“…In [2], it is shown that network simulations for effective use should include highly accurate models of users, intruders and/or defenders. Simulations can be used to implement scripts for learning war games with realistic traffic and usergenerated vulnerabilities.…”
Section: Literature Review and Problem Statementmentioning
“…In [2], it is shown that network simulations for effective use should include highly accurate models of users, intruders and/or defenders. Simulations can be used to implement scripts for learning war games with realistic traffic and usergenerated vulnerabilities.…”
Section: Literature Review and Problem Statementmentioning
“…A special place among the mechanisms of EA is occupied by two-factor authentication methods based on various smart cards, USB keys, OTP passwords [9,10,[12][13][14]. Multi-factor authentication methods have become widespread among hi-tech organizations, financial and insurance sectors of the market, large banking institutions, and public sector enterprises.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…However, the studies of this method and the proposed monitoring algorithm [12] allow hacking the Passwindows system in 3-5 sessions by forming a bar code of the u card of the user of banking services. Fig.…”
“…These changes contribute to the development of the digital economy, and in particular, electronic banking [1,2]. However, this is accompanied by an increase in the number and diversity of cyber threats.…”
Section: Introductionmentioning
confidence: 99%
“…third criterion). Thus, as statistical indicators for assessing collision properties, use[54]:-mathematical expectations m(n 1 ), m(n 2 ) and m(n 3 ) of maxima of the number of hashing rules (MAC formation rules) at which equalities (1),(2) and(3)are satisfied, respectively; -dispersion D(n 1 ), D(n 2 ) and D(n 3 ), characterizing the dispersion of the values of the number of hashing rules (MAC formation rules), at which equalities (1),(2) and(3)are satisfied, with respect to their mathematical expectations m(n 1 ), m(n 2 ) and m(n 3 ), respectively.…”
The development of computer technology has determined the vector for the expansion of services based on the Internet and "G" technologies. The main requirements for modern services in the banking sector are security and reliability. At the same time, security is considered not only as ensuring the confidentiality and integrity of transactions, but also their authenticity. However, in the post-quantum period, US NIST specialists question the durability of modern means of providing basic security services based on symmetric and asymmetric cryptography algorithms. The increase in computing resources allows attackers to use modern threats in combination. Thus, there is a need to search for new and/or modify known algorithms for generating MAC (message authentication codes). In addition, the growth of services increases the amount of information that needs to be authenticated. Among the well-known hash algorithms, the hash functions of universal hashing are distinguished, which allow initially determining the number of collisions and their uniform distribution over the entire set of hash codes. Possibilities of modifying the cascade hashing algorithm UMAC (message authentication code based on universal hashing, universal MAC) based on the use of McEliece crypto-code construction on algebrogeometric (elliptic codes (EC), modified elliptic codes (MEC) and damaged codes (DC). This approach allows preserving the uniqueness property, in contrast to the classical UMAC scheme based on a block symmetric cipher (AES). The presented algorithms for evaluating the properties of universality and strict universality of hash codes make it possible to evaluate the security of the proposed hashing constructs based on universal hash functions, taking into account the preservation of the universality property
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.