IIUM Repository

Comparative study on 4G/LTE cryptographic algorithms based on different factors

Ghanim, Alyaa and Alshaikhli, Imad Fakhri Taha (2014) Comparative study on 4G/LTE cryptographic algorithms based on different factors. International Journal of Computer Science and Telecommunications, 5 (7). pp. 7-10. ISSN 2047-3338

[img]
Preview
PDF - Published Version
Download (556kB) | Preview

Abstract

Recently, (LTE) Long Term Evolution appeared as a robust technology to meet (4G) Fourth Generation cellular networks requirements. Apparently, there are three sets of cryptographic algorithms that work on LTE technology and each set based on core algorithm. Therefore, in this paper we are focusing on reviewing the three sets of the LTE cryptographic algorithms and their core algorithms and then comparing them based on different factors in order to understand their cons and pros and provide valuable information about LTE security.

Item Type: Article (Journal)
Additional Information: 6534/37424
Uncontrolled Keywords: LTE, 4G, Cryptography and Algorithm
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology
Kulliyyah of Information and Communication Technology
Depositing User: Professor Imad Taha
Date Deposited: 23 Jul 2014 10:57
Last Modified: 19 Jun 2018 15:28
URI: http://irep.iium.edu.my/id/eprint/37424

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year