Abstract
In the past two years, the demand for the use of mobile networks has increased, due to what the world has been exposed to in the face of the COVID-19 pan-demic and the lack of communication between people. People resorted to using of mobile networks in light of the pandemic, and their importance has appeared in several aspects, such as automotives, media and entertainment, and healthcare. This growing demand for the mobile network led to the actual development of the 4G network in terms of providing the speed of transmission and encryption data to maintain security. In this paper, a new member of the SNOW 3G family was proposed, which is one of the fourth generation algorithms called SNOW 3G-M, which has a higher encryption speed in line with the capacity of modern CPUs and is expected to be a move to the fifth generation communication system in the future. The SNOW 3G-M keystream passes all of the tests for long key stream data, short key stream data, and initialization vector data sets.
Highlights
The 3G and 4G communications technologies that are becoming mobile emigrations of online applications such as Voice over IP (VoIP), video streaming, music download files, mobile communication, and so on are the Universal Mobile Telecommunications System (UMTS), Long Term Evolution (LTE) and LTE advanced standards use stream encryption algorithm such as the snow algorithm, which is the heart of mobile standards’ security and is the one viewed as the seed of the 128-EEA1 confidentiality and 128-EIA1 integrity algorithms of 4G LTE security [5–8], which removes the f8 and f9 algorithms of UMTS security [9–11]
The third is the fault attack on the Linear Feedback Shift Register (LFSR) that retrieves the secret key with only 22 error injec-tions: The attack model suggests that an attacker can change a 32-bit value of one LFSR state all through keystream generation, where i is selected by an attacker, but he does not have complete control over t [15]
We developed SNOW3G to SNOW3G-M (M for multi-LFSR) with the use of two LFSRs (Linear Feedback Shift Registers) and a FSM (Finite State Machine) updated to best align with vectorized applications by increasing the total size to 64 bits for increased security by encrypting data
Summary
The security of communications has become an additional and important element at present to ensure the transmission of data over networks is secure [1, 2]. The third is the fault attack on the Linear Feedback Shift Register (LFSR) that retrieves the secret key with only 22 error injec-tions: The attack model suggests that an attacker can change a 32-bit value of one LFSR state all through keystream generation, where i is selected by an attacker, but he does not have complete control over t [15] Fourth, one such attack uses multiset collision attacks to investigate the SNOW3G resynchronization process. We developed SNOW3G to SNOW3G-M (M for multi-LFSR) with the use of two LFSRs (Linear Feedback Shift Registers) and a FSM (Finite State Machine) updated to best align with vectorized applications by increasing the total size to 64 bits for increased security by encrypting data. Given that the traditional SNOW 3G is vulnerable to shortened keystream data of set attacks [14], it is proposed to improve its statistical property and security level while maintaining the standard by overcoming its flaws in the initialization and keystream modes
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have