Analysis of Encryption Algorithms Proposed for Data Security in 4G and 5G Generations

Abstract
This paper intended to investigate and analyze encryption algorithms that can be proposed to perform data security in 4G and 5G networks. The research explores different standards, services, and features presented via 4G and 5G networks. Also, the basic components of encryption algorithms (e.g., ZUC, SNOW 3G, and AES) are investigated. For instance, initialization keys have been identified and analyzed due to their vital roles in determining the security of the encryption algorithms. Moreover, the researchers analyzed the effective elements of these algorithms (i.e., LFSR registers, substitution boxes, NLF functions like finite state machines, Math transformations, secret encryption keys, and non-secret IV keys). Cryptanalysis methods play important roles in determining the security of these algorithms. Thus, some cryptanalysis methods have been explored and investigated. Various weak points have been identified in initialization process of these algorithms. Therefore, different recommendations are presented that enhance the security of these ciphers, and can be reflected in data security in 4G and 5G networks.

Author
Kayhan Zrar Ghafoor

DOI
https://doi.org/10.1051/itmconf/20224201004

Publisher
ITM Web Conf. - 1st International Conference on Applied Computing & Smart Cities (ICACS21)

ISSN

Publish Date:

Call Us

Registry: +9647503000600
Registry: +9647503000700
Presidency: +9647503000800