Advanced algorithm UMAC based modular transformations

Authors

DOI:

https://doi.org/10.15587/1729-4061.2014.20130

Keywords:

control codes of data integrity and authenticity, modular transformations, universal classes of hash functions

Abstract

Using modular transformations allows to implement provably secure information hashing, which satisfies the collisional properties of universal hash functions. At the same time, universal hashing using modular transformations has a significant drawback - the high computational complexity of the hash code formation. In fact, it is necessary to perform modular exponentiation for each data block that significantly increases information sequence hashing time under appropriate orders of transformation module. In this regard, the development of multilayer schemes of universal hashing using modular transformations on the last and final stage of the hash code formation is a promising direction.

The selection of cycle functions in the scheme of provably secure key universal hashing is substantiated, the model and method for forming control codes of data integrity and authenticity, based on modular transformations, the algorithm for reducing the computational complexity of hashing schemes implementation using cyclic functions, are proposed in the paper. The developed advanced algorithm UMAC provides the required indicators of collisional properties of universal hashing, provable security level and high indicators of the hash code formation speed

Author Biographies

Сергей Петрович Евсеев, Simon Kuznets Kharkiv National University of Economics pr. Lenina 9a, Kharkov, Ukraine, 61166

Ph.D., Associate Professor

Information Systems Department

Ольга Григорьевна Король, Simon Kuznets Kharkiv National University of Economics pr. Lenina 9a, Kharkov, Ukraine, 61166

Lecturer

Information Systems Department

Виталий Вячеславович Огурцов, Simon Kuznets Kharkiv National University of Economics pr. Lenina 9a, Kharkov, Ukraine, 61166

Ph.D., Associate Professor

Information Systems Department

References

  1. Stinson, D. R. Some constructions and bounds for authentication codes [Text] / D. R. Stinson // J. Cryptology. – 1988. – № 1. – Р. 37–51.
  2. Stinson, D. R. The combinatorics of authentication and secrecy codes [Text] / D. R. Stinson // J. Cryptology. – 1990. – № 2. – Р. 23–49.
  3. Кузнецов, А. А. Исследование коллизионных свойств кодов аутентификации сообщений UMAC // А. А. Кузнецов, О. Г. Король, С. П. Евсеев. Прикладная радиоэлектроника. – Харьков: Изд-во ХНУРЭ, 2012. – Т. 11 № 2. – С. 171-183.
  4. Король, О. Г. Разработка модели и метода каскадного формирования МАС с использованием модулярных преобразований // О. Г. Король, С. П. Евсеев, Л. Т. Пархуць / Захист інформації: науково-технічний журнал. – 2013. – Т. 15, № 3. – С. 186 – 196.
  5. Maitra, S. Further constructions of resilient Boolean functions with very high nonlinearity [Text] / S. Maitra, E. Pasalic // Accepted in SETA. – May, 2001.
  6. Кузнецов, О. О. Захист інформації в інформаційних системах / О. О. Кузнецов, С. П. Євсеєв, О .Г. Король. – Х.: Вид. ХНЕУ, 2011. – 504 с.
  7. . Final report of European project number IST-1999-12324, named New European Schemes for Signatures, Integrity, and Encryption, April 19, 2004 – Version 0.15 (beta), Springer-Verlag.
  8. Столлингс, В. Криптография и защита сетей: принципы и практика, 2-е изд. : пер. с англ. – М. : издательский дом «Вильям», 2001. – 672 с.
  9. Король, О. Г. Исследование методов обеспечения аутентичности и целостности данных на основе односторонних хеш-функций // О. Г. Король, С. П. Евсеев. Науково-технічний журнал «Захист інформації». Спецвипуск (40). – 2008. – С. 50 – 55.
  10. Ищейнов, В. Я. Модель безопасности конфиденциальной информации в информационной системе / В. Я. Ищейнов, С. М. Чудинов // Научные ведомости БелГУ.– Изд-во НИУ «БелГУ», 2012. – Выпуск 23/1. – № 13(132). – С. 205 – 210.
  11. Stinson, D. R. (1988). Some constructions and bounds for authentication codes. J. Cryptology, 1, 37-51.
  12. Stinson, D. R. (1990). The combinatorics of authentication and secrecy codes. J. Cryptology, 2, 23-49.
  13. Kuznetsov, A. A., Korol, O. G., Evseev, S. P. (2012). Investigation of properties of conflict message authentication codes UMAC. Applied
  14. electronics. Kharkov: Publishing house KNURE, Vol. 11, № 2, 171-183.
  15. Korol, O. G., Evseev, S. P., Parhuts, L.T. (2013). Development of a model and a method of forming a cascade MSS using modular transformations. Zahist іnformatsії Naukova - tehnіchny magazine, Vol. 15, 3, 186 – 196.
  16. Maitra, S., Pasalic, E. (2001). Further constructions of resilient Boolean functions with very high nonlinearity. Accepted in SETA.
  17. Kuznetsov, O. O., Korol, O. G., Evseev, S. P. (2011). Zahist іnformatsії in іnformatsіynih systems. H. : Species . HNEU, 504.
  18. Final report of European project number IST- 1999 - 12324 , named New European Schemes for Signatures, Integrity, and Encryption, April 19, 2004 - Version 0.15 (beta), Springer-Verlag.
  19. Stallings, W. (2001). Cryptography and network security: Principles and Practice, 2nd ed.: Lane. from English. Moscow: Publishing House “William“, 672.
  20. Korol, O. G., Evseev, S. P. (2008). Investigation of methods to ensure the authenticity and integrity of the data based on one-way hash functions. Naukovyi - tehnіchny magazine” Zahist іnformatsії.” Special Issue (40), 50 - 55.
  21. Ischeynov, V. Y., Chudinov, S. (2012). Model security of confidential information in the information system. Scientific statements BSU. - Publ NIU “ BSU“, Issue 23/1, 13 (132), 205 – 210.

Published

2014-02-05

How to Cite

Евсеев, С. П., Король, О. Г., & Огурцов, В. В. (2014). Advanced algorithm UMAC based modular transformations. Eastern-European Journal of Enterprise Technologies, 1(9(67), 16–23. https://doi.org/10.15587/1729-4061.2014.20130

Issue

Section

Information and controlling system