@article{M. Zaki_Bahjat Abdul wahab_2021, title={4G Network Security Algorithms: Overview}, volume={15}, url={https://online-journals.org/index.php/i-jim/article/view/24175}, DOI={10.3991/ijim.v15i16.24175}, abstractNote={<p class="0abstractCxSpFirst">Long Term Evolution (LTE) of (Universal Mobile Telecommunication System) is one of the modern steps in series of mobile telecommunications systems. That appears to be a strong technology that meets the requirements of fourth-generation (4G) mobile networks and supports authentication and encryption mechanisms between User Equipment (UE) and Message Management Entity (MME). This paper provides an overview of the three most important algorithms that are considered the heart of LTE cryptographic algorithms (SNOW3G, AES, and ZUC) and a comparison between cipher key length and initial vector length to generate keystream depending on the structure used for each algorithm as each algorithm has a time of complexity and space of complexity that differs from the other security algorithm.</p><p class="0abstractCxSpLast"><strong> </strong></p>}, number={16}, journal={International Journal of Interactive Mobile Technologies (iJIM)}, author={M. Zaki, Rana and Bahjat Abdul wahab, Hala}, year={2021}, month={Aug.}, pages={pp. 127–143} }