
4G Network Security Algorithms: Overview
Author(s) -
Rana M. Zaki,
Hala Bahjat Abdul Wahab
Publication year - 2021
Publication title -
international journal of interactive mobile technologies
Language(s) - English
Resource type - Journals
ISSN - 1865-7923
DOI - 10.3991/ijim.v15i16.24175
Subject(s) - computer science , cryptography , algorithm , cipher , key (lock) , key space , authentication (law) , key size , encryption , keystream , computer network , theoretical computer science , stream cipher , public key cryptography , computer security
Long Term Evolution (LTE) of (Universal Mobile Telecommunication System) is one of the modern steps in series of mobile telecommunications systems. That appears to be a strong technology that meets the requirements of fourth-generation (4G) mobile networks and supports authentication and encryption mechanisms between User Equipment (UE) and Message Management Entity (MME). This paper provides an overview of the three most important algorithms that are considered the heart of LTE cryptographic algorithms (SNOW3G, AES, and ZUC) and a comparison between cipher key length and initial vector length to generate keystream depending on the structure used for each algorithm as each algorithm has a time of complexity and space of complexity that differs from the other security algorithm.