Data Transmission With Security Enhanced Algorithms For 4G/5G Networks
Data Transmission With Security Enhanced Algorithms For 4G/5G Networks
153.6
153.
50-70
50- User identity secrecy, user location
1xRTT 6 70 confidentiality, and user
Kbps Kbps
Kbps Kbps untraceability are all protected.
300- 50-
EVDO 2.458 153 Lawful interception: Law
C 500 70
Rev 0 Mbps Kbps enforcement agencies will be able
D Kbps Kbps
to monitor and intercept all calls in
M 300
1.8 450 – compliance with national
A EVDO 3.072 – legislation.
Mbp 800
Rev A Mbps 400
s Kbps 3. Security visibility, configurability and
Kbps
5.4 scalability:
EVDO 14.475
Rev B Mbps
Mbp N/A N/A Security aspects of the visited
s network are transparent to the user.
20-
114 114 20-40 When a user roams outside of HE,
GPRS 40
Kbps Kbps Kbps they must be able to negotiate an
Kbps
appropriate security lever with the
100- 100-
474 474 visited network (home
EDGE 120 120
Kbps Kbps environment)
Kbps Kbps
G 2.30 The security mechanism's
200- scalability to support a rise in the
S W- 2.688 4 100
250 number of users and/or network
M CDMA Mbps Mbp Kbps
Kbps elements.
s
800- 260-
14.4 384
HSDPA 900 280 Minimum Cryptography Recommendations
Mbps Kbps
Kbps Kbps Table 2 lists recommended algorithms that satisfy
5.7 minimum security requirements for technology [38].
14.4
HSUPA Mbp N/A N/A
Mbps
s
2–5 2–5
5–12 5–12
LTE - Mbp Mbp
Mbps Mbps
s s
Table 2 Cryptography Recommendations
Operation Recommended
Minimum Security
Algorithms Table 3 explains each available cryptographic
Encryption AES-128-CBC mode
algorithm, the operations it supports. From the table
Public-key RSA-2048 we can conclude that AES is the alternative for most
encryption of the available algorithms.
Authentication RSA-2048, DSA-2048
Integrity SHA-256
IV METHODOLOGY
File: “plaintext.txt” Size: 82 bytes (656 bits), Key: “feistel aes key enhanced aes key”
Channel: AWGN (1.no noise, 2.noise 7.5db), with noise (7.5 db) : Integrity rejection
Table 5-2 AES algorithm and its variants based on Run time and throughput (text file)
Sr. Block No of Time Throughput
Algorithm
No size blocks encryption decryption encryption decryption
1 AES 128 6 0.0024116 0.0029766 272.018 220.385
2 AES dynamic S-box 128 6 0.002466 0.0021623 266.017 303.38
3 Round struct (1 R) 256 3 0.0025691 0.004497 255.342 145.875
4 Round struct with dyn S-box (1 R) 256 3 0.0033981 0.005759 193.049 113.908
5 Round struct (5 R) 256 3 0.0058878 0.00677 111.416 97.113
6 Round struct with dyn S-box (5R ) 256 3 0.007983 0.009715 82.174 67.524
File: “plaintext.txt”, Size: 82 bytes (656 bits), Key: “feistel aes key enhanced aes key”
Channel: AWGN (1.no noise, 2noise 7.5 db), with noise (7.5 db): Integrity rejection
Table 5-3 The AES algorithm, as well as various variations based on CPU and memory usage (text file)
Sr. CPU usage (in %) Memory (Bytes)
Algorithm
no. Encryption Decryption Encryption Decryption
1 AES 7.5 11 409.7 409.1
2 AES dynamic S-box 13 7 429.7 429.45
3 Round struct (1 R) 13 12.5 373.3 373.32
Round struct with dyn S-box
4 8.5 12 409.6 409.5
(1 R)
5 Round struct (5 R) 7.5 12 349.6 358.55
Round struct with dyn S-box
6 11 8 402.75 405.5
(5R )
7 Round struct (10 R) 9.5 6.25 341.9 355.2
Round struct with dyn S-box
8 12 7 420.1 420.35
(10 R)
(a) (b)
Fig. 5 Graph for the comparison of AES algorithm, as well as various variations based on (a) CPU usage and (b)
memory usage for Text file
iii) AES In Round Structure with dynamic key dependent S-box
II) Model 2 AES Algorithm with Dynamic, Random S-Box and RC4
Fig. 6 AES with Dynamic Radom S-box and RC4 Fig. 7 AES in Round structure with Dynamic Radom
S-box and RC4
Results and Discussion
The AES algorithm, as well as various variations in round structure with Dynamic Radom S-Box and RC4
based on Run Time and Throughput
1. For text file:
a) File: “plaintext.txt” Size: 144 bytes (1552 bits) Key: 12345678901234561234567890123456
The computer configurations: Microsoft Windows 8, Intel i3, 64 bit, 6 GB RAM
Table 5-6 AES algorithm, as well as various variations based on Run time and throughput (text file)
Bloc Throughput
Sr. No of encryption decryption
Algorithm k decrypt
No blocks time time encryption
size ion
1 AES 128 12 0.02887 0.033899 53.758 45.783
2 Enhanced AES 128 12 0.02951 0.0354 52.592 43.871
3 Round Struct(1R) 256 6 0.0167 0.01784. 92.934 86.995
Round structure
4 with Enhanced 256 6 0.017225 0.01901 90.101 81.641
AES(1R)
5 Round Struct(5R) 256 6 0.066 0.07916 23.515 19.605
Round structure
6 with Enhanced AES 256 6 0.075342 0.08786 20.599 17.664
(5R)
7 Rround Struct(10R) 256 6 0.1376 0.1662 11.279 9.38
Round structure
8 with Enhanced AES 256 6 0.13405 0.1656 11.577 9.371
(10R)
Table 5-6 shows that (1) Traditional AES is 2.0% faster than enhanced AES. (2) AES round structure is (1R) 42% faster
than traditional AES. (3) Enhanced round structure (1R) is 40.34% faster than traditional AES.
Sr Throughput
. Block No of encryption decryption
Algorithm
N size blocks time time
encryption decryption
o
1 AES 128 12 0.013449 0.015884 115.39891 97.708385
Table 5-7 shows the comparison of AES algorithm, as well as various variations based on throughput and runtime, It
concludes that (1) Traditional AES is 1.1% faster than enhanced AES. (2) AES round structure (1R) is 41% faster
than traditional AES. (3) Enhanced round structure (1R) is 38.70% faster than traditional AES.
(a)
(a)
(b)
Fig. 8 The x-axis is the number of the algorithm,
the y-axis is the runtime in seconds given in figure 11 (a),
and the throughput in kb/sec is indicated in figure 11 (b).
Graph comparing the AES method and its variants for
text files on i3 based on (a) runtime and (b) throughput.
Because there is little difference in the runtime
(b)
and throughput of AES and extended AES algorithms
Fig. 9 Graph for the comparison of AES algorithm
in the figure, AES can be substituted with enhanced AES.
and its various variations based on (a) runtime and (b)
throughput for text file on i7. Figure 9 (a) and (b) 5G as a future technology
show that there is not much variation in the runtime
and throughput of AES and enhanced AES algorithm The architecture of 5G is TCP/IP based, thus, it
hence AES can be substituted with enhanced AES. enables the radio network to use the same nanocore
for all its usage throughout the network. It will
VI CONCLUSION identify the devices operating within its range using
Various models for performance evaluation of certain specified pre-defined symbols. Normal IP
specified symmetric encryption algorithms are addressing which is generally used is avoided which
established in this work. Making the S-box dynamic is one of the benefits. The added element in network
in the first technique creates further confusion, while architecture is that of 5G nanocore. It uses
the Round structure adds to the system's complexity. nanotechnology and cloud computing. The
Traditional AES is enhanced in the second way by architecture is entirely IP based as in the case of 4G
making S-box creation dynamic and random using systems. It will include both the internet resources as
RC4, and enhanced AES is also employed in a round well as centralized servers at the same time. Thus,
structure. The following metrics were used to assess subscribers can use their application and their files
performance: Avalanche Effect, Throughput, CPU without any requirement of installation of any other
Usage, Encryption and Decryption Time. software. It will provide such a large capacity that
Performance is kept close to typical AES, according many users can accommodated at the same time. It is
to the evaluation. mainly developed for IPv6 as the IP addresses are
getting depleted. It was each machine has its own
The results obtained for AES with dynamic S-BOX unique IPAddress.5G operations will has more larger
are more ideal, and round structure with Dynamic S capacity due to which more users can be
box appears to be faster, according to a comparison of accommodated
several approaches. High data transmission rates are
required for 3G and 4G, and the system encrypts the CURRENT STATUS OF 5G.
data in a reasonable amount of time. The greatest data Telecom companies such as Nokia,
rate reported is roughly 4 Mbps, which is LTE Ericsson, Alcatel-Lucent , NTT DoCoMo,
network compatible. However, the system must still NEC, Samsung , Huawei and Fujitsu are
reach a data rate that is consistent with 4G networks. driving bulk of the 5G-related innovations.