Author:
Jasim Khalid Fadhil,Ghafoor Kayhan Zrar,Maghdid Halgurd S.
Abstract
This paper intended to investigate and analyze encryption algorithms that can be proposed to perform data security in 4G and 5G networks. The research explores different standards, services, and features presented via 4G and 5G networks. Also, the basic components of encryption algorithms (e.g., ZUC, SNOW 3G, and AES) are investigated. For instance, initialization keys have been identified and analyzed due to their vital roles in determining the security of the encryption algorithms. Moreover, the researchers analyzed the effective elements of these algorithms (i.e., LFSR registers, substitution boxes, NLF functions like finite state machines, Math transformations, secret encryption keys, and non-secret IV keys). Cryptanalysis methods play important roles in determining the security of these algorithms. Thus, some cryptanalysis methods have been explored and investigated. Various weak points have been identified in initialization process of these algorithms. Therefore, different recommendations are presented that enhance the security of these ciphers, and can be reflected in data security in 4G and 5G networks.
Reference27 articles.
1. Yang J., Johansson T., An overview of cryptographic primitives for possible use in 5G and beyond. Sci. China Inf. Sci. 63, 220301 (2020). https://doi.org/10.1007/s11432-019-2907-4
2. Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
3. Ezhilarasan E. and Dinakaran M., A Review on mobile technologies: 3G , 4G and 5G, Second International Conference on Recent Trends and Challenges in Computational Models, 2017. DOI 10.1109/ICRTCCM.2017.90
4. Nitesh G. S. and Kakkar A., Generations of Mobile Communication, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 6, no. 3, pp. 320–324, 2016.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献