CFP last date
20 December 2024
Reseach Article

Novel Cryptographic Algorithm for 4G / LTE-A

by Eman Ashraf Mohammed, Nihal F. F. Areed, Ali Takieldeen, Mohammed Abd-elazeem
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 163 - Number 1
Year of Publication: 2017
Authors: Eman Ashraf Mohammed, Nihal F. F. Areed, Ali Takieldeen, Mohammed Abd-elazeem
10.5120/ijca2017912921

Eman Ashraf Mohammed, Nihal F. F. Areed, Ali Takieldeen, Mohammed Abd-elazeem . Novel Cryptographic Algorithm for 4G / LTE-A. International Journal of Computer Applications. 163, 1 ( Apr 2017), 5-9. DOI=10.5120/ijca2017912921

@article{ 10.5120/ijca2017912921,
author = { Eman Ashraf Mohammed, Nihal F. F. Areed, Ali Takieldeen, Mohammed Abd-elazeem },
title = { Novel Cryptographic Algorithm for 4G / LTE-A },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 163 },
number = { 1 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 5-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume163/number1/27357-2017912921/ },
doi = { 10.5120/ijca2017912921 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:08:56.747397+05:30
%A Eman Ashraf Mohammed
%A Nihal F. F. Areed
%A Ali Takieldeen
%A Mohammed Abd-elazeem
%T Novel Cryptographic Algorithm for 4G / LTE-A
%J International Journal of Computer Applications
%@ 0975-8887
%V 163
%N 1
%P 5-9
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

LTE (Long Term Evolution) is the fourth generation of mobile communication systems, Novel cryptographic algorithm based on enhancement at RC6 algorithm presented here. Using two parallel RC6 at connect them together with some functions in order to use 256 bit input block instead of 128 bit input block as the usual RC6 . This proposed method makes the encryption decryption process faster, stronger, and more secure against attacks. The algorithm applied to many types of data files, shown in MATLAB how it works. The results are compared with EEA2 (EPS Encryption Algorithm 2) used in LTE as EPS stands for Evolved Packet System.

References
  1. Ghizlane ORHANOU, Said EL HAJJI, Youssef BENTALEB and Jalal LAASSIRI, “EPS Confidentiality and Integrity mechanisms Algorithmic Approach”, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 4, No 4, July 2010.
  2. V.Kaul, P. Choudhari, and S. Narayankhedkar, “Security enhancement for data transmission in 4G networks,” proc. of 5th International Conference Confluence of the Next Generation Information Technology Summit (Confluence), -, pp. 373-378, 2014.
  3. Milind Mathur, Ayaush Kesarwani. ''Comparison between DES, 3DES, RC2, RC6 , BLOWFISH and AES" , proc. Of National conference on New Horizons in it,2013.
  4. Kirti Aggarawat , "Comparison of RC6 and modified RC6 ", International conference of Advances in Computer Engineering and applications, 2015.
  5. D. Forsberg, G. Horn, W.-D. Moeller, and V. Niemi, LTE security: John Wiley & Sons, 2012.
  6. H. Zarrinkoub, Understanding LTE with MATLAB: from mathematical modeling to simulation and prototyping: John Wiley & Sons, 2014.
  7. Walied W. Souror , Ali E. Taki el-deen, Rasheed Mokhtar el-awady Ahmed , Adel Zaghlul Mahmoud1 "An Implementation of High Security and High Throughput Triple Blowfish Cryptography Algorithm" International Journal of Research and Reviews in Signal Acquisition and Processing (IJRRSAP) Vol. 2, No. 1, March 2012.
  8. K. Aggarwal, “Comparison of RC6, modified RC6 & enhancement of RC6,” proc. of International Conference on Advances Computer Engineering and Applications (ICACEA), pp. 444-449, 2015.
  9. Ali E. Taki El_Deen, Mohy E. Abo-Elsoud, Salma M. Saif," Text and Biomedical Images Disguising using Advanced Encryption Standard", International Journal of Engineering Research & Technology (IJERT)Vol. 2 Issue 12, December – 2013.
  10. Eman Ashraf Mohammed, Nihal Fayez Areed, Ali Takieldeen, Rasheed M. El-Awady," Hybrid Cryptographic Algorithm for LTE DataConfidentiality", International Journal of Engineering Research & Technology (IJERT),Vol. 5 Issue 12, December-2016.
  11. A. K. Mandal and A. Tiwari, “Analysis of Avalanche Effect in Plaintext of DES using Binary Codes,” International Journal of Emerging Trends and Technology in Computer Science (IJETTCS), vol. 1, pp. 166-177, 2012.
  12. S. R. Basavarasu, “Voice and Image Encryption, and, Performance Analysis of Counter Mode Advanced Encryption Standard for WiMAX,” University of Toledo, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

LTE encryption AES RC6