An Enriched Ciphering Method to Evaluate Performance of EEA2-algorithm for LTE Security
Keywords:networks, LTE, Security, Communications and Services
In order to address vulnerabilities in LTE security and the objective to strengthen the implementation of encryption and decryption algorithms in LTE, we proposed a method for integration of an algorithm with a dynamic matrix generation scheme of 16*16 elements during AES implementation. Implementing such algorithm eradicates the vulnerability that causes a hacker to access plain text. The vulnerability arises within the implementation of AES.
This research explores Enriched Ciphering algorithm for number of scenarios based on function calls and time metrics that increases 3.9 times when there is a change in size of the plain text. We evaluated the proposed algorithm referred to as Enriched Ciphering Algorithm based on various use cases, including compression and decompression of cipher text that provides an extra layer of complexity to strengthen the security, and provides performance improvements of 13.9 percent when executing the Enriched Ciphering algorithm with big data size.
"Lianfen Huang*, Ying Huang, Zhibin GAO, Jianan Lin, Xueyuan Jiang", Performance of Authentication Protocols in LTE Environments, 2009 International Conference on Computational Intelligence and Security, 293-297,978-0-7695-3931-7/09 © 2009 IEEE DOI 10.1109/CIS.2009.50.
"Bin Liu, IEEE, and Bevan M. Baas.", Parallel AES Encryption Engines for Many-Core Processor Arrays,"IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, and NO. 3 MARCH 2013", 536-547, www.computer.org/publications/dlib.
"Naga M. Kosaraju, Murali Varanasi, Saraju P. Mohanty", A High-Performance VLSI Architecture for Advanced Encryption Standard (AES) Algorithm, Proceedings of the 19th International Conference on VLSI Design (VLSID’06) ,1-4,1063-9667/06 © 2006 IEEE.
“Fei Shao, Zinan Chang, Yi Zhang", AES Encryption Algorithm Based on the High Performance Computing of GPU, 2010 Second International Conference on Communication Software and Networks,588-590,978-0-7695-3961-4/10 © 2010 IEEE DOI 10.1109/ICCSN.2010.124.
"Keisuke Iwai and Takakazu Kurokawa, Naoki Nisikawa", AES encryption implementation on CUDA GPU and its analysis, 2010 First International Conference on Networking and Computing, 209-214,978-0-7695-4277-5/10 © 2010 IEEE DOI 10.1109/IC-NC.2010.49.
“Scheme,Khodor Hamandi Imad Sarji Ali Chehab Imad H. Elhajj Ayman Kayssi”, Privacy Enhanced and Computationally Efficient HSK-AKA LTE, 2013 27th International Conference on Advanced Information Networking and Applications Workshops,929-934,978-0-7695-4952-1/13 © 2013 IEEE DOI 10.1109/WAINA.2013.133.
"Mehran Mozaffari-Kermani, and Arash Reyhani-Masoleh", Concurrent Structure-Independent Fault Detection Schemes for the Advanced Encryption Standard, "IEEE TRANSACTIONS ON COMPUTERS, VOL. 59, NO. 5, MAY 2010",608-622,0018-9340/10/ ©2010 IEEE.
“Amit Pande and Prasant Mohapatra”, Securing Multimedia Content Using Joint Compression and Encryption ,2013 Oct- Dec Published by the IEEE Computer Society,50-61,1070-986X/13/ c 2013 IEEE.
“Krzysztof Jankowski and Pierre Laurent”, Packed AES-GCM Algorithm Suitable for AES/PCLMULQDQ Instructions, "IEEE TRANSACTIONS ON COMPUTERS, VOL. 60, and NO. 1, JANUARY 2011", 135-138, 0018-9340/11/ 2011 IEEE Published by the IEEE Computer Society.
"Gautam Siwach, Amir Esmailpour ", LTE Security Potential Vulnerability and Algorithm Enhancements, 2014 IEEE Canadian Conference on Electrical and Computer Engineering, 1-7, IEEE CCECE May 2014.