Jassim, Khalid Fadhil and Alshaikhli, Imad Fakhri Taha (2017) Analysis of confidentiality algorithms in different mobile generations. In: 1st International Conference of Cihan University-Erbil on Communication Engineering and Computer Science (CIC-COCOS’17), 29th-30th March 2017, Erbil, Iraq.
PDF
- Published Version
Restricted to Repository staff only Download (411kB) | Request a copy |
Abstract
In past years, a variety of Mobile technology generations have been adopted in mobile communication systems. Various sensitive information (e.g. emails, bank transactions, voice calls, ... ) was exchanged via the mobile systems. The protection of information confidentiality became a serious problem for the customers of these systems. Security solutions such as confidentiality cipher algorithms proposed to protect the transmissions in different mobile generations. The proposed cipher algorithms like A5/1 cipher, SNOW 3G cipher, ZUC cipher, and AES cipher were designed for securing mobile systems. This paper provides analysis study of operations and specifications for these cipher algorithms, and investigating the cryptanalysis methods which can be employed to attack these cipher algorithms
Item Type: | Conference or Workshop Item (Invited Papers) |
---|---|
Additional Information: | 6534/61226 |
Uncontrolled Keywords: | Mobile Generations; Cipher Algorithms; A5/1Cipher; SNOW3G Cipher; ZUC Cipher; AES Cipher; Cryptanalysis Attacks |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): | Kulliyyah of Information and Communication Technology > Department of Computer Science Kulliyyah of Information and Communication Technology > Department of Computer Science |
Depositing User: | Professor Imad Taha |
Date Deposited: | 12 Jan 2018 14:44 |
Last Modified: | 26 Jun 2018 11:11 |
URI: | http://irep.iium.edu.my/id/eprint/61226 |
Actions (login required)
View Item |