Abstract

Security is the important when it comes to wireless communication, and as the expectations of people increased, the data service now arrived at LTE. The faster data access and communication with high priority security. ZUC is the algorithm adopted to provide security under third set of LTE i.e. EEA3 and EIA3. The algorithms are used for confidentiality and integrity protection over the air. To analyze the security level of the algorithm different attacks were published in literature. The aim of this paper is to discuss the working of ZUC algorithm in detail. Also different attacks are listed in the last section.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call