18129814. EFFICIENT IMPLEMENTATION OF ZUC AUTHENTICATION simplified abstract (Intel Corporation)

From WikiPatents
Jump to navigation Jump to search

EFFICIENT IMPLEMENTATION OF ZUC AUTHENTICATION

Organization Name

Intel Corporation

Inventor(s)

Pablo De Lara Guarch of Shannon (IE)

Tomasz Kantecki of Ennis (IE)

Krystian Matusiewicz of Gdansk (PL)

Wajdi Feghali of Boston MA (US)

Vinodh Gopal of Westborough MA (US)

James D. Guilford of Northborough MA (US)

EFFICIENT IMPLEMENTATION OF ZUC AUTHENTICATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 18129814 titled 'EFFICIENT IMPLEMENTATION OF ZUC AUTHENTICATION

Simplified Explanation

Methods and apparatus for efficient ZUC authentication implementation

  • Processor computes tag update for authentication operation based on stored data
  • Tag update computed by replacing 'for' loop with carry-less multiply operation

---

      1. Potential Applications

This technology could be applied in various industries and systems where secure authentication is required, such as:

  • Telecommunications
  • Internet of Things (IoT) devices
  • Network security
      1. Problems Solved

The technology addresses the following issues:

  • Enhancing the efficiency of ZUC authentication implementation
  • Improving security measures for authentication operations
      1. Benefits

The benefits of this technology include:

  • Faster computation of tag updates
  • Enhanced security for authentication processes
  • Optimization of resources for authentication operations
      1. Potential Commercial Applications of ZUC Authentication Technology

A potential commercial application for this technology could be in:

  • Secure communication systems
  • Mobile devices
  • Cloud computing services
      1. Possible Prior Art

One possible prior art for this technology could be the traditional methods of ZUC authentication implementation, which may involve less efficient computation processes.

---

      1. Unanswered Questions
        1. How does this technology compare to other authentication methods in terms of efficiency and security?

This article does not provide a direct comparison with other authentication methods, leaving room for further analysis and research.

        1. Are there any limitations or constraints in implementing this technology in different systems or environments?

The article does not address any potential limitations or constraints that may arise when implementing this technology in various systems or environments, which could be crucial for practical applications.


Original Abstract Submitted

Methods and apparatus relating to an efficient implementation of ZUC authentication are described. In one embodiment, a processor computes a tag update, based at least in part on stored data, for an authentication operation. The tag update is computed by replacing a ‘for’ loop with a carry-less multiply operation. Other embodiments are also claimed and disclosed.