2017 International Conference on Circuits, System and Simulation (ICCSS) 2017
DOI: 10.1109/cirsyssim.2017.8023195
|View full text |Cite
|
Sign up to set email alerts
|

Two KASUMI components for an optimal implementation of the A5/3 algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…Sure, all of our daily transactions and communications in modern life are done through mobile networks [3,4]. The 3G and 4G communications technologies that are becoming mobile emigrations of online applications such as Voice over IP (VoIP), video streaming, music download files, mobile communication, and so on are the Universal Mobile Telecommunications System (UMTS), Long Term Evolution (LTE) and LTE advanced standards use stream encryption algorithm such as the snow algorithm, which is the heart of mobile standards' security and is the one viewed as the seed of the 128-EEA1 confidentiality and 128-EIA1 integrity algorithms of 4G LTE security [5][6][7][8], which removes the f8 and f9 algorithms of UMTS security [9][10][11]. Following that, the Third Generation Partnership Project (3GPP) standardized two LTE kernel algorithms.…”
Section: How To Work With This Templatementioning
confidence: 99%
See 1 more Smart Citation
“…Sure, all of our daily transactions and communications in modern life are done through mobile networks [3,4]. The 3G and 4G communications technologies that are becoming mobile emigrations of online applications such as Voice over IP (VoIP), video streaming, music download files, mobile communication, and so on are the Universal Mobile Telecommunications System (UMTS), Long Term Evolution (LTE) and LTE advanced standards use stream encryption algorithm such as the snow algorithm, which is the heart of mobile standards' security and is the one viewed as the seed of the 128-EEA1 confidentiality and 128-EIA1 integrity algorithms of 4G LTE security [5][6][7][8], which removes the f8 and f9 algorithms of UMTS security [9][10][11]. Following that, the Third Generation Partnership Project (3GPP) standardized two LTE kernel algorithms.…”
Section: How To Work With This Templatementioning
confidence: 99%
“…In this paper, we developed SNOW3G to SNOW3G-M (M for multi-LFSR) with the use of two LFSRs (Linear Feedback Shift Registers) and a FSM (Finite State Machine) updated to best align with vectorized applications by increasing the total size to 64 bits for increased security by encrypting data. In the long run, this proposal provides perfect randomness, and the Snow3G-M algorithm has the strongest because the shortness of the generated keystream does not help the attack and increases the complexity of a cryptanalysis attack due to the failure of the uniform SNOW-3G cipher's initialization method [10]. The remainder of this paper is structured as follows: Section 2: Explain the conventional SNOW3G architecture.Section3 shows the new design and step architecture of the SNOW3G-M.…”
Section: How To Work With This Templatementioning
confidence: 99%
“…Therefore, the A5/3 algorithm treats two sequences at the same time. It generates two keystream sequences of size 144-bits under the control of the Cipher Key (CK) of 64-bits size and the input variable (COU N T ) of 22-bits size [9]. The first generated keystream sequence is combined with the plaintext (P1) using a XOR operation to form the transmitted ciphertext (C1), and the second sequence is combined with the received ciphertext (C2) to recover the plaintext (P2).…”
Section: A5/3 Encryption Algorithm Overviewmentioning
confidence: 99%
“…We consider in this subsection, the comparison between the proposed architecture with the structural and internal architectures of the most previous Original [22] [ works on the A5/3 encryption algorithm (original A5/3, A5/3 presented in [22] and initial optimized A5/3 [9]).…”
Section: Internal Structure and Implementationmentioning
confidence: 99%
See 1 more Smart Citation