Advanced International Journal for Research
E-ISSN: 3048-7641
•
Impact Factor: 9.11
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with AIJFR
Upcoming Conference(s) ↓
WSMCDD-2025
GSMCDD-2025
Conferences Published ↓
RBS:RH-COVID-19 (2023)
ICMRS'23
PIPRDA-2023
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 6 Issue 6
November-December 2025
Indexing Partners
Performance Analysis of a Cryptographically-Agile Authentication Framework for 6G Network Slices
| Author(s) | Lalit Rai, Manju Kumari, Madhu Nimesh |
|---|---|
| Country | India |
| Abstract | The growing threat sat by quantum computing has made it quite necessary to integrate post-quantum cryptographic solutions to emerging 6G networks. The concept of network slicing introduces new demands for flexible and adaptive security mechanisms at the same time. While existing studies are limited to static implementations of post-quantum cryptography and very small work is available to understand how cryptographic agility affects the overall network performance. This paper introduces such a framework that supports dynamic selection of cryptographic algorithms across different network slices which further delivers the first experimental proof of the overhead introduced by such agile network. The proposed system improves Open5GS by incorporating cryptographic negotiation and real-time switching features, enabling the use of Kyber and Dilithium algorithms across URLLC, eMBB, and mMTC slices. Experimental study indicates that the use of cryptographic agility leads to a 23.2% increase in authentication latency, an 8–11 ms delay during algorithm transitions, and a 45.3% escalation in memory consumption relative to static configurations. Even with this extra work, the framework can switch between dynamic algorithms 99.4% of the time while still being compatible with older versions. These results provide useful information for finding the best balance between security that is resistant to quantum attacks and system performance in future network topologies. |
| Keywords | 6G Security, Performance Overhead, Post-Quantum Cryptography, Network Slicing, Cryptographic Agility, Authentication Framework |
| Field | Engineering |
| Published In | Volume 6, Issue 6, November-December 2025 |
| Published On | 2025-12-23 |
Share this

E-ISSN 3048-7641
CrossRef DOI is assigned to each research paper published in our journal.
AIJFR DOI prefix is
10.63363/aijfr
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.