Cihan University-Erbil Conferences, 3rd International Conference on Communication Engineering and Computer Science (CIC-COCOS’19)

Font Size: 
The Impact of Initialization Keys on The Security of Symmetric Ciphers in 5G and 4G Generations
Khalid Fadhil Jasim

Last modified: 2019-04-24

Abstract


This research presents analysis and investigation of some symmetric cipher algorithms which have been proposed for the security of 5G and 4G mobile generations. The research starts with overview of various features, standards and services offered by 5G and 4G technologies. Moreover, the design and architecture of some symmetric cipher algorithms (e.g. AES, SNOW 3G, and ZUC) are also analyzed. In this context, the initialization keys, used in encryption and decryption phases, possess crucial role in the security of these ciphers. Also, different components such as mathematical transformations, LFSR registers, finite state machines, substitution boxes as well as IV and secret keys have been discussed. Cryptanalysis attacks which can be applied against these ciphers were investigated. Some weaknesses in the initialization operations, IV key and secret key were pointed out. Therefore, some solutions were proposed to improve the security of these cipher algorithms for 5G and 4G generations.

References


[1]     M. Amine, L. Maglaras, A. Argyriou, and D. Kosmanos, “Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes,” J. Netw. Comput. Appl., vol. 101, no. November, pp. 55–82, 2018.

[2]     M. I. Baba, N. Nafees, I. Manzoor, K. A. Naik, and S. Ahmed, “Evolution of Mobile Wireless Communication Systems from 1G to 5G: A Comparative Analysis,” IJSRCSEIT,vol. 4, no. 1, pp. 1–8, 2018.

[3]     E. Ezhilarasan and M.Dinakaran,“A Review on mobile technologies: 3G , 4G and 5G,” Second International Conference on Recent Trends and Challenges in Computational Models, 2017. DOI 10.1109/ICRTCCM.2017.90

[4]     G. S. Nitesh and A. Kakkar, “Generations of Mobile Communication,” International Journal of Advanced Research in     Computer Science and Software Engineering, vol. 6, no. 3, pp. 320–324, 2016.

[5]     S. Atapoor, “Security for 4G and 5G Cellular Networks ,” Report for the Course Research Seminar in Cryptography (MTAT.07.022),  Institute of Computer Science, University of Tartu, 2018.

[6]     NIST. , “ADVANCED ENCRYPTION STANDARD ( AES ),” 2001. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.

[7]     M. Khan and V. Niemi, “AES and SNOW 3G are Feasible Choices for a 5G Phone From Energy Perspective,” Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 211. Springer, Cham, 2018.

[8]     J. Lu, O. Dunkelman, N. Keller, and J. Kim, “New Impossible Differential Attacks on AES,” In: INDOCRYPT'08. LNCS, vol. 5365, pp. 279-293. Springer (2008).

[9]     H. Mala, M. Dakhilalian, V. Rijmen, and M. Modarres-hashemi, “Improved Impossible Differential Cryptanalysis of 7-Round AES-128,” In: INDOCRYPT'10. LNCS, vol. 6498, pp. 282-291. Springer (2010).

[10]  C. Boura, V. Lallemand, M. Naya-Plasencia, and V. Suder, “Making the Impossible Possible.” Journal of Cryptology, Volume 31, Issue 1, pp. 101-133, January 2018.

[11]  J. Park and D. Lee, “FACE: Fast AES CTR mode Encryption Techniques based on the Reuse of Repetitive Data”, TCHES, vol. 2018, no. 3, pp. 469-499, Aug. 2018.

[12]  G. Orhanou, S. E. L. Hajji, Y. Bentaleb, and J. Laassiri, “EPS Confidentiality and Integrity mechanisms Algorithmic Approach,” International Journal of Computer Science Issues, vol. 7, no. 4, 2010.

[13]  Specification of 3GPP Confidentiality and Integrity Algorithms

UEA2 & UIA2; Doc.2: SNOW 3G specification, Tech. Specification TS 35.216 V12.0.0, 3GPP,  2014.

[14]  Specification of 3GPP Confidentiality and Integrity Algorithms       UEA2 & UIA2; Doc.1: UEA2 and UIA2 specifications, Technical Specification  TS 35.215 V12.0.0, 3GPP,  2014.

[15]  M. Madani, I. Benkhaddra, C. Tanougast, S. Chitroub, and L. Sieler, “Digital Implementation of an Improved LTE Stream Cipher Snow-3G Based on Hyperchaotic PRNG,” , Hindawi Security and Communication Networks, vol. 2017, 2017.

[16]  A. Biryukov, “Multiset collision attacks on reduced-round SNOW 3G and SNOW 3G,” LNCS 6123, pp. 139–153, 2010.

[17]  ETSI / SAGE, “Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3 . Document 1: 128-EEA3 and 128-EIA3 Specification,” pp. 1–16, 2011.

[18]  ETSI/SAGE, “Specification. Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. Document 2: ZUC Specification, ” Version: 1.6, pp. 1–18, 2011.

[19]  S. Lawange and M. Narnaware, “Review on LTE Cryptography Algorithm ZUC and its Attacks,” International Journal of Emerging Research in Management  &Technology, vol. 6, Issue 7, 2017.

[20]  F. Nilofer and J. Qaddour, “Comparative Study of Vulnerabilities in LTE Cryptographic Algorithm,” International Journal of Computer Applications, vol. 180, no. 25, pp. 19–25, 2018.

[21]  H. Wu, T. Huang, P. H. Nguyen, H. Wang, and S. Ling, “Differential Attacks Against Stream Cipher ZUC,” in Advances in Cryptology -- ASIACRYPT 2012, pp. 262–277, 2012.

[22]  M. Madani and C. Tanougast, “Combined and Robust SNOW-ZUC Algorithm Based on Chaotic System,” 2018 Int. Conf. Cyber Secur. Prot. Digit. Serv. (Cyber Secur.), pp. 1–7, 2018.