CFP last date
20 May 2024
Reseach Article

Comparative Study of Vulnerabilities in LTE Cryptographic Algorithm

by Fatma Nilofer, Jihad Qaddour
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 25
Year of Publication: 2018
Authors: Fatma Nilofer, Jihad Qaddour
10.5120/ijca2018916587

Fatma Nilofer, Jihad Qaddour . Comparative Study of Vulnerabilities in LTE Cryptographic Algorithm. International Journal of Computer Applications. 180, 25 ( Mar 2018), 19-25. DOI=10.5120/ijca2018916587

@article{ 10.5120/ijca2018916587,
author = { Fatma Nilofer, Jihad Qaddour },
title = { Comparative Study of Vulnerabilities in LTE Cryptographic Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2018 },
volume = { 180 },
number = { 25 },
month = { Mar },
year = { 2018 },
issn = { 0975-8887 },
pages = { 19-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume180/number25/29112-2018916587/ },
doi = { 10.5120/ijca2018916587 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:01:44.584664+05:30
%A Fatma Nilofer
%A Jihad Qaddour
%T Comparative Study of Vulnerabilities in LTE Cryptographic Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 25
%P 19-25
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Long Term Evolution (LTE) is a standard for high-speed wireless communication for mobile and data terminals based on Global System for Mobile Communication (GSM) and Universal Mobile Telecommunications Service (UMTS) Technologies. The goal of LTE is to increase the capacity and speed of wireless data networks using new DSP (digital signal processing) techniques. LTE provides high spectral efficiency, high peak data rates, short round trip time as well as flexibility in frequency and bandwidth. One of the main purpose of LTE security is to perform user’s authentication and to provide data integrity and confidentiality. Two standardized algorithms were provided by LTE technology to ensure data integrity and confidentiality protection via air interface named as EPS Encryption Algorithm and EPS Integrity Algorithm. Even LTE has complex and a vigorous set of security mechanisms, but there is still need for improvement. This research paper investigates and discusses three sets of cryptographic algorithms that work on LTE technology. These three sets of the LTE cryptographic algorithms are SNOW-3G, ZUC and AES algorithm.  This paper presents a comparative study of these cryptographic algorithms as well as related attacks and the contribution of various researchers in overcoming these attacks. A complete study has been done in comparing the three algorithms, their respective challenges and solutions proposed by various researchers. After complete analysis and investigation on the advantages and disadvantages of these algorithms, we concluded that AES is one of the strongest among the three cryptographic algorithms, whereas SNOW 3G is the weakest.

References
  1. Ghanim, A., & Alshaikhli, I. F. T. (2014). Comparative study on 4G/LTE cryptographic algorithms based on different factors. International Journal of Computer Science and Telecommunications, 5(7), 7-10.
  2. Ghellar, F., & Lubaszewski, M. S. (2008, September). A novel AES cryptographic core highly resistant to differential power analysis attacks. In Proceedings of the 21st annual symposium on Integrated circuits and system design (pp. 140-145). ACM.
  3. Nia, M. S. N., & Eghlidos, T. (2014, September). Improved Heuristic guess and determine attack on SNOW 3G stream cipher. In Telecommunications (IST), 2014 7th International Symposium on (pp. 972-976). IEEE.
  4. P. Hawkes and G. G. Rose. Guess-and-determine attacks on SNOW. In K. Nyberg and H. M. Heys, editors, Selected Areas in Cryptography -- SAC 2002, Lecture Notes in Computer Science, pages 37--46. Springer -Verlag, 2002.
  5. D. Coppersmith, S. Halevi, and C. S. Jutla. Cryptanalysis of stream ciphers with linear masking. In M. Yung, editor, Advances in Cryptology -- CRYPTO 2002, Lecture Notes in Computer Science, pages 515--532. Springer -Verlag, 2002
  6. O. Billet and H. Gilbert. Resistance of SNOW 2.0 against Algebraic Attacks. In Alfred Menezes editor, Topics in Cryptology -- CT-RSA~2005, Lecture Notes in Computer Science, vol. 3376, Springer Verlag, 2005.
  7. ETSI/SAGE Specification, Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3.Document 1:128-EEA3 and 128-EIA3 Specification; Version: 1.6, (2011).
  8. ETSI/SAGE Technical report: Speciation of the 3GPP Condentiality and Integrity Algorithms UEA2 & UIA2. Document 5: Design and Evaluation Report, Version 1.1, September 2006.
  9. X. Wang and K. Sako (Eds.): ASIACRYPT 2012, LNCS 7658, pp. 262–277, 2012.International Association for Cryptologic Research 2012.
  10. Haider, R. Z. (2011). Birthday Forgery Attack on 128-EIA3 Version 1.5. IACR Cryptology ePrint Archive, 2011, 268.
  11. Ming, T. A. N. G., C. H. E. N. G. PingPan, and Q. I. U. ZhenLong. "Differential Power Analysis on ZUC Algorithm."
  12. L.Keliher and y.H.Meijery,"A New Substitution-Permutation Network Cipher Using Key-ependent S-Boxes', Proceedings of Fourth International Workshop on Selected Areas in Cryptography (SAC'97), Carleton University, Canada, pp. 13-26, 1997.
  13. Janadi, A., & Tarah, D. A. (2008, April). AES immunity Enhancement against algebraic attacks by using dynamic S-Boxes. In Information and Communication Technologies: From Theory to Applications, 2008. ICTTA 2008. 3rd International Conference on (pp. 1-6). IEEE.
  14. N. Liao, X. Cui, T. Wang, K. Liao, D. Yu and X. Cui, "A high-efficient fault attack on AES S-box," 2016 Sixth International Conference on Information Science and Technology (ICIST), Dalian, 2016, pp. 210-215.
  15. A. Mirzaeyan, A. Patooghy and M. F. Ali, "A novel countermeasure against fault injection attacks for AES-based cryptosystems," 2016 24th Iranian Conference on Electrical Engineering (ICEE), Shiraz, 2016, pp. 1148-1153.
  16. Pengjun Wang and Lipeng Hao, "A novel Differential fault analysis on AES-128," 2011 9th IEEE International Conference on ASIC, Xiamen, 2011, pp. 35-38.
  17. Ferretti, C., Mella, S., & Melzani, F. (2014, June). The role of the fault model in DFA against AES. In Proceedings of the Third Workshop on Hardware and Architectural Support for Security and Privacy (p. 4). ACM.
Index Terms

Computer Science
Information Sciences

Keywords

Long Term Evolution (LTE) LTE Cryptographic Algorithm Advanced Encryption Standard (AES) ZUC SNOW 3G Encryption Algorithm Integrity Algorithm Message Authentication Code (MAC).