Запис Детальніше

The article considers the choice of cycle functions in the provable persistent key universal hashing scheme, proposed model and method<br />of forming codes of integrity and authenticity of data on the basis of modular transformations, computational complexity reduce algorithm<br />of the hashing schemes implementation using cyclic functions. The object of the research is the process of improving the integrity and<br />authenticity of data packets in security protocols of telecommunication networks. The subject of the study are models, methods and<br />algorithms for monitoring the integrity and authenticity of data packets in security protocols of telecommunication networks. The purpose<br />of the study is to increase the integrity and authenticity of data packets in security protocols of telecommunication networks. The developed enhanced method of forming a cascade MAC differs from the known (algorithm UMAC) using modular hashing on the last stage of the MAC forming that provides high collision properties of strictly universal hashing and safety performance at the level of modern means of demonstrable strength protection. Were obtained estimates of the computational complexity of the formation of the MAC using modular hashing, found, that with comparable rates of resistance the complexity of modular hashing exceeds by 1–2 orders of known schemes based on block symmetric ciphers. However, the use of modular transformations provides provable security and high collision properties of strictly universal hashing.

Науковий журнал «Радіоелектроніка, інформатика, управління»

Переглянути архів Інформація
 
 
Поле Співвідношення
 
##plugins.schemas.marc.fields.042.name## dc
 
##plugins.schemas.marc.fields.720.name## Korol, O. G.; Simon Kuznets Kharkiv National University of Economics, Kharkiv, Ukraine
 
##plugins.schemas.marc.fields.520.name## The article considers the choice of cycle functions in the provable persistent key universal hashing scheme, proposed model and method<br />of forming codes of integrity and authenticity of data on the basis of modular transformations, computational complexity reduce algorithm<br />of the hashing schemes implementation using cyclic functions. The object of the research is the process of improving the integrity and<br />authenticity of data packets in security protocols of telecommunication networks. The subject of the study are models, methods and<br />algorithms for monitoring the integrity and authenticity of data packets in security protocols of telecommunication networks. The purpose<br />of the study is to increase the integrity and authenticity of data packets in security protocols of telecommunication networks. The developed enhanced method of forming a cascade MAC differs from the known (algorithm UMAC) using modular hashing on the last stage of the MAC forming that provides high collision properties of strictly universal hashing and safety performance at the level of modern means of demonstrable strength protection. Were obtained estimates of the computational complexity of the formation of the MAC using modular hashing, found, that with comparable rates of resistance the complexity of modular hashing exceeds by 1–2 orders of known schemes based on block symmetric ciphers. However, the use of modular transformations provides provable security and high collision properties of strictly universal hashing.
 
##plugins.schemas.marc.fields.260.name## Zaporizhzhya National Technical University
2015-06-23 10:32:00
 
##plugins.schemas.marc.fields.856.name## application/pdf
http://ric.zntu.edu.ua/article/view/45137
 
##plugins.schemas.marc.fields.786.name## Radio Electronics, Computer Science, Control; No 1 (2015): Radio Electronics, Computer Science, Control
 
##plugins.schemas.marc.fields.546.name## en
 
##plugins.schemas.marc.fields.540.name## Copyright (c) 2015 O. G. Korol