Comparative study on 4G/LTE cryptographic algorithms /

The significance of increasing the protection of LTE network has grown rapidly due to increased possible threats against this new technology. Apparently, a Long Term Evolution (LTE) is denoted also as 4G (Fourth Generation) of mobile communication, developed by 3GPP (Third Generation Partnership pr...

Full description

Saved in:
Bibliographic Details
Main Author: Sulaiman, Alyaa Ghanim
Format: Thesis
Language:English
Published: Kuala Lumpur : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2014
Subjects:
Online Access:http://studentrepo.iium.edu.my/handle/123456789/5651
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 033720000a22002770004500
008 141003t2014 my a g m 000 0 eng d
040 |a UIAM  |b eng 
041 |a eng 
043 |a a-my--- 
050 |a TK5103.48325 
100 1 |a Sulaiman, Alyaa Ghanim 
245 1 |a Comparative study on 4G/LTE cryptographic algorithms /  |c by Alyaa Ghanim Sulaiman 
260 |a Kuala Lumpur :  |b Kulliyyah of Information and Communication Technology, International Islamic University Malaysia,  |c 2014 
300 |a xiv, 92 leaves :  |b ill. ;  |c 30cm. 
502 |a Thesis (MIT)--International Islamic University Malaysia, 2014. 
504 |a Includes bibliographical references (leaves 89-92). 
520 |a The significance of increasing the protection of LTE network has grown rapidly due to increased possible threats against this new technology. Apparently, a Long Term Evolution (LTE) is denoted also as 4G (Fourth Generation) of mobile communication, developed by 3GPP (Third Generation Partnership project) which is an evolution of the 3rd generation of mobile communication to provide better reliability, higher efficiency, more data capacity and lower cost than previous generation. In fact, LTE makes an evolution in mobile marketing as 4G wireless services. The LTE is launched on December in 2009 by TeliaSonera in Oslo and Stockholm. By 2010, Verizon wireless started using the LTE network in a wide range in North America. Additionally, the LTE inherited all cryptographic algorithms that work with its predecessors such as SNOW 3G and AES. Furthermore, LTE has one extra cryptographic algorithm named as ZUC to cope with the next generation of mobile communication and guarantee its security from different threats. The main aim of cryptography in LTE network is to ensure data confidentiality and integrity. Hence, several studies have been conducted since 2010 to support LTE network with a high level of security through studying the encryption and decryption algorithms that work with this new technology and do enhancement on them. Therefore, this research aims to study all cryptographic algorithms related to LTE network and then do comparative study among them based on different factors. The reason of using different factors is to measure the performance of an algorithm from several perspectives such as area and throughput from hardware perspective, time and memory complexity from security perspective and others. So, our target is reveal the advantages and disadvantages of the LTE cryptographic algorithms from different perspectives in order to increase confidentiality and integrity of transmitted data over the air interface in LTE network. Keywords: LTE, 4G, 3GPP, Cryptography 
596 |a 1 
655 7 |a Theses, IIUM local 
690 |a Dissertations, Academic  |x Department of Information Systems  |z IIUM 
710 2 |a International Islamic University Malaysia.  |b Department of Information Systems 
856 4 |u http://studentrepo.iium.edu.my/handle/123456789/5651 
900 |a sbh-zhmn 
999 |c 436638  |d 467923 
952 |0 0  |6 T TK 005103.048325 S000949C 002014  |7 0  |8 THESES  |9 760021  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o t TK 5103.48325 S949C 2014  |p 11100337213  |r 2017-10-20  |t 1  |v 0.00  |y THESIS 
952 |0 0  |6 TS CDF TK 5103.48325 S949C 2014  |7 0  |8 THESES  |9 852839  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o ts cdf TK 5103.48325 S949C 2014  |p 11100337214  |r 2017-10-26  |t 1  |v 0.00  |y THESISDIG