“…They where cryptanalyzed a few years later [1][2][3][4] and replaced by the A5/3 algorithm which was also cryptanalyzed [5]. However, considering that the A5/3 algorithm is until widely used in Universal Mobile Telecommunication Systems (UMTS) networks (to perform the f8 confidentiality and f9 integrity functions), investigations are still proposed to improve the security optimization of the KASUMI algorithm [6][7][8]. Therefore, A5/3 optimization is yet very relevant.…”