Characteristics of the data integrity check algorithm based on additive generators and s-boxes | Applied Discrete Mathematics. Supplement. 2020. № 13. DOI: 10.17223/2226308X/13/19

Characteristics of the data integrity check algorithm based on additive generators and s-boxes

During software analysis, the integrity control of large data arrays is relevant. In solving this task it is important to provide an acceptable compromise between cryptographic properties of the integrity check algorithm and the resources necessary for its implementation. We propose the algorithm for generation of 128-bit integrity check value (ICV) for data blocks of size 1 KB (1024 bytes). This algorithm provides positive (from the synthesis position) operational and cryptographic properties and uses the transformations of additive generators and s-boxes. The algorithm is implemented by the function ф(дг): V213 ^ V128 with the full mixing of the input data. For 6 ^ t ^ 100, each bit of the ICV essentially depends on all the bits of the input block. If you randomly choose the initial state u, the probability of obtaining the corresponding ICV code Q is estimated by 2-128. The average number of the tested pairs of blocks (u, u'), where u = U and Q(u) = Q(u'), is approximately equal to 264. The computational complexity of the function ф(дг) is in the order of t(5u + 8v), where u is the computational complexity of adding two numbers modulo 264, and v is the computational complexity of the s-box calculation. According to the conducted experiments, the speed of ICV generation varies from 3500 (t=6) to 250 Mbit/s (t=96), respectively. At the same values of t, the time of ICV generation varies from 18 to 250 ^s.

Download file
Counter downloads: 84

Keywords

аддитивные генераторы, контроль целостности, матрично-графовый подход, перемешивающие свойства, регистры сдвига, additive generators, data integrity control, matrix-graph approach, mixing properties, shift registers

Authors

NameOrganizationE-mail
Fomichev V.M.Security Code LLC; Financial University under the Government of the Russian Federation; NRNU MEPhI; FRC IU RASfomichev.2016@yandex.ru
Koreneva A.M.Security Code LLCa.koreneva@securitycode.ru
Nabiev T.R.N.E.Bauman MSTU; Security Code LLCt.nabiev@securitycode.ru
Всего: 3

References

Будзко В. И., Мельников Д. А., Фомичёв В. М. Базовые требования к подсистемам обеспечения криптоключами в информационно-технологических системах высокой доступности // Системы высокой доступности. 2016. Т. 12. №3. С. 73-82.
Fomichev V. M. Matrix-graph approach for studying nonlinearity of transformations on vector space // VIII симп. «Современные тенденции в криптографии» CTCrypt 2019. https: //ctcrypt.ru/files/files/2019/materials/08_Fomichev.pdf
Fomichev V. M. and Koreneva A. M. Mixing properties of modified additive generators // J. Appl. Ind. Math. 2017. V. 11. P. 215-226.
Fomichev V. M., Avezova Ya. E., Koreneva A. M., and Kyazhin S. N. Primitivity and local primitivity of digraphs and nonnegative matrices // J. Appl. Ind. Math. 2018. V. 12. P. 453-469.
 Characteristics of the data integrity check algorithm based on additive generators and s-boxes | Applied Discrete Mathematics. Supplement. 2020. № 13. DOI: 10.17223/2226308X/13/19

Characteristics of the data integrity check algorithm based on additive generators and s-boxes | Applied Discrete Mathematics. Supplement. 2020. № 13. DOI: 10.17223/2226308X/13/19

Download full-text version
Counter downloads: 461