The transfer of information by telecommunication channels is accompanied by message hashing to control the integrity of the data and confirm the authenticity of the data. When using a reliable hash function, it is computationally difficult to create a fake message with a pre-existing hash code, however, due to the weaknesses of specific hashing algorithms, this threat can be feasible. To increase the level of cryptographic strength of transmitted messages over telecommunication channels, there are ways to create hash codes, which, according to practical research, are imperfect in terms of the speed of their formation and the degree of cryptographic strength. The collisional properties of hashing functions formed using the modified UMAC algorithm using the methodology for assessing the universality and strict universality of hash codes are investigated. Based on the results of the research, an assessment of the impact of the proposed modifications at the last stage of the generation of authentication codes on the provision of universal hashing properties was presented. The analysis of the advantages and disadvantages that accompany the formation of the hash code by the previously known methods is carried out. The scheme of cascading generation of data integrity and authenticity control codes using the UMAC algorithm on crypto-code constructions has been improved. Schemes of algorithms for checking hash codes were developed to meet the requirements of universality and strict universality. The calculation and analysis of collision search in the set of generated hash codes was carried out according to the requirements of a universal and strictly universal class for creating hash codes
The subject of the research is a mathematical model of authentication of the transmitted message based on the McEliese scheme on shortened and elongated modified elliptic codes using the modified UMAC algorithm. The aim of this work is to develop such a scheme for the information exchange over Internet commverification and integrity of the transmitted information, taking into account the prevention of an increase in the costs of the actions taken. Tasks: analysis of existing ways to increase the resistance to hacking of transmitted messages over telecommunication networks; analysis of a message transfer scheme using blockchain technology; formalized description of a mathematical model for providing clear text authentication using a modified UMAC algorithm, as the formation of key data, a crypto-code construction (CCC) is used on the McEliese scheme on modified elliptic codes (MEС); development of data encryption and decryption algorithms using CCC based on McEliese on the MEC and UMAC algorithm. Аn approach was proposed to verify the authentication and verification of the information packet during transmission and reception via telecommunication channels, which allows using already known hashing methods to compare generated codegrams and transmitted messages for their correspondence, which increases the level of cryptographic stability of the transmitted data and the reliability of the received data. The developed schemes of algorithms for generating codеgrams and their decryption using the proposed approach make it possible to gradually demonstrate the implementation of procedures for generating codegrams and their hash codes using both shortening and lengthening the code. Further research should prove from a practical point of view the effectiveness of using this approach when transmitting a message regarding the preservation of its integrity and authenticity. Therefore, it is necessary to develop a test system that should implement the proposed approach, as well as evaluate the results obtained.unication channels, which would ensure the proper level of
Харьковский национальный экономический университет им. С. Кузнеца, Харьков МНОГОФАКТОРНАЯ ОЦЕНКА ПОКАЗАТЕЛЕЙ РАЗВИТИЯ ІТ-ОТРАСЛИ В РЕГИОНАХ УКРАИНЫ В статье обоснована актуальность проблемы кадрового голода в среде молодых квалифицированных ІТ-кадров, который вызван не только миграцией из менее благополучных регионов в более благополучные отечественные ІТ-центры, но и за пределы страны, выяснение причин такой ситуации и создание способов ее устранения. Проведен анализ процессов, происходящих на ІТ-рынке труда Украины, позволяющий определить состояние ІТ-отрасли в регионах Украины на основании опроса экспертов. Были определены показатели состояния ІТ-рынка и шкалы их оценивания, все показатели разбиты на группы «Инвестиционная привлекательность регионов Украины», «Внутреннее состояние IT-рынка Украины» и «Заработная плата». Определена основная направленность IT-бизнеса в Украине, которая базируется на предоставлении аутсорсинговых услуг. Сформирована обобщенная скалярная оценка качества допустимых решений для регуляризации многокритериальной задачи. В рамках групп проведено рейтингование показателей каждой группы и регионов, а также сформирована обобщенная многофакторная оценка состояния IT-отрасли по регионам. Полученные результаты могут быть использованы для получения предварительной описательной статистики состояния ІТ-отрасли по регионам Украины. Результаты исследования позволят проводить дальнейший мониторинг состояния показателей ІТ-отрасли по мере внесения изменений, как в значения показателей, так и в состав анализируемых регионов.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.