2022
DOI: 10.21303/2461-4262.2022.002213
|View full text |Cite
|
Sign up to set email alerts
|

Research of collision properties of the modified UMAC algorithm on crypto-code constructions

Abstract: The transfer of information by telecommunication channels is accompanied by message hashing to control the integrity of the data and confirm the authenticity of the data. When using a reliable hash function, it is computationally difficult to create a fake message with a pre-existing hash code, however, due to the weaknesses of specific hashing algorithms, this threat can be feasible. To increase the level of cryptographic strength of transmitted messages over telecommunication channels, there are ways to crea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 6 publications
(15 reference statements)
0
3
0
Order By: Relevance
“…The research hypothesis was as follows. To provide security services in socio-cyberphysical systems (critical infrastructure objects), it is proposed to use post-quantum crypto-algorithms based on McEliece's crypto-code constructions [1][2][3][27][28][29][30][31][32][33]. The use of various noise-resistant codes makes it possible to ensure the required characteristics of both standard channels of information and communication systems and networks, and smart technology channels (wireless channels), as well as the transmission of various contexts (files, video, sound, etc.)…”
Section: Materials and Research Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The research hypothesis was as follows. To provide security services in socio-cyberphysical systems (critical infrastructure objects), it is proposed to use post-quantum crypto-algorithms based on McEliece's crypto-code constructions [1][2][3][27][28][29][30][31][32][33]. The use of various noise-resistant codes makes it possible to ensure the required characteristics of both standard channels of information and communication systems and networks, and smart technology channels (wireless channels), as well as the transmission of various contexts (files, video, sound, etc.)…”
Section: Materials and Research Methodsmentioning
confidence: 99%
“…[34][35][36][37][38][39]. In addition, the research carried out [1][2][3][27][28][29][30][31][32][33][34][35][36][37][38][39] makes it possible to use various algebrogeometric codes, LDPC codes with defective codes, which makes it possible to build hybrid crypto-code constructions and provide the required efficiency and strength of confidential cryptography. The initial data for constructing such structures is the required parameters of durability and efficiency of transmitted information.…”
Section: Materials and Research Methodsmentioning
confidence: 99%
“…В роботах [34,35] розглянуто стійкість універсальних геш-функцій. Автори підтверджують, що використання універсального гешування не дозволяє однозначно формувати стійкі до зламування геш-коди, і пропоную використовувати додаткове шифрування для забезпечення стійкості геш-коду.…”
Section: постановка проблемиunclassified
“…При використанні надійної геш-функції обчислювально складно створити підроблене повідомлення з таким самим значенням геш-коду (MAC-кодmessage authentication code), як у справжнього повідомлення. Однак ці загрози можуть реалізуватися через слабкість конкретних алгоритмів гешування, підпису або помилок у їх реалізації [1,37].…”
Section: ) особливості формування різних видів модифікацій крипто-код...unclassified
“…-"exclusive OR" operation on previous and next values. Additional crypto-resistance of the code is provided by the use of a pseudo-random lining on the last layer Pad[9,[13][14][15]]:…”
mentioning
confidence: 99%