Advanced algorithm UMAC based modular transformations
DOI:
https://doi.org/10.15587/1729-4061.2014.20130Keywords:
control codes of data integrity and authenticity, modular transformations, universal classes of hash functionsAbstract
Using modular transformations allows to implement provably secure information hashing, which satisfies the collisional properties of universal hash functions. At the same time, universal hashing using modular transformations has a significant drawback - the high computational complexity of the hash code formation. In fact, it is necessary to perform modular exponentiation for each data block that significantly increases information sequence hashing time under appropriate orders of transformation module. In this regard, the development of multilayer schemes of universal hashing using modular transformations on the last and final stage of the hash code formation is a promising direction.
The selection of cycle functions in the scheme of provably secure key universal hashing is substantiated, the model and method for forming control codes of data integrity and authenticity, based on modular transformations, the algorithm for reducing the computational complexity of hashing schemes implementation using cyclic functions, are proposed in the paper. The developed advanced algorithm UMAC provides the required indicators of collisional properties of universal hashing, provable security level and high indicators of the hash code formation speed
References
- Stinson, D. R. Some constructions and bounds for authentication codes [Text] / D. R. Stinson // J. Cryptology. – 1988. – № 1. – Р. 37–51.
- Stinson, D. R. The combinatorics of authentication and secrecy codes [Text] / D. R. Stinson // J. Cryptology. – 1990. – № 2. – Р. 23–49.
- Кузнецов, А. А. Исследование коллизионных свойств кодов аутентификации сообщений UMAC // А. А. Кузнецов, О. Г. Король, С. П. Евсеев. Прикладная радиоэлектроника. – Харьков: Изд-во ХНУРЭ, 2012. – Т. 11 № 2. – С. 171-183.
- Король, О. Г. Разработка модели и метода каскадного формирования МАС с использованием модулярных преобразований // О. Г. Король, С. П. Евсеев, Л. Т. Пархуць / Захист інформації: науково-технічний журнал. – 2013. – Т. 15, № 3. – С. 186 – 196.
- Maitra, S. Further constructions of resilient Boolean functions with very high nonlinearity [Text] / S. Maitra, E. Pasalic // Accepted in SETA. – May, 2001.
- Кузнецов, О. О. Захист інформації в інформаційних системах / О. О. Кузнецов, С. П. Євсеєв, О .Г. Король. – Х.: Вид. ХНЕУ, 2011. – 504 с.
- . Final report of European project number IST-1999-12324, named New European Schemes for Signatures, Integrity, and Encryption, April 19, 2004 – Version 0.15 (beta), Springer-Verlag.
- Столлингс, В. Криптография и защита сетей: принципы и практика, 2-е изд. : пер. с англ. – М. : издательский дом «Вильям», 2001. – 672 с.
- Король, О. Г. Исследование методов обеспечения аутентичности и целостности данных на основе односторонних хеш-функций // О. Г. Король, С. П. Евсеев. Науково-технічний журнал «Захист інформації». Спецвипуск (40). – 2008. – С. 50 – 55.
- Ищейнов, В. Я. Модель безопасности конфиденциальной информации в информационной системе / В. Я. Ищейнов, С. М. Чудинов // Научные ведомости БелГУ.– Изд-во НИУ «БелГУ», 2012. – Выпуск 23/1. – № 13(132). – С. 205 – 210.
- Stinson, D. R. (1988). Some constructions and bounds for authentication codes. J. Cryptology, 1, 37-51.
- Stinson, D. R. (1990). The combinatorics of authentication and secrecy codes. J. Cryptology, 2, 23-49.
- Kuznetsov, A. A., Korol, O. G., Evseev, S. P. (2012). Investigation of properties of conflict message authentication codes UMAC. Applied
- electronics. Kharkov: Publishing house KNURE, Vol. 11, № 2, 171-183.
- Korol, O. G., Evseev, S. P., Parhuts, L.T. (2013). Development of a model and a method of forming a cascade MSS using modular transformations. Zahist іnformatsії Naukova - tehnіchny magazine, Vol. 15, 3, 186 – 196.
- Maitra, S., Pasalic, E. (2001). Further constructions of resilient Boolean functions with very high nonlinearity. Accepted in SETA.
- Kuznetsov, O. O., Korol, O. G., Evseev, S. P. (2011). Zahist іnformatsії in іnformatsіynih systems. H. : Species . HNEU, 504.
- Final report of European project number IST- 1999 - 12324 , named New European Schemes for Signatures, Integrity, and Encryption, April 19, 2004 - Version 0.15 (beta), Springer-Verlag.
- Stallings, W. (2001). Cryptography and network security: Principles and Practice, 2nd ed.: Lane. from English. Moscow: Publishing House “William“, 672.
- Korol, O. G., Evseev, S. P. (2008). Investigation of methods to ensure the authenticity and integrity of the data based on one-way hash functions. Naukovyi - tehnіchny magazine” Zahist іnformatsії.” Special Issue (40), 50 - 55.
- Ischeynov, V. Y., Chudinov, S. (2012). Model security of confidential information in the information system. Scientific statements BSU. - Publ NIU “ BSU“, Issue 23/1, 13 (132), 205 – 210.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 Сергей Петрович Евсеев, Ольга Григорьевна Король, Виталий Вячеславович Огурцов
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.