Application of the UMAC algorithm on crypto-code structures in blockchain technologies

Authors

DOI:

https://doi.org/10.15587/2313-8416.2019.189617

Keywords:

blockchain technology, UMAC algorithm, hash-function, crypto-code construction, computational experiment, elliptic codes

Abstract

A computational experiment is conducted on the possibility of using McElice crypto-code constructions with elliptic codes based on the UMAC algorithm to ensure the implementation of the basic rules of blockchain technology for the transfer of confidential information. The results of the calculations are analyzed, the conclusion is made on the practicality of the practical implementation of a quick hashing algorithm to increase the security level of the blockchain technology block chains

Author Biography

Alla Havrylova, Simon Kuznets Kharkiv National University of Economics Nauky ave., 9A, Kharkiv, Ukraine, 61166

Senior Lecturer

Department of Cybersecurity and Information Technology

References

Regulation (EU) No 910/2014 of the european parliament and of the council on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC (2014). Official Journal of the European Union. Brussels, 73–114.

Bernstein, D. J., Buchmann, J., Dahmen, E. (2009). Post-Quantum Cryptography. Berlin-Heidleberg: Springer-Verlag, 245. doi: http://doi.org/10.1007/978-3-540-88702-7

Kuznetsov, А. А., Pushkarev, А. I., Svatovskiy, I. I., Shevtsov, А. V. (2016). Nesimmetrichnii kriptosistemy na algebraicheskikh kodakh dlya postkvantovogo perioda [Asymmetric cryptosystems on algebraic codes for the post-quantum period]. Radiotehnika, 186, 70–90.

Yevseiev, S., Kots, H., Minukhin, S., Korol, O., Kholodkova, A. (2017). The development of the method of multifactor authentication based on hybrid crypto­code constructions on defective codes. Eastern-European Journal of Enterprise Technologies, 5 (9 (89)), 19–35. doi: http://doi.org/10.15587/1729-4061.2017.109879

Havrylova, А., Yevseiev, S. (2019). Analiz stanu zakhyshchenosti blokchein-proektiv na rynku ukrainskykh servisiv [Security analysis of blockchain projects in the Ukrainian services market]. Intelektualni systemy ta informaciyni tekhnologii. Odessa, 62–64.

WHAT is a Merkle Tree and How Does it Affect Blockchain Technology References? Available at: https://selfkey.org/what-is-a-merkle-tree-and-how-does-it-affect-blockchain-technology Last accessed: 15.11.2017

Hryshchuk, R., Yevseiev, S., Shmatko, A. (2018). Construction methodology of information security system of banking information in automated banking systems. Vienna: Premier Publishing s. r. o., 284. doi: http://doi.org/10.29013/r.hryshchuk_s.yevseiev_a.shmatko.cmissbiabs.284.2018

Yevseiev, S., Korol, O., Havrylova, A. (2019). Development of authentication codes of messages on the basis of UMAC with crypto-code McEliece’s scheme on elliptical codes. Information protection and information systems security. Lviv: Lviv Polytechnic Publishing House, 86–87.

Havrylova, A., Korol, O., Yevseiev, S. (2019). Development of authentication codes of messages on the basis of UMAC with crypto-code McEliece’s scheme. International Journal of 3D printing technologies and digital industry, 3 (2), 153–170.

Korol, O., Havrylova, A., Yevseiev, S. (2019). Practical UMAC algorithms based on crypto code designs. Przetwarzanie, transmisja i bezpieczenstwo informacji. Vol. 2. Bielsko-Biala: Wydawnictwo naukowe Akademii Techniczno-Humanistycznej w Bielsku-Bialej, 221–232.

Published

2019-12-28

Issue

Section

Technical Sciences