Search

Preparing Telecom for the Quantum-Safe Future: Why a Telecom-Specific CBOM Matters

As the industry begins the long and necessary journey toward quantum-safe cryptography (QSC), the telecom environment presents a uniquely complex challenge. Unlike traditional IT systems, telecom infrastructure, particularly in the 5G era, is highly disaggregated, spans multi-vendor ecosystems, and is increasingly distributed across cloud-native platforms. 

From the core to the edge, from base stations to hyperscalers, cryptographic operations are embedded in every layer of the network. But how many telecom providers today can confidently answer: Where are we using cryptography? What algorithms are in use? Which are vulnerable? 

 Knowing What You Have 

The first step in any security transformation, especially one as consequential as migrating to QSC, is understanding your inventory of cryptographic assets. Without that visibility, it’s impossible to evaluate risk, plan migrations, or ensure compliance with emerging national and international mandates. 

That’s where the Cryptographic Bill of Materials (CBOM) comes in. 

CBOM is becoming an essential tool in the IT industry, allowing organizations to document and manage cryptographic algorithms, protocols, keys, and certificates embedded in their systems. By providing a machine-readable, standardized inventory of cryptographic usage, CBOM helps teams understand complex environments, identify weak cryptography, and plan for future transitions. 

Why Telecom Needs Its Own CBOM Standard 

However, telecom security differs from general IT. 

Telecom networks use a range of domain-specific cryptographic protocols, specifically within the Mobile 5G network. Protocols such as 5G-AKA, PRINS, MILENAGE, and EAP-AKA, that are not captured in general-purpose CBOM schemas. Furthermore, 5G network functions communicate over standardized interfaces (such as N1–N32 in 5G), each with unique trust and encryption requirements. Many cryptographic operations are offloaded to hardware (HSMs, TPMs, or embedded elements), making it more challenging to capture the cryptographic inventory of telecom networks. 

To truly support telecom providers in their transition towards implementing QSC, CBOM definitions must be extended to reflect the operational and architectural realities of the telecom domain. 

The ATIS Telecom CBOM Initiative 

To address this need, ATIS is working closely with leading telecom providers and ecosystem partners to define a Telecom-specific CBOM standard, one that builds on existing CycloneDX foundations while introducing the schema, context, and tooling necessary for 5G and beyond. 

This Telecom CBOM effort will enable the industry to: 

  • Achieve meaningful cryptographic visibility across multi-vendor, multi-cloud, and multi-interface deployments 
  • Support crypto-agility by making it easier to identify and plan upgrades of quantum-vulnerable algorithms 
  • Align vendor practices and regulatory reporting through a common inventory and compliance framework 

By establishing a Telecom CBOM standard now, we lay the foundation for automated risk management, consistent cryptographic assurance, and confident migration planning is laid before quantum disruption becomes a reality. 

Get Involved 

This work is open, collaborative, and essential. If you or your organization is are interested in contributing to the development of the Telecom CBOM standard or participating in pilot implementations, we invite you to contact ATIS and get involved. 

The path to quantum-safe telecom begins with understanding your cryptography. CBOM is how we achieve that goal together. 

Ian Deakin, Principal Technologist - ATIS
Ian Deakin, Principal Technologist at ATIS is currently applying his expertise in digital transformation to advance ATIS initiatives in the areas of distributed ledger technology (DLT) and 5G vertical enablement platforms. Deakin has a 30-year career in the ICT industry, with a long-standing track record working with companies globally to define new product and service propositions, implementing emerging technologies to deliver new business lines. Before his current role at ATIS, he worked with executive-level leadership at innov8id to help organizations use blockchain innovation to facilitate change, optimize performance and productivity, and create new business models. Prior to this, he held senior management positions leading product and technology strategies with iconectiv, CMG Telecom, Motorola, O2, and Siemens Nixdorf. He has filed three patents in the ICT area. His most recent work at ATIS involves leading the organizations’ initiative to devise and deliver a solution using DLT to help combat fraudulent/spoofed telephone calls.

About the Author

Ian Deakin

Principal Technologist at ATIS

Ian Deakin, Principal Technologist at ATIS is currently applying his expertise in digital transformation to advance ATIS initiatives in the areas of distributed ledger technology (DLT) and 5G vertical enablement platforms. Deakin has a 30-year career in the ICT industry, with a long-standing track record working with companies globally to define new product and service propositions, implementing emerging technologies to deliver new business lines. Before his current role at ATIS, he worked with executive-level leadership at innov8id to help organizations use blockchain innovation to facilitate change, optimize performance and productivity, and create new business models. Prior to this, he held senior management positions leading product and technology strategies with iconectiv, CMG Telecom, Motorola, O2, and Siemens Nixdorf. He has filed three patents in the ICT area. His most recent work at ATIS involves leading the organizations’ initiative to devise and deliver a solution using DLT to help combat fraudulent/spoofed telephone calls.