2012 International Conference on Multimedia Computing and Systems 2012
DOI: 10.1109/icmcs.2012.6320128
|View full text |Cite
|
Sign up to set email alerts
|

Analytical evaluation of the stream cipher ZUC

Abstract: The new stream cipher algorithm ZUC has been adopted to be the kernel of the third set of the LTE cryptographic algorithms. These security algorithms are used to ensure the data confidentiality and integrity protection during its transmission over the air interface in the LTE Network. In the present paper, we are interested in studying the internal structure of ZUC algorithm and its different operation modes. In addition, we will focus on its analytical evaluation to give a clear idea of its efficiency.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…This work is included in the security file of 3GPP LTE Advanced. The scheme with the highest productivity single carries out the stage of work of the ZUC [38][39][40]. Schemes realization ZUC fully ability single realize a lot of lower throughput, ago the self-feedback loop in the high path significantly reduces the operating frequency.…”
Section: Zuc Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…This work is included in the security file of 3GPP LTE Advanced. The scheme with the highest productivity single carries out the stage of work of the ZUC [38][39][40]. Schemes realization ZUC fully ability single realize a lot of lower throughput, ago the self-feedback loop in the high path significantly reduces the operating frequency.…”
Section: Zuc Algorithmmentioning
confidence: 99%
“…These algorithms achieved confidentiality and integrity despite their different implementation of time complexity, space complexity, and data complexity. The constant denotes the best running condition for the algorithm, while the exponential denotes the worst running condition [38]. The values will first show the complexity of LTE-based algorithms, and then slice the complexity of each category provided in Table 3 and Table 4 separately.…”
Section: Comparison On the 4g Security Algorithmsmentioning
confidence: 99%
“…Shift transformation, also known as rotation transformation, is widely applied in numerous fields, such as cryptography, image processing, multimedia applications, and biostatistics [11][12][13]. In cryptography, to enhance the "diffusion degree" of plain text, most cryptographic algorithms, such as AES [14], ZUC [15], and SHA−256 [16], leverage shift operations or shift-based variant operations to improve security. The shifters in existing cryptographic processors are mainly the typical barrel shifter [4][5][6][7][8].…”
Section: Introductionmentioning
confidence: 99%