Comparative study of some symmetric ciphers in mobile systems
Nowadays, the use of mobile communication systems are growing increasingly across the world, huge sensitive information exchanging over these systems. The security problems of information confidentiality, authenticity, and integrity became a prime concern of issue for users and society. Symmetr...
| Main Authors: | , |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/40248/ http://irep.iium.edu.my/40248/1/40248.pdf |
| _version_ | 1848781919816253440 |
|---|---|
| author | Jassim, Khalid Fadhil Alshaikhli, Imad Fakhri Taha |
| author_facet | Jassim, Khalid Fadhil Alshaikhli, Imad Fakhri Taha |
| author_sort | Jassim, Khalid Fadhil |
| building | IIUM Repository |
| collection | Online Access |
| description | Nowadays, the use of mobile
communication systems are growing increasingly across
the world, huge sensitive information exchanging over
these systems. The security problems of information
confidentiality, authenticity, and integrity became a
prime concern of issue for users and society. Symmetric
cryptographic algorithms have been proposed to protect
the information of the senders and receivers through
mobile systems. There are various symmetric
cryptographic algorithms such as KASUMI cipher,
SNOW cipher, ZUC cipher, and AES cipher have been
developed for achieving secure mobile communication
systems. Some cryptanalysis techniques (e.g. Sandwich
Cryptanalysis Technique, Sliding Property Technique,
Differential Cryptanalysis Technique, and Biclique
Cryptanalysis Technique) can be used to attack these
symmetric ciphers, therefore there is a need for more
analysis studies to address the security problems of
these ciphers. This paper presents a comparative study
of these symmetric ciphers with focus on analysis of
their specifications, components, and some
cryptanalysis techniques over each other |
| first_indexed | 2025-11-14T15:57:13Z |
| format | Proceeding Paper |
| id | iium-40248 |
| institution | International Islamic University Malaysia |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-14T15:57:13Z |
| publishDate | 2014 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | iium-402482018-05-24T05:39:49Z http://irep.iium.edu.my/40248/ Comparative study of some symmetric ciphers in mobile systems Jassim, Khalid Fadhil Alshaikhli, Imad Fakhri Taha QA75 Electronic computers. Computer science Nowadays, the use of mobile communication systems are growing increasingly across the world, huge sensitive information exchanging over these systems. The security problems of information confidentiality, authenticity, and integrity became a prime concern of issue for users and society. Symmetric cryptographic algorithms have been proposed to protect the information of the senders and receivers through mobile systems. There are various symmetric cryptographic algorithms such as KASUMI cipher, SNOW cipher, ZUC cipher, and AES cipher have been developed for achieving secure mobile communication systems. Some cryptanalysis techniques (e.g. Sandwich Cryptanalysis Technique, Sliding Property Technique, Differential Cryptanalysis Technique, and Biclique Cryptanalysis Technique) can be used to attack these symmetric ciphers, therefore there is a need for more analysis studies to address the security problems of these ciphers. This paper presents a comparative study of these symmetric ciphers with focus on analysis of their specifications, components, and some cryptanalysis techniques over each other 2014-11-17 Proceeding Paper PeerReviewed application/pdf en http://irep.iium.edu.my/40248/1/40248.pdf Jassim, Khalid Fadhil and Alshaikhli, Imad Fakhri Taha (2014) Comparative study of some symmetric ciphers in mobile systems. In: 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M 2014), 17th-19th Nov. 2014, Kuching, Sarawak. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=7020587&queryText%3DComparative+study+of+some+symmetric+ciphers+in+mobile+systems |
| spellingShingle | QA75 Electronic computers. Computer science Jassim, Khalid Fadhil Alshaikhli, Imad Fakhri Taha Comparative study of some symmetric ciphers in mobile systems |
| title | Comparative study of some symmetric ciphers in mobile systems |
| title_full | Comparative study of some symmetric ciphers in mobile systems |
| title_fullStr | Comparative study of some symmetric ciphers in mobile systems |
| title_full_unstemmed | Comparative study of some symmetric ciphers in mobile systems |
| title_short | Comparative study of some symmetric ciphers in mobile systems |
| title_sort | comparative study of some symmetric ciphers in mobile systems |
| topic | QA75 Electronic computers. Computer science |
| url | http://irep.iium.edu.my/40248/ http://irep.iium.edu.my/40248/ http://irep.iium.edu.my/40248/1/40248.pdf |