![]() |
10.5120/ijca2017912921 |
Eman Ashraf Mohammed, Nihal F F Areed, Ali Takieldeen and Mohammed Abd-elazeem. Novel Cryptographic Algorithm for 4G / LTE-A. International Journal of Computer Applications 163(1):5-9, April 2017. BibTeX
@article{10.5120/ijca2017912921, author = {Eman Ashraf Mohammed and Nihal F. F. Areed and Ali Takieldeen and Mohammed Abd-elazeem}, title = {Novel Cryptographic Algorithm for 4G / LTE-A}, journal = {International Journal of Computer Applications}, issue_date = {April 2017}, volume = {163}, number = {1}, month = {Apr}, year = {2017}, issn = {0975-8887}, pages = {5-9}, numpages = {5}, url = {http://www.ijcaonline.org/archives/volume163/number1/27357-2017912921}, doi = {10.5120/ijca2017912921}, publisher = {Foundation of Computer Science (FCS), NY, USA}, address = {New York, USA} }
Abstract
LTE (Long Term Evolution) is the fourth generation of mobile communication systems, Novel cryptographic algorithm based on enhancement at RC6 algorithm presented here. Using two parallel RC6 at connect them together with some functions in order to use 256 bit input block instead of 128 bit input block as the usual RC6 . This proposed method makes the encryption decryption process faster, stronger, and more secure against attacks. The algorithm applied to many types of data files, shown in MATLAB how it works. The results are compared with EEA2 (EPS Encryption Algorithm 2) used in LTE as EPS stands for Evolved Packet System.
References
- Ghizlane ORHANOU, Said EL HAJJI, Youssef BENTALEB and Jalal LAASSIRI, “EPS Confidentiality and Integrity mechanisms Algorithmic Approach”, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 4, No 4, July 2010.
- V.Kaul, P. Choudhari, and S. Narayankhedkar, “Security enhancement for data transmission in 4G networks,” proc. of 5th International Conference Confluence of the Next Generation Information Technology Summit (Confluence), -, pp. 373-378, 2014.
- Milind Mathur, Ayaush Kesarwani. ''Comparison between DES, 3DES, RC2, RC6 , BLOWFISH and AES" , proc. Of National conference on New Horizons in it,2013.
- Kirti Aggarawat , "Comparison of RC6 and modified RC6 ", International conference of Advances in Computer Engineering and applications, 2015.
- D. Forsberg, G. Horn, W.-D. Moeller, and V. Niemi, LTE security: John Wiley & Sons, 2012.
- H. Zarrinkoub, Understanding LTE with MATLAB: from mathematical modeling to simulation and prototyping: John Wiley & Sons, 2014.
- Walied W. Souror , Ali E. Taki el-deen, Rasheed Mokhtar el-awady Ahmed , Adel Zaghlul Mahmoud1 "An Implementation of High Security and High Throughput Triple Blowfish Cryptography Algorithm" International Journal of Research and Reviews in Signal Acquisition and Processing (IJRRSAP) Vol. 2, No. 1, March 2012.
- K. Aggarwal, “Comparison of RC6, modified RC6 & enhancement of RC6,” proc. of International Conference on Advances Computer Engineering and Applications (ICACEA), pp. 444-449, 2015.
- Ali E. Taki El_Deen, Mohy E. Abo-Elsoud, Salma M. Saif," Text and Biomedical Images Disguising using Advanced Encryption Standard", International Journal of Engineering Research & Technology (IJERT)Vol. 2 Issue 12, December – 2013.
- Eman Ashraf Mohammed, Nihal Fayez Areed, Ali Takieldeen, Rasheed M. El-Awady," Hybrid Cryptographic Algorithm for LTE DataConfidentiality", International Journal of Engineering Research & Technology (IJERT),Vol. 5 Issue 12, December-2016.
- A. K. Mandal and A. Tiwari, “Analysis of Avalanche Effect in Plaintext of DES using Binary Codes,” International Journal of Emerging Trends and Technology in Computer Science (IJETTCS), vol. 1, pp. 166-177, 2012.
- S. R. Basavarasu, “Voice and Image Encryption, and, Performance Analysis of Counter Mode Advanced Encryption Standard for WiMAX,” University of Toledo, 2013.
Keywords
LTE; encryption; AES; RC6