Overview of ZUC Algorithm and its Contributions on the Security Success and Vulnerabilities of 4G Mobile Communication
Author(s) -
Alyaa Ghanim
Publication year - 2017
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2017914485
Subject(s) - computer science , computer security , secure coding , information security , software security assurance , security service
With tremendous challenges in mobile communication toward a very advanced security level against new threats, ZUC algorithm emerged to overpass various algorithms that common before. ZUC is a stream cipher which is the core of the both newly LTE algorithms (LTE encryption and integrity algorithms). Nowadays, a mobile has been a crucial thing in people’s daily life and people used to save their information including personal information on it. In addition, the accelerated change in mobile generations requires an appropriate algorithm to cope with the change and achieve more security demands. Therefore, Chinese cryptography experts have been designed ZUC algorithm to cope with 4G mobile security to overcome the obstacles that the previous generation had before with a flexibility to develop and change. The purpose of this research is to provide an extensive study on the ZUC algorithm and show the improvements that have been done till now and the vulnerabilities of the ZUC algorithm against different attacks.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom