4G Network Security Algorithms: Overview

Authors

  • Rana M. Zaki University of Technology, Baghdad, Iraq
  • Hala Bahjat Abdul wahab University of Technology, Baghdad, Iraq

DOI:

https://doi.org/10.3991/ijim.v15i16.24175

Keywords:

— LTE, Cryptography, 4G, Authentication, Confidentiality, Security, SNOW3G, AES, ZUC

Abstract


Long Term Evolution (LTE) of (Universal Mobile Telecommunication System) is one of the modern steps in series of mobile telecommunications systems. That appears to be a strong technology that meets the requirements of fourth-generation (4G) mobile networks and supports authentication and encryption mechanisms between User Equipment (UE) and Message Management Entity (MME). This paper provides an overview of the three most important algorithms that are considered the heart of LTE cryptographic algorithms (SNOW3G, AES, and ZUC) and a comparison between cipher key length and initial vector length to generate keystream depending on the structure used for each algorithm as each algorithm has a time of complexity and space of complexity that differs from the other security algorithm.

 

Author Biographies

Rana M. Zaki, University of Technology, Baghdad, Iraq

Computer Science

Hala Bahjat Abdul wahab, University of Technology, Baghdad, Iraq

Computer Science

Downloads

Published

2021-08-23

How to Cite

M. Zaki, R., & Bahjat Abdul wahab, H. (2021). 4G Network Security Algorithms: Overview. International Journal of Interactive Mobile Technologies (iJIM), 15(16), pp. 127–143. https://doi.org/10.3991/ijim.v15i16.24175

Issue

Section

Papers