An Enriched Ciphering Method to Evaluate Performance of EEA2-algorithm for LTE Security

Authors

  • Gautam Siwach University of New Haven, Pennsylvania state university, Yale University, Massachusetts Institute of Technology.
  • Amir Esmailpour University of New Haven

DOI:

https://doi.org/10.14738/tnc.32.1092

Keywords:

networks, LTE, Security, Communications and Services

Abstract

In order to address vulnerabilities in LTE security and the objective to strengthen the implementation of encryption and decryption algorithms in LTE, we proposed a method for integration of an algorithm with a dynamic matrix generation scheme of 16*16 elements during AES implementation. Implementing such algorithm eradicates the vulnerability that causes a hacker to access plain text. The vulnerability arises within the implementation of AES.

This research explores Enriched Ciphering algorithm for number of scenarios based on function calls and time metrics that increases 3.9 times when there is a change in size of the plain text. We evaluated the proposed algorithm referred to as Enriched Ciphering Algorithm based on various use cases, including compression and decompression of cipher text that provides an extra layer of complexity to strengthen the security, and provides performance improvements of 13.9 percent when executing the Enriched Ciphering algorithm with big data size. 

Author Biographies

Gautam Siwach, University of New Haven, Pennsylvania state university, Yale University, Massachusetts Institute of Technology.

Gautam Siwach is an active researcher, and works as a Senior Technology personal at Forbes’s listed top 10 companies that give the most difficult Job interview above Google, Microsoft and Facebook.

He is listed as alumni of Pennsylvania state university, Yale University, Massachusetts Institute of Technology, and University of New Haven. 

Gautam Siwach has published several research papers and is an author, Chair, Presenter at IEEE and ASEE - United States of America, Canada conferences. He has received various Quality and Performance awards from Accenture and scholarships during his Academic and Professional career. 

http://en.wikipedia.org/wiki/Big_data

Amir Esmailpour, University of New Haven

Dr. Amir Esmailpour is an assistant professor in the department of Electrical and Computer Engineering and Computer Science (ECECS) at the University of New Haven (UNH), where he teaches computer and networking courses, while conducting research on the 4th Generation (4G) of wireless networks such as Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX).

Before coming to the UNH, Dr. Esmailpour was a postdoctoral fellow at the Department of Electrical and Computer Engineering (ECE) at the University of Toronto, Canada. He received his PhD from the faculty of Engineering and Computer Science at the University of Guelph, Canada, and his Master's and Bachelor's degrees from Ryerson University, Toronto, and University of Ottawa, Ottawa, respectively, both located in Canada.  Dr. Esmailpour has several years of experience in research and teaching at universities across Canada and the U.S. Prior to returning to academic work, he also had several years of experience in industry, working for companies such as Nortel Networks and Daimler Chrysler.

Dr. Esmailpour has published several papers in reputable publications such as IEEE journals, magazines, and conferences. He has also reviewed more than 100 papers in the same journals and conferences. He has received several Canadian national, provincial and industrial awards and scholarships during his academic and professional careers, such as a grant from Canada's prestigious NSERC. In addition to his university education, he also holds several industrial certifications such as Microsoft Corporation, Cisco Systems, and Nortel Networks certifications.

Dr. Esmailpour's research interests include various areas of networking and wireless communication, such as next generation of wireless networks, LTE, WiMAX radio resource management, quality of service, and routing. He also has strong industrial affiliations with companies such as Ericsson, Cisco, and RIM.

References

"Lianfen Huang*, Ying Huang, Zhibin GAO, Jianan Lin, Xueyuan Jiang", Performance of Authentication Protocols in LTE Environments, 2009 International Conference on Computational Intelligence and Security, 293-297,978-0-7695-3931-7/09 © 2009 IEEE DOI 10.1109/CIS.2009.50.

"Bin Liu, IEEE, and Bevan M. Baas.", Parallel AES Encryption Engines for Many-Core Processor Arrays,"IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, and NO. 3 MARCH 2013", 536-547, www.computer.org/publications/dlib.

"Naga M. Kosaraju, Murali Varanasi, Saraju P. Mohanty", A High-Performance VLSI Architecture for Advanced Encryption Standard (AES) Algorithm, Proceedings of the 19th International Conference on VLSI Design (VLSID’06) ,1-4,1063-9667/06 © 2006 IEEE.

“Fei Shao, Zinan Chang, Yi Zhang", AES Encryption Algorithm Based on the High Performance Computing of GPU, 2010 Second International Conference on Communication Software and Networks,588-590,978-0-7695-3961-4/10 © 2010 IEEE DOI 10.1109/ICCSN.2010.124.

"Keisuke Iwai and Takakazu Kurokawa, Naoki Nisikawa", AES encryption implementation on CUDA GPU and its analysis, 2010 First International Conference on Networking and Computing, 209-214,978-0-7695-4277-5/10 © 2010 IEEE DOI 10.1109/IC-NC.2010.49.

“Scheme,Khodor Hamandi Imad Sarji Ali Chehab Imad H. Elhajj Ayman Kayssi”, Privacy Enhanced and Computationally Efficient HSK-AKA LTE, 2013 27th International Conference on Advanced Information Networking and Applications Workshops,929-934,978-0-7695-4952-1/13 © 2013 IEEE DOI 10.1109/WAINA.2013.133.

"Mehran Mozaffari-Kermani, and Arash Reyhani-Masoleh", Concurrent Structure-Independent Fault Detection Schemes for the Advanced Encryption Standard, "IEEE TRANSACTIONS ON COMPUTERS, VOL. 59, NO. 5, MAY 2010",608-622,0018-9340/10/ ©2010 IEEE.

“Amit Pande and Prasant Mohapatra”, Securing Multimedia Content Using Joint Compression and Encryption ,2013 Oct- Dec Published by the IEEE Computer Society,50-61,1070-986X/13/ c 2013 IEEE.

“Krzysztof Jankowski and Pierre Laurent”, Packed AES-GCM Algorithm Suitable for AES/PCLMULQDQ Instructions, "IEEE TRANSACTIONS ON COMPUTERS, VOL. 60, and NO. 1, JANUARY 2011", 135-138, 0018-9340/11/ 2011 IEEE Published by the IEEE Computer Society.

"Gautam Siwach, Amir Esmailpour ", LTE Security Potential Vulnerability and Algorithm Enhancements, 2014 IEEE Canadian Conference on Electrical and Computer Engineering, 1-7, IEEE CCECE May 2014.

Downloads

Published

2015-05-02

How to Cite

Siwach, G., & Esmailpour, A. (2015). An Enriched Ciphering Method to Evaluate Performance of EEA2-algorithm for LTE Security. Discoveries in Agriculture and Food Sciences, 3(2), 77. https://doi.org/10.14738/tnc.32.1092