Abstract-Security is the major concern when the sensitive information is stored and transferred across the internet where the information is no longer protected by physical boundaries. Cryptography is an essential, effective and efficient component to ensure the secure communication between the different entities by transferring unintelligible information and only the authorized recipient can be able to access the information. The right selection of cryptographic algorithm is important for secure communication that provides more security, accuracy and efficiency. In this paper, we examine the security aspects and processes involved in the design and implementation of most widely used symmetric encryption algorithms such as Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), Blowfish, Advanced Encryption Standard (AES) and Hybrid Cubes Encryption Algorithm (HiSea). Furthermore, this paper evaluated and compared the performance of these encryption algorithms based on encryption and decryption time, throughput, key size, avalanche effect, memory, correlation assessment and entropy. Thus, amongst the existing cryptographic algorithm, we choose a suitable encryption algorithm based on different parameters that are best fit to the user requirements.
5G which stands for 5 th Generation Mobile technology, is a groundbreaking technology that the world now witnesses in mobile telecommunications and which has proven to be twenty or more times faster than the existing 4G technology. New standard releases beyond 4G are already in progress by standardization bodies, but at this time implementation and rollout of systems compliant with 5G is still under way in some parts of the world. The goals of a 5G-based telecommunications network would ideally answer the challenges that a 4G model would present once it has entered widespread use. The innovative features of 5G in many ways can be employed to support governments, established companies, new ideas, business models and services that require continuous connections between multiple parties that may include enterprises, telecom providers, mobile operators, government regulators, infrastructure providers and much more. This research highlighted the idea behind 5G technologies, its interconnections with smart objects of Internet of things (IoT) as well as offerings it has gained from others like Blockchain technology. The design for system model of network architecture for 5G mobile systems is described including creating IP tunnels over IP interfaces obtained by connection to the terminal via the access technologies available to the terminal (i.e., mobile user). The economic impact and the contributions of 5G technology is vigorously highlighted while some of the challenges that is faced in designing, deploying and managing the technology is also probed.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.