Analysis of Confidentiality Algorithms in Different Mobile Generations

Author: Khalid Fadhil Jasim
Department of Computer Science, KICT International Islamic University
Department of Computer Science, Cihan University – Erbil

Author:Imad Fakhri Al-Shaikhli
Department of Computer Science, KICT International Islamic University

DOI: http://dx.doi.org/10.24086/cuesj.si.2017.n1a11

In past years, a variety of Mobile technology generations have been adopted in mobile communication systems. Various sensitive information (e.g. emails, bank transactions, voice calls, … ) was exchanged via the mobile systems. The protection of information confidentiality became a serious problem for the customers of these systems. Security solutions such as confidentiality cipher algorithms proposed to protect the transmissions in different mobile generations. The proposed cipher algorithms like A5/1 cipher, SNOW 3G cipher, ZUC cipher, and AES cipher were designed for securing mobile systems. This paper provides analysis study of operations and specifications for these cipher algorithms, and investigating the cryptanalysis methods which can be employed to attack these cipher algorithms.
Keywords: Mobile Generations; Cipher Algorithms; A5/1Cipher; SNOW3G Cipher; ZUC Cipher; AES Cipher; Cryptanalysis Attacks.

[1] S. Shukla, V. Khare, S Garg, and P. Sharma, “Comparative Study of 1G , 2G , 3G and 4G,” Journal of Engineering, Computers & Applied Sciences (JEC&AS), vol. 2, no. 4, pp. 55–63, 2013.
[2] M. R. Bhalla and A. V. Bhalla, “Generations of Mobile Wireless Technology: A Survey,” International Journal of Computer Applications, vol. 5, no. 4, pp. 26–32, 2010.
[3] M. La Polla, F. Martinelli, and D. Sgandurra, “A Survey on Security for Mobile Devices,” IEEE Communications Surveys & Totorials, pp. 1–26, 2012.
[4] F. Rezaei, M. Hempel, and H. Sharif, “A comprehensive performance analysis of LTE and Mobile WiMAX,” 8th Int. Wirel. Commun. Mob. Comput. Conf., pp. 939–944, Aug. 2012.
[5] Garsha Sai Nitesh and Ashna Kakkar, “Generations of Mobile Communication ,” International Journal of Advanced Research in Computer Science and Software Engineering 6 (3), March – 2016, pp. 320-324.
[6] Priyanka Jain and Rajendra Singh Yadav, “A Comparative Study of Different Generations of Communication Networks,” International Journal of AdvancedResearch in Computer and Communication Engineering, Vol. 5, Special Issue 3, November 2016.
[7] E. Biham & O. Dunkelman, “Cryptanalysis of the A5/1 GSM stream cipher,” In Indocrypt’00., 2000.
[8] B. Debraize and I. M. Corbella, “Fault analysis of the stream cipher snow 3G,” in Fault Diagnosis and Tolerance in Cryptography – Proceedings of the 6th International Workshop, FDTC 2009, pp. 103–110.
[9] S. Traboulsi, N. Pohl, J. Hausner, A. Bilgic, and V. Frascolla, “Power analysis and optimization of the ZUC stream cipher for LTE- Advanced mobile terminals,” in 2012 IEEE 3rd Latin American Symposium on Circuits and Systems, LASCAS 2012 – Conference Proceedings.
[10] G. Orhanou, S. El Hajji, and Y. Bentaleb, “EPS AES-based confidentiality and integrity algorithms: Complexity study,” in International Conference on Multimedia Computing and Systems – Proceedings, 2011.
[11] M. Kalenderi, D. Pnevmatikatos, I. Papaefstathiou, and C. Manifavas, “Breaking the GSM A5/1 cryptography algorithm with rainbow Tables and high-end FPGAs,” in Proceedings – 22nd International Conference on Field Programmable Logic and Applications, FPL 2012, pp. 747–753.
[12] R. Anderson, “A5 (was: Hacking digital phones) ,” Newsgroup Communication, 1994.
[13] J. Golic, “Cryptanalysis of alleged A5 stream cipher,” In Eurocrypt’97, pp. 239-255, 1997.
[14] A. Mahalanobis and J. Shah, “An Improved Guess-and-Determine Attack on the A5 / 1 Stream Cipher,” Journal of Computer and Information Science, vol. 7, no. 1, pp. 115–124, 2014.
[15] ETSI/SAGE, “Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2,” Document 2: SNOW 3G Specification, version 10.0.0, 2011.
[16] Biryukov, Priemuth-Schmid and Zhang, “Differential Resynchronization Attacks on Reduced Round SNOW 3G,” ICETE 2010, CCIS 222, pp. 147–157, 2012.

Full Text

About admin

Check Also

Comparative Study of Reconfigurable Cache Memory

Authors: Safaa S. Omran, Ibrahim A. Amory Department of Computer Engineering, College of Electrical and …

Leave a Reply

Your email address will not be published.