Architecture Design of an Area Efficient High Speed Crypto Processor for 4G LTE

被引:11
作者
Bikos, Anastasios N. [1 ]
Sklavos, Nicolas [1 ]
机构
[1] Univ Patras, Comp Engn & Informat Dept, Patras 26504, Achaia, Greece
关键词
4G LTE security; block and stream ciphers; mobile communication systems; mobile processors; network-level security and protection; standards; symmetric key cryptosystems; HARDWARE IMPLEMENTATION; STREAM CIPHERS; SECURITY; SYSTEM;
D O I
10.1109/TDSC.2016.2620437
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The whole security architecture of LTE/SAE (Long Term Evolution/System Architecture Evolution) is being consisted of four main hardware-oriented cryptographic algorithms: KASUMI block ciphers, SNOW-3G stream cipher, the MILENAGE algorithm set, and the 4G development of ZUC algorithm. This paper presents an FPGA deployment of a universal security architecture crypto processor for 4G LTE, consisting of both four ciphers enabling each one on demand, which is based on two novel design principles. One is a more intelligent implementation of the four algorithm's substitution boxes (S-boxes) based on a common intersection assumption of their contents. The second includes the use of a common data path hardware block deployed along the four cipher's architectural design. This universal security architecture crypto processor proves to reduce the area space at least 1.5 times, and also provides almost double throughput compared with the state-of-the-art realizations of the individual ciphers, something which is a high necessity when producing components for the demanding post-4G cellular market.
引用
收藏
页码:729 / 741
页数:13
相关论文
共 18 条
[1]  
3rd Generation Partnership Program, 2016, 1F8 3GPP
[2]  
3rd Generation Partnership Program, 2016, 35202 3GPP
[3]  
[Anonymous], 2006, SPEC 3GPP CONF INT A
[4]  
[Anonymous], 2016, SPEC 3GPP CONF INT A
[5]  
[Anonymous], 2000, SPEC EV MIL ALG SET
[6]  
[Anonymous], 2006, 2 3GPP
[7]  
Bikos A., 2014, P JOINT MEDIAN TURDE
[8]   LTE/SAE Security Issues on 4G Wireless Networks [J].
Bikos, Anastasios N. ;
Sklavos, Nicolas .
IEEE SECURITY & PRIVACY, 2013, 11 (02) :55-62
[9]  
Chaves R, 2015, IEEE INT SYMP CIRC S, P2009, DOI 10.1109/ISCAS.2015.7169070
[10]  
Hessel S., 2009, GLOBAL TELECOMMUNICA, P1