Analysis of confidentiality algorithms in different mobile generations

In past years, a variety of Mobile technology generations have been adopted in mobile communication systems. Various sensitive information (e.g. emails, bank transactions, voice calls, ... ) was exchanged via the mobile systems. The protection of information...

詳細記述

保存先:
書誌詳細
主要な著者: Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha
フォーマット: Conference or Workshop Item
言語:English
出版事項: 2017
主題:
オンライン・アクセス:http://irep.iium.edu.my/61226/1/61226_Analysis%20of%20Confidentiality%20Algorithms.pdf
http://irep.iium.edu.my/61226/
http://cic.cihanuniversity.edu.iq/wp-content/uploads/2017/04/10.24086cocos17.09.pdf
タグ: タグ追加
タグなし, このレコードへの初めてのタグを付けませんか!
id my.iium.irep.61226
record_format dspace
spelling my.iium.irep.61226 http://irep.iium.edu.my/61226/ Analysis of confidentiality algorithms in different mobile generations Jassim, Khalid Fadhil Alshaikhli, Imad Fakhri Taha QA75 Electronic computers. Computer science In past years, a variety of Mobile technology generations have been adopted in mobile communication systems. Various sensitive information (e.g. emails, bank transactions, voice calls, ... ) was exchanged via the mobile systems. The protection of information confidentiality became a serious problem for the customers of these systems. Security solutions such as confidentiality cipher algorithms proposed to protect the transmissions in different mobile generations. The proposed cipher algorithms like A5/1 cipher, SNOW 3G cipher, ZUC cipher, and AES cipher were designed for securing mobile systems. This paper provides analysis study of operations and specifications for these cipher algorithms, and investigating the cryptanalysis methods which can be employed to attack these cipher algorithms 2017-03-29 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/61226/1/61226_Analysis%20of%20Confidentiality%20Algorithms.pdf Jassim, Khalid Fadhil and Alshaikhli, Imad Fakhri Taha (2017) Analysis of confidentiality algorithms in different mobile generations. In: 1st International Conference of Cihan University-Erbil on Communication Engineering and Computer Science (CIC-COCOS’17), 29th-30th March 2017, Erbil, Iraq. http://cic.cihanuniversity.edu.iq/wp-content/uploads/2017/04/10.24086cocos17.09.pdf 10.24086/cocos17.09
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Jassim, Khalid Fadhil
Alshaikhli, Imad Fakhri Taha
Analysis of confidentiality algorithms in different mobile generations
description In past years, a variety of Mobile technology generations have been adopted in mobile communication systems. Various sensitive information (e.g. emails, bank transactions, voice calls, ... ) was exchanged via the mobile systems. The protection of information confidentiality became a serious problem for the customers of these systems. Security solutions such as confidentiality cipher algorithms proposed to protect the transmissions in different mobile generations. The proposed cipher algorithms like A5/1 cipher, SNOW 3G cipher, ZUC cipher, and AES cipher were designed for securing mobile systems. This paper provides analysis study of operations and specifications for these cipher algorithms, and investigating the cryptanalysis methods which can be employed to attack these cipher algorithms
format Conference or Workshop Item
author Jassim, Khalid Fadhil
Alshaikhli, Imad Fakhri Taha
author_facet Jassim, Khalid Fadhil
Alshaikhli, Imad Fakhri Taha
author_sort Jassim, Khalid Fadhil
title Analysis of confidentiality algorithms in different mobile generations
title_short Analysis of confidentiality algorithms in different mobile generations
title_full Analysis of confidentiality algorithms in different mobile generations
title_fullStr Analysis of confidentiality algorithms in different mobile generations
title_full_unstemmed Analysis of confidentiality algorithms in different mobile generations
title_sort analysis of confidentiality algorithms in different mobile generations
publishDate 2017
url http://irep.iium.edu.my/61226/1/61226_Analysis%20of%20Confidentiality%20Algorithms.pdf
http://irep.iium.edu.my/61226/
http://cic.cihanuniversity.edu.iq/wp-content/uploads/2017/04/10.24086cocos17.09.pdf
_version_ 1643617006182727680
score 13.250246