Analysis of confidentiality algorithms in different mobile generations

In past years, a variety of Mobile technology generations have been adopted in mobile communication systems. Various sensitive information (e.g. emails, bank transactions, voice calls, ... ) was exchanged via the mobile systems. The protection of information...

全面介紹

Saved in:
書目詳細資料
Main Authors: Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha
格式: Conference or Workshop Item
語言:English
出版: 2017
主題:
在線閱讀:http://irep.iium.edu.my/61226/1/61226_Analysis%20of%20Confidentiality%20Algorithms.pdf
http://irep.iium.edu.my/61226/
http://cic.cihanuniversity.edu.iq/wp-content/uploads/2017/04/10.24086cocos17.09.pdf
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
實物特徵
總結:In past years, a variety of Mobile technology generations have been adopted in mobile communication systems. Various sensitive information (e.g. emails, bank transactions, voice calls, ... ) was exchanged via the mobile systems. The protection of information confidentiality became a serious problem for the customers of these systems. Security solutions such as confidentiality cipher algorithms proposed to protect the transmissions in different mobile generations. The proposed cipher algorithms like A5/1 cipher, SNOW 3G cipher, ZUC cipher, and AES cipher were designed for securing mobile systems. This paper provides analysis study of operations and specifications for these cipher algorithms, and investigating the cryptanalysis methods which can be employed to attack these cipher algorithms