Development of a modified UMAC algorithm based on crypto­code constructions

dc.contributor.authorGavrilova, A.
dc.contributor.authorVolkov, I.
dc.contributor.authorKozhedub, Yu.
dc.contributor.authorKorolev, R.
dc.contributor.authorLezik, O.
dc.contributor.authorMedvediev, V.
dc.contributor.authorMilov, O.
dc.contributor.authorTomashevsky, B.
dc.contributor.authorTrystan, A.
dc.contributor.authorChekunova, O.
dc.date.accessioned2025-05-26T06:41:54Z
dc.date.issued2020
dc.description.abstractThe development of computer technology has determined the vector for the expansion of services based on the Internet and “G” technologies. The main requirements for modern services in the banking sector are security and reliability. At the same time, security is considered not only as ensuring the confidentiality and integrity of transactions, but also their authenticity. However, in the post-quantum period, US NIST specialists question the durability of modern means of providing basic security services based on symmetric and asymmetric cryptography algorithms. The increase in computing resources allows attackers to use modern threats in combination. Thus, there is a need to search for new and/or modify known algorithms for generating MAC (message authentication codes). In addition, the growth of services increases the amount of information that needs to be authenticated. Among the well-known hash algorithms, the hash functions of universal hashing are distinguished, which allow initially determining the number of collisions and their uniform distribution over the entire set of hash codes. Possibilities of modifying the cascade hashing algorithm UMAC (message authentication code based on universal hashing, universal MAC) based on the use of McEliece crypto-code construction on algebrogeometric (elliptic codes (EC), modified elliptic codes (MEC) and damaged codes (DC). This approach allows preserving the uniqueness property, in contrast to the classical UMAC scheme based on a block symmetric cipher (AES). The presented algorithms for evaluating the properties of universality and strict universality of hash codes make it possible to evaluate the security of the proposed hashing constructs based on universal hash functions, taking into account the preservation of the universality property.
dc.identifier.citationDevelopment of a modified UMAC algorithm based on crypto­code constructions / A. Gavrilova [et al.] // Eastern-European Journal of Enterprise Technologies. – 2020. – Vol. 4, No. 9. – P. 45-63.
dc.identifier.doihttps://doi.org/10.15587/1729-4061.2020.210683
dc.identifier.orcidhttps://orcid.org/0000-0002-2015-8927
dc.identifier.orcidhttps://orcid.org/0000-0001-6332-7586
dc.identifier.orcidhttps://orcid.org/0000-0001-6181-5519
dc.identifier.orcidhttps://orcid.org/0000-0002-7948-5914
dc.identifier.orcidhttps://orcid.org/0000-0002-7186-6683
dc.identifier.orcidhttps://orcid.org/0000-0003-1113-5042
dc.identifier.orcidhttps://orcid.org/0000-0001-6135-2120
dc.identifier.orcidhttps://orcid.org/0000-0002-1934-4773
dc.identifier.orcidhttps://orcid.org/0000-0002-2137-5712
dc.identifier.orcidhttps://orcid.org/0000-0001-9613-7244
dc.identifier.urihttps://repository.kpi.kharkov.ua/handle/KhPI-Press/89784
dc.language.isoen
dc.publisherTechnology center PC
dc.subjectauthenticity
dc.subjecthashing algorithm
dc.subjectcrypto-code constructions
dc.subjectelliptic codes
dc.subjectmodified elliptic codes
dc.subjectdamaged codes
dc.subjectUMAC algorithm
dc.subjectMV2 algorithm (universal damage mechanism)
dc.subjectpost-quantum cryptography
dc.titleDevelopment of a modified UMAC algorithm based on crypto­code constructions
dc.typeArticle

Файли

Контейнер файлів

Зараз показуємо 1 - 1 з 1
Вантажиться...
Ескіз
Назва:
EEJET_2020_4_9_Gavrilova_Development.pdf
Розмір:
1.25 MB
Формат:
Adobe Portable Document Format

Ліцензійна угода

Зараз показуємо 1 - 1 з 1
Вантажиться...
Ескіз
Назва:
license.txt
Розмір:
1.71 KB
Формат:
Item-specific license agreed upon to submission
Опис: