Analysis of Encryption Algorithms Proposed for Data Security in 4G and 5G Generations

Khalid Fadhil Jasim, Kayhan Zrar Ghafoor, Halgurd S. Maghdid, A. Kattan
2022 ITM Web of Conferences  
This paper intended to investigate and analyze encryption algorithms that can be proposed to perform data security in 4G and 5G networks. The research explores different standards, services, and features presented via 4G and 5G networks. Also, the basic components of encryption algorithms (e.g., ZUC, SNOW 3G, and AES) are investigated. For instance, initialization keys have been identified and analyzed due to their vital roles in determining the security of the encryption algorithms. Moreover,
more » ... he researchers analyzed the effective elements of these algorithms (i.e., LFSR registers, substitution boxes, NLF functions like finite state machines, Math transformations, secret encryption keys, and non-secret IV keys). Cryptanalysis methods play important roles in determining the security of these algorithms. Thus, some cryptanalysis methods have been explored and investigated. Various weak points have been identified in initialization process of these algorithms. Therefore, different recommendations are presented that enhance the security of these ciphers, and can be reflected in data security in 4G and 5G networks.
doi:10.1051/itmconf/20224201004 fatcat:yxpoqudo2fckjonohaa5x7uleu