Intel corporation (20240113863). EFFICIENT IMPLEMENTATION OF ZUC AUTHENTICATION simplified abstract

From WikiPatents
Jump to navigation Jump to search

EFFICIENT IMPLEMENTATION OF ZUC AUTHENTICATION

Organization Name

intel corporation

Inventor(s)

Pablo De Lara Guarch of Shannon (IE)

Tomasz Kantecki of Ennis (IE)

Krystian Matusiewicz of Gdansk (PL)

Wajdi Feghali of Boston MA (US)

Vinodh Gopal of Westborough MA (US)

James D. Guilford of Northborough MA (US)

EFFICIENT IMPLEMENTATION OF ZUC AUTHENTICATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240113863 titled 'EFFICIENT IMPLEMENTATION OF ZUC AUTHENTICATION

Simplified Explanation

The abstract describes methods and apparatus for an efficient implementation of ZUC authentication, where a processor computes a tag update for an authentication operation by replacing a 'for' loop with a carry-less multiply operation.

  • ZUC authentication implementation:
 - Processor computes tag update for authentication operation
 - Based on stored data
 - Replaces 'for' loop with carry-less multiply operation

Potential Applications

The technology described in this patent application could be applied in various fields such as: - Cybersecurity - Mobile communication - Network authentication systems

Problems Solved

The innovation addresses the following issues: - Enhancing the efficiency of ZUC authentication - Improving security measures in authentication processes - Optimizing processor computations for authentication operations

Benefits

The benefits of this technology include: - Faster authentication processes - Reduced computational overhead - Enhanced security in authentication systems

Potential Commercial Applications

A potential commercial application for this technology could be in: - Mobile device security software - Network security solutions - Authentication service providers

Possible Prior Art

One possible prior art could be the traditional methods of ZUC authentication that may involve less efficient computational processes.

Unanswered Questions

How does this technology compare to existing ZUC authentication methods in terms of performance and security?

This article does not provide a direct comparison with existing ZUC authentication methods.

What are the potential limitations or drawbacks of implementing this carry-less multiply operation in ZUC authentication?

The article does not address any potential limitations or drawbacks of implementing the carry-less multiply operation in ZUC authentication.


Original Abstract Submitted

methods and apparatus relating to an efficient implementation of zuc authentication are described. in one embodiment, a processor computes a tag update, based at least in part on stored data, for an authentication operation. the tag update is computed by replacing a ‘for’ loop with a carry-less multiply operation. other embodiments are also claimed and disclosed.