Application of the UMAC algorithm on crypto-code structures in blockchain technologies
Keywords:blockchain technology, UMAC algorithm, hash-function, crypto-code construction, computational experiment, elliptic codes
A computational experiment is conducted on the possibility of using McElice crypto-code constructions with elliptic codes based on the UMAC algorithm to ensure the implementation of the basic rules of blockchain technology for the transfer of confidential information. The results of the calculations are analyzed, the conclusion is made on the practicality of the practical implementation of a quick hashing algorithm to increase the security level of the blockchain technology block chains
Regulation (EU) No 910/2014 of the european parliament and of the council on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC (2014). Official Journal of the European Union. Brussels, 73–114.
Bernstein, D. J., Buchmann, J., Dahmen, E. (2009). Post-Quantum Cryptography. Berlin-Heidleberg: Springer-Verlag, 245. doi: http://doi.org/10.1007/978-3-540-88702-7
Kuznetsov, А. А., Pushkarev, А. I., Svatovskiy, I. I., Shevtsov, А. V. (2016). Nesimmetrichnii kriptosistemy na algebraicheskikh kodakh dlya postkvantovogo perioda [Asymmetric cryptosystems on algebraic codes for the post-quantum period]. Radiotehnika, 186, 70–90.
Yevseiev, S., Kots, H., Minukhin, S., Korol, O., Kholodkova, A. (2017). The development of the method of multifactor authentication based on hybrid cryptocode constructions on defective codes. Eastern-European Journal of Enterprise Technologies, 5 (9 (89)), 19–35. doi: http://doi.org/10.15587/1729-4061.2017.109879
Havrylova, А., Yevseiev, S. (2019). Analiz stanu zakhyshchenosti blokchein-proektiv na rynku ukrainskykh servisiv [Security analysis of blockchain projects in the Ukrainian services market]. Intelektualni systemy ta informaciyni tekhnologii. Odessa, 62–64.
WHAT is a Merkle Tree and How Does it Affect Blockchain Technology References? Available at: https://selfkey.org/what-is-a-merkle-tree-and-how-does-it-affect-blockchain-technology Last accessed: 15.11.2017
Hryshchuk, R., Yevseiev, S., Shmatko, A. (2018). Construction methodology of information security system of banking information in automated banking systems. Vienna: Premier Publishing s. r. o., 284. doi: http://doi.org/10.29013/r.hryshchuk_s.yevseiev_a.shmatko.cmissbiabs.284.2018
Yevseiev, S., Korol, O., Havrylova, A. (2019). Development of authentication codes of messages on the basis of UMAC with crypto-code McEliece’s scheme on elliptical codes. Information protection and information systems security. Lviv: Lviv Polytechnic Publishing House, 86–87.
Havrylova, A., Korol, O., Yevseiev, S. (2019). Development of authentication codes of messages on the basis of UMAC with crypto-code McEliece’s scheme. International Journal of 3D printing technologies and digital industry, 3 (2), 153–170.
Korol, O., Havrylova, A., Yevseiev, S. (2019). Practical UMAC algorithms based on crypto code designs. Przetwarzanie, transmisja i bezpieczenstwo informacji. Vol. 2. Bielsko-Biala: Wydawnictwo naukowe Akademii Techniczno-Humanistycznej w Bielsku-Bialej, 221–232.
Copyright (c) 2019 Alla Havrylova
This work is licensed under a Creative Commons Attribution 4.0 International License.
Our journal abides by the CREATIVE COMMONS copyright rights and permissions for open access journals.
Authors, who are published in this journal, agree to the following conditions:
1. The authors reserve the right to authorship of the work and pass the first publication right of this work to the journal under the terms of a Creative Commons Attribution License, which allows others to freely distribute the published research with the obligatory reference to the authors of the original work and the first publication of the work in this journal.
2. The authors have the right to conclude separate supplement agreements that relate to non-exclusive work distribution in the form in which it has been published by the journal (for example, to upload the work to the online storage of the journal or publish it as part of a monograph), provided that the reference to the first publication of the work in this journal is included.