Analysis of confidentiality algorithms in different mobile generations
In past years, a variety of Mobile technology generations have been adopted in mobile communication systems. Various sensitive information (e.g. emails, bank transactions, voice calls, ... ) was exchanged via the mobile systems. The protection of information...
Main Authors: | , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/61226/ http://irep.iium.edu.my/61226/ http://irep.iium.edu.my/61226/ http://irep.iium.edu.my/61226/1/61226_Analysis%20of%20Confidentiality%20Algorithms.pdf |
id |
iium-61226 |
---|---|
recordtype |
eprints |
spelling |
iium-612262018-06-26T03:11:09Z http://irep.iium.edu.my/61226/ Analysis of confidentiality algorithms in different mobile generations Jassim, Khalid Fadhil Alshaikhli, Imad Fakhri Taha QA75 Electronic computers. Computer science In past years, a variety of Mobile technology generations have been adopted in mobile communication systems. Various sensitive information (e.g. emails, bank transactions, voice calls, ... ) was exchanged via the mobile systems. The protection of information confidentiality became a serious problem for the customers of these systems. Security solutions such as confidentiality cipher algorithms proposed to protect the transmissions in different mobile generations. The proposed cipher algorithms like A5/1 cipher, SNOW 3G cipher, ZUC cipher, and AES cipher were designed for securing mobile systems. This paper provides analysis study of operations and specifications for these cipher algorithms, and investigating the cryptanalysis methods which can be employed to attack these cipher algorithms 2017-03-29 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/61226/1/61226_Analysis%20of%20Confidentiality%20Algorithms.pdf Jassim, Khalid Fadhil and Alshaikhli, Imad Fakhri Taha (2017) Analysis of confidentiality algorithms in different mobile generations. In: 1st International Conference of Cihan University-Erbil on Communication Engineering and Computer Science (CIC-COCOS’17), 29th-30th March 2017, Erbil, Iraq. http://cic.cihanuniversity.edu.iq/wp-content/uploads/2017/04/10.24086cocos17.09.pdf 10.24086/cocos17.09 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Jassim, Khalid Fadhil Alshaikhli, Imad Fakhri Taha Analysis of confidentiality algorithms in different mobile generations |
description |
In past years, a variety of Mobile technology
generations have been adopted in mobile communication
systems. Various sensitive information (e.g. emails, bank
transactions, voice calls, ... ) was exchanged via the mobile
systems. The protection of information confidentiality became
a serious problem for the customers of these systems. Security
solutions such as confidentiality cipher algorithms proposed to
protect the transmissions in different mobile generations. The
proposed cipher algorithms like A5/1 cipher, SNOW 3G
cipher, ZUC cipher, and AES cipher were designed for
securing mobile systems. This paper provides analysis study of
operations and specifications for these cipher algorithms, and
investigating the cryptanalysis methods which can be employed
to attack these cipher algorithms |
format |
Conference or Workshop Item |
author |
Jassim, Khalid Fadhil Alshaikhli, Imad Fakhri Taha |
author_facet |
Jassim, Khalid Fadhil Alshaikhli, Imad Fakhri Taha |
author_sort |
Jassim, Khalid Fadhil |
title |
Analysis of confidentiality algorithms in different mobile generations |
title_short |
Analysis of confidentiality algorithms in different mobile generations |
title_full |
Analysis of confidentiality algorithms in different mobile generations |
title_fullStr |
Analysis of confidentiality algorithms in different mobile generations |
title_full_unstemmed |
Analysis of confidentiality algorithms in different mobile generations |
title_sort |
analysis of confidentiality algorithms in different mobile generations |
publishDate |
2017 |
url |
http://irep.iium.edu.my/61226/ http://irep.iium.edu.my/61226/ http://irep.iium.edu.my/61226/ http://irep.iium.edu.my/61226/1/61226_Analysis%20of%20Confidentiality%20Algorithms.pdf |
first_indexed |
2023-09-18T21:26:50Z |
last_indexed |
2023-09-18T21:26:50Z |
_version_ |
1777412247898816512 |