Havrylova A. Models and methods of integrity and authenticity control based on the UMAC cascade algorithm

Українська версія

Thesis for the degree of Doctor of Philosophy (PhD)

State registration number

0823U101036

Applicant for

Specialization

  • 125 - Кібербезпека та захист інформації

09-11-2023

Specialized Academic Board

Разова спеціалізована вчена рада №2569

National Aviation University

Essay

The dissertation study is devoted to the topical issues of developing new and improving existing models and methods for ensuring the integrity and authenticity of information circulating in cyberspace in the post-quantum period. In the conditions of the rapid growth of computing capabilities for breaking cryptographic algorithms, there is a need for the development and practical implementation of algorithms for ensuring security services – integrity and authenticity. To ensure security services (integrity and authenticity), hashing and digital signature algorithms are usually used, but the analysis conducted by NIST specialists in 2020 indicates that the existing algorithms in the post-quantum cryptoperiod will not provide the required level of security and may be broken. Cyber threats can be implemented through weaknesses in hashing algorithms. There are a number of approaches to creating hash codes to increase the crypto-resistance of transmitted messages, but practical studies allow us to talk about the imperfection of existing hashing options in terms of the speed of their formation and the degree of crypto-resistance. To eliminate this shortcoming, it is proposed to use a pseudo-random layer with cryptographically stable algorithms. But none of the known algorithms provides stability to quantum computers

Research papers

Havrylova Alla A., Korol Olha H., Milevskyi Stanyslav V., Bakirova Lala R. Mathematical model of authentication of a transmitted message based on a McEliece scheme on shorted and extended modified elliptic codes using UMAC modified algorithm. Кібербезпека: освіта, наука, техніка, 2019, № 1(5). P. 40-51.

Gavrilova A., Volkov I., Kozhedub Yu. Development of a modified UMAC algorithm based on crypto-code constructions Eastern-European Journal of Enterprise Technologies. 2020, № 4/9 (106). P. 45-63.

Гаврилова Алла, Хохлачова Юлія, Погорелов Володимир. Аналіз застосування гібридних крипто-кодових конструкцій для підвищення рівня стійкості геш-кодів до зламу. Безпека інформації, 2022, Том 28, № 2. С. 87-101.

Yevseiev S., Havrylova A., Milevskyi S., Sinitsyn I. and others. Development of an improved SSL/TLS protocol using post-quantum algorithms. Eastern-European Journal of Enterprise Technologies. 2023, № 3/9 (123). Р. 33-48.

Havrylova A., Khokhlachova Y., Tkachov A., Voropay N., Khvostenko V. Justification of directions for improving authentication protocols in information and communication systems. Ukrainian Information Security Research Journal. 2023, Vol. 25, №. 1. Р. 6-19.

Files

Similar theses