Author:
Lawange Saurabh,Narnaware Manish
Abstract
Security is the important when it comes to wireless communication, and as the expectations of people increased, the data service now arrived at LTE. The faster data access and communication with high priority security. ZUC is the algorithm adopted to provide security under third set of LTE i.e. EEA3 and EIA3. The algorithms are used for confidentiality and integrity protection over the air. To analyze the security level of the algorithm different attacks were published in literature. The aim of this paper is to discuss the working of ZUC algorithm in detail. Also different attacks are listed in the last section.
Publisher
Advance Academic Publisher
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献