Research Article

A Study on Scalar Multiplication Parallel Processing for X25519 Decryption of 5G Core Network SIDF Function for mMTC IoT Environment

Figure 2

ECIES encryption process on UE side: in the UE (USIM), the ECIES encryption process is performed. In this step, a 128-bit encryption key and a 128-bit mac key used to generate SUCI are generated. Thereafter, the MSIN, which is used in 4G subscriber identifier, is encrypted to generate SUCI.