Применение алгоритма UMAC на крипто-кодовых конструкциях в блокчейн-технологиях
DOI :
https://doi.org/10.15587/2313-8416.2019.189617Mots-clés :
блокчейн-технология, алгоритм UMAC, хеш-функция, крипто-кодовая конструкция, вычислительный эксперимент, эллиптические кодыRésumé
Проведен вычислительный эксперимент по возможности использования крипто-кодовых конструкций Мак-Элиса с эллиптическими кодами на алгоритме UMAC для обеспечения реализации основных правил блокчейн-технологии при передаче конфиденциальной информации. Проанализировано результаты вычислений, сделан вывод о целесообразности практической реализации быстрого алгоритма хеширования для повышения уровня защищенности цепочки блоков технологии блокчейн
Références
Regulation (EU) No 910/2014 of the european parliament and of the council on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC (2014). Official Journal of the European Union. Brussels, 73–114.
Bernstein, D. J., Buchmann, J., Dahmen, E. (2009). Post-Quantum Cryptography. Berlin-Heidleberg: Springer-Verlag, 245. doi: http://doi.org/10.1007/978-3-540-88702-7
Kuznetsov, А. А., Pushkarev, А. I., Svatovskiy, I. I., Shevtsov, А. V. (2016). Nesimmetrichnii kriptosistemy na algebraicheskikh kodakh dlya postkvantovogo perioda [Asymmetric cryptosystems on algebraic codes for the post-quantum period]. Radiotehnika, 186, 70–90.
Yevseiev, S., Kots, H., Minukhin, S., Korol, O., Kholodkova, A. (2017). The development of the method of multifactor authentication based on hybrid cryptocode constructions on defective codes. Eastern-European Journal of Enterprise Technologies, 5 (9 (89)), 19–35. doi: http://doi.org/10.15587/1729-4061.2017.109879
Havrylova, А., Yevseiev, S. (2019). Analiz stanu zakhyshchenosti blokchein-proektiv na rynku ukrainskykh servisiv [Security analysis of blockchain projects in the Ukrainian services market]. Intelektualni systemy ta informaciyni tekhnologii. Odessa, 62–64.
WHAT is a Merkle Tree and How Does it Affect Blockchain Technology References? Available at: https://selfkey.org/what-is-a-merkle-tree-and-how-does-it-affect-blockchain-technology Last accessed: 15.11.2017
Hryshchuk, R., Yevseiev, S., Shmatko, A. (2018). Construction methodology of information security system of banking information in automated banking systems. Vienna: Premier Publishing s. r. o., 284. doi: http://doi.org/10.29013/r.hryshchuk_s.yevseiev_a.shmatko.cmissbiabs.284.2018
Yevseiev, S., Korol, O., Havrylova, A. (2019). Development of authentication codes of messages on the basis of UMAC with crypto-code McEliece’s scheme on elliptical codes. Information protection and information systems security. Lviv: Lviv Polytechnic Publishing House, 86–87.
Havrylova, A., Korol, O., Yevseiev, S. (2019). Development of authentication codes of messages on the basis of UMAC with crypto-code McEliece’s scheme. International Journal of 3D printing technologies and digital industry, 3 (2), 153–170.
Korol, O., Havrylova, A., Yevseiev, S. (2019). Practical UMAC algorithms based on crypto code designs. Przetwarzanie, transmisja i bezpieczenstwo informacji. Vol. 2. Bielsko-Biala: Wydawnictwo naukowe Akademii Techniczno-Humanistycznej w Bielsku-Bialej, 221–232.
Téléchargements
Publié-e
Numéro
Rubrique
Licence
(c) Tous droits réservés Alla Havrylova 2019
Cette œuvre est sous licence Creative Commons Attribution 4.0 International.
Our journal abides by the Creative Commons CC BY copyright rights and permissions for open access journals.
Authors, who are published in this journal, agree to the following conditions:
1. The authors reserve the right to authorship of the work and pass the first publication right of this work to the journal under the terms of a Creative Commons CC BY, which allows others to freely distribute the published research with the obligatory reference to the authors of the original work and the first publication of the work in this journal.
2. The authors have the right to conclude separate supplement agreements that relate to non-exclusive work distribution in the form in which it has been published by the journal (for example, to upload the work to the online storage of the journal or publish it as part of a monograph), provided that the reference to the first publication of the work in this journal is included.