{"title":"两个KASUMI组件用于A5/3算法的最佳实现","authors":"Mahdi Madani, S. Chitroub, C. Tanougast","doi":"10.1109/CIRSYSSIM.2017.8023195","DOIUrl":null,"url":null,"abstract":"The mobile phone is widely used in our daily lives, and thus the need for securing communications and data has become essential. For that purpose, cryptography was used to provide security services for the subscribers of mobile phones. The series of the encryption algorithms of A5/x is used to ensure the confidentiality of conversations on mobile phones in most countries that used the GSM network. In this paper, we propose a new hardware implementation of A5/3 algorithm by using two KASUMI components. The purpose is to provide a better efficiency, in terms of computation time and of safety as well, for the algorithm A5/3.","PeriodicalId":342041,"journal":{"name":"2017 International Conference on Circuits, System and Simulation (ICCSS)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Two KASUMI components for an optimal implementation of the A5/3 algorithm\",\"authors\":\"Mahdi Madani, S. Chitroub, C. Tanougast\",\"doi\":\"10.1109/CIRSYSSIM.2017.8023195\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The mobile phone is widely used in our daily lives, and thus the need for securing communications and data has become essential. For that purpose, cryptography was used to provide security services for the subscribers of mobile phones. The series of the encryption algorithms of A5/x is used to ensure the confidentiality of conversations on mobile phones in most countries that used the GSM network. In this paper, we propose a new hardware implementation of A5/3 algorithm by using two KASUMI components. The purpose is to provide a better efficiency, in terms of computation time and of safety as well, for the algorithm A5/3.\",\"PeriodicalId\":342041,\"journal\":{\"name\":\"2017 International Conference on Circuits, System and Simulation (ICCSS)\",\"volume\":\"85 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Circuits, System and Simulation (ICCSS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIRSYSSIM.2017.8023195\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Circuits, System and Simulation (ICCSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIRSYSSIM.2017.8023195","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Two KASUMI components for an optimal implementation of the A5/3 algorithm
The mobile phone is widely used in our daily lives, and thus the need for securing communications and data has become essential. For that purpose, cryptography was used to provide security services for the subscribers of mobile phones. The series of the encryption algorithms of A5/x is used to ensure the confidentiality of conversations on mobile phones in most countries that used the GSM network. In this paper, we propose a new hardware implementation of A5/3 algorithm by using two KASUMI components. The purpose is to provide a better efficiency, in terms of computation time and of safety as well, for the algorithm A5/3.