18129814. EFFICIENT IMPLEMENTATION OF ZUC AUTHENTICATION simplified abstract (Intel Corporation)
Contents
EFFICIENT IMPLEMENTATION OF ZUC AUTHENTICATION
Organization Name
Inventor(s)
Pablo De Lara Guarch of Shannon (IE)
Krystian Matusiewicz of Gdansk (PL)
Wajdi Feghali of Boston MA (US)
Vinodh Gopal of Westborough MA (US)
James D. Guilford of Northborough MA (US)
EFFICIENT IMPLEMENTATION OF ZUC AUTHENTICATION - A simplified explanation of the abstract
This abstract first appeared for US patent application 18129814 titled 'EFFICIENT IMPLEMENTATION OF ZUC AUTHENTICATION
Simplified Explanation
Methods and apparatus for efficient ZUC authentication implementation
- Processor computes tag update for authentication operation based on stored data
- Tag update computed by replacing 'for' loop with carry-less multiply operation
---
- Potential Applications
This technology could be applied in various industries and systems where secure authentication is required, such as:
- Telecommunications
- Internet of Things (IoT) devices
- Network security
- Problems Solved
The technology addresses the following issues:
- Enhancing the efficiency of ZUC authentication implementation
- Improving security measures for authentication operations
- Benefits
The benefits of this technology include:
- Faster computation of tag updates
- Enhanced security for authentication processes
- Optimization of resources for authentication operations
- Potential Commercial Applications of ZUC Authentication Technology
A potential commercial application for this technology could be in:
- Secure communication systems
- Mobile devices
- Cloud computing services
- Possible Prior Art
One possible prior art for this technology could be the traditional methods of ZUC authentication implementation, which may involve less efficient computation processes.
---
- Unanswered Questions
- How does this technology compare to other authentication methods in terms of efficiency and security?
This article does not provide a direct comparison with other authentication methods, leaving room for further analysis and research.
- Are there any limitations or constraints in implementing this technology in different systems or environments?
The article does not address any potential limitations or constraints that may arise when implementing this technology in various systems or environments, which could be crucial for practical applications.
Original Abstract Submitted
Methods and apparatus relating to an efficient implementation of ZUC authentication are described. In one embodiment, a processor computes a tag update, based at least in part on stored data, for an authentication operation. The tag update is computed by replacing a ‘for’ loop with a carry-less multiply operation. Other embodiments are also claimed and disclosed.