\/gsma_theme_resources"}],"author":[{"embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/users\/107"}],"version-history":[{"count":11,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/gsma_theme_resources\/21062\/revisions"}],"predecessor-version":[{"id":21661,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/gsma_theme_resources\/21062\/revisions\/21661"}],"wp:attachment":[{"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/media?parent=21062"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/tags?post=21062"},{"taxonomy":"resource_categories","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/resource_categories?post=21062"},{"taxonomy":"algolia_discover_type","embeddable":true,"href":"https:\/\/www.gsma.com\/newsroom\/wp-json\/wp\/v2\/algolia_discover_type?post=21062"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}