Encryption techniques in 4G and 5G network
a) Encryption techniques in 4G network
1. AES (Advanced Encryption Standard)
Advanced Encryption Standard (AES) is a highly trusted encryption algorithm used to secure data by converting it into an unreadable format without the proper key. Developed by the National Institute of Standards and Technology (NIST), AES encryption uses various key lengths (128, 192, or 256 bits) to protect against unauthorized access. This data security measure is efficient and widely implemented in securing internet communication, protecting sensitive data, and encrypting files. AES, a cornerstone of modern cryptography, is recognized globally for its ability to keep information safe from cyber threats. AES is a symmetric encryption algorithm used in 4G LTE to encrypt user data. It typically operates in modes like CBC (Cipher Block Chaining) to enhance security.
2. SNOW 3G
SNOW 3G is a stream cipher algorithm that was conceived and chosen in 2006 as the heart of the second set of UMTS confidentiality and integrity algorithms. It has been kept as the engine of the first set of 4G LTE cryptographic algorithms as well.
3. ZUC (Zhongyuan Unicom Cipher)
Is a stream cipher included in the Long Term Evolution standards used in 3GPP specifications for confidentiality and integrity? It is named after Zu Chongzhi, the fifth-century Chinese mathematician. It uses a 16-stage linear feedback shift register and produces a 32-bit word on each tick
4. RADIO LINK ENCRYPTION
In 4G LTE networks, radio link encryption is crucial for securing data transmitted between user devices and the network. Protects data transmitted over the radio link between the user equipment (UE) and the base station (BS).
5. Signaling Encryption
In 4G LTE networks, signaling encryption is essential for securing the control messages exchanged between the user equipment (UE) and the network. Here are some key aspects of signaling encryption in 4G. Before being transmitted over the Air interface (Uu) each packet is encrypted to prevent eavesdropping.
6. User Plane Encryption
In 4G LTE networks, user-plane encryption is essential for securing the data transmitted between user devices and the network. LTE has a security feature for the user plane by encrypting data/voice between the UE and eNodeB. Encryption is executed at the IP layer by utilizing IPsec-based tunnels between AGW and eNodeB, but due to performance and efficiency, no integrity protection is offered for the user plane.
7. Security Architecture Evolution (SAE)
The security architecture of 4G LTE networks has evolved significantly to address the increasing data security and privacy demands. Advancements such as Enhanced encryption, integrity protection, mutual authentication, key management, and security gateway have made the 4G network more resilient against various cyber threats, ensuring secure and reliable communication for users.
b). ENCRYPTION TECHNIQUES IN 5G NETWORK
1. AES (Advanced Encryption Standard)
Similar to 4G, AES is widely used in 5G for encrypting user data. It provides strong security and is often used in a 128-bit or 256-bit configuration. Features such as data confidentiality, mode of operation, performance, efficiency, and end-to-end security make AES a cornerstone of 5G security, helping to protect data integrity, confidentiality, and authenticity across the network.
2. Network Slice Security
Enhancing software-defined network segmentation, known as network slicing, has been among the key selling points of 5G as it has been defined since Release 15. It enables operators to create custom flexible networks with distinct capabilities for various services or to serve classes of users with particular service needs. But on the other hand, the concept of network slicing brings in new security design challenges as well. On the one hand, it is important to remember that all 5G network slices irrespective of the application will share network resources and a common infrastructure. On the other hand, there are new security issues, for example, user privacy issues and control security needs imposed by verticals have to be satisfied.
3. Galois/Counter Mode (GCM)
This mode of operation can be called encryption together with protection of integrity and is used in 5G for sending encrypted signals while protecting both ensuring confidentiality and integrity of the data. Makes it possible to purely rely on communications.
4 NR (New Radio) Security Procedures
5G incorporates new security procedures tailored for the NR interface, including enhanced encryption algorithms that can adapt based on the context and user needs.
5 Service-Based Architecture (SBA)
In 5G, the SBA model introduces a more modular approach to network functions, allowing for flexible encryption methods to secure service interfaces and data flows.
6. Key Derivation Functions
5G networks use enhanced key derivation techniques to generate session keys dynamically. This ensures that keys are unique for each session and reduces the risk of key compromise.
7. Integrity Protection Algorithms
In addition to encryption, 5G uses algorithms for integrity protection, ensuring that the data has not been tampered with during transmission.
8. Post-Quantum Cryptography
While not universally implemented yet, discussions around post-quantum cryptography are gaining traction in 5G to prepare for future threats posed by quantum computing. 5G standards are also evolving to include post-quantum cryptographic algorithms to future-proof the network against quantum attacks.
9 Enhanced User Privacy Features
5G includes improvements in user privacy, such as mechanisms to protect user identities and prevent tracking.
10. Identity-Based Encryption (IBE)
Identity-based encryption (IBE) is a promising technique for enhancing security in 5G networks, particularly for protecting user identities. These applications of IBE in 5G networks significantly enhance the privacy and security of user identities, making it harder for attackers to track or intercept sensitive information.

0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home