Scientific approach to probabilistic assessment of information protection against imposing false messages in telecommunication systems

Authors

  • I.D. Gorbenko Харківський національний університет імені В.Н. Каразіна, АТ «Інститут інформаційних технологій», Ukraine https://orcid.org/0000-0003-4616-3449
  • A.A. Zamula Харківський національний університет імені В.Н. Каразіна, Ukraine http://orcid.org/0000-0002-8973-6190

DOI:

https://doi.org/10.30837/rt.2022.1.208.01

Keywords:

cyber and information security threats, authenticity, MAC code, MAC code attacks, collision, MAC code stability

Abstract

To date, in all economically developed countries of the world, multibillion-dollar scientific and exploratory research is being carried out on the problems of building quantum-resistant cryptographic systems. In particular, work is being carried out on the analysis, development and research of models, methods and computational algorithms for post-quantum cryptographic transformations, their possible standardization and implementation. At the same time, it is necessary to have an objective, scientifically based approach for assessing the level of information security, which can be guaranteed when implementing one or another protection mechanism. This paper presents formulated scientific approaches, derived expressions making it possible to evaluate the strength of MAC codes as mechanisms for ensuring the authenticity, integrity, and authenticity of messages. It is shown that it is necessary to use the statistics of joint message distributions for accurate calculation of the MAC codes simulation and collision stability. It is proved that the lower limits for the probabilities of imitation and substitution ignore the statistical properties of authenticators arrays. They are based on the pseudo-randomness model of f(x) function and determine the minimum requirements for the key space size and the MAC values space. The upper bounds for the imitation and substitution probabilities are related to combinatorial properties of the MAC arrays and evaluate the value of collisions in the space of MAC values f(x) and messages for the worst case choice of keys and messages. Collision characteristics of MAC codes are considered. The derived equations make it possible to solve accurately the problem of determining the number of experiments indispensable to create a collision with a certain probability on a set of MAC code values. The MAS stability estimates for one of the types of hash functions are obtained using the derived equations.

References

Gorbenko, I., Zamula, A., Ho, T.L., Rodionov, S. Derived Signals Systems for Information Communication Systems Applications: Synthesis, Formation, Processing and Properties 2020 IEEE International Conference on Problems of Info communications Science and Technology, PIC S and T 2020 – Proceedings this link is disabled, 2021, стр. 13–18, 9468058.

Gorbenko, I., Zamula, O. Devising Methods to Synthesize Discrete Complex Signals with required Properties for Application in Modern Information and Communication Systems. Eastern-European Journal of Enterprise Technologies this link is disabled, 2021, 3, стр. 16–26.

Gorbenko, I.D., Zamula, A.A. Information security and noise immunity of telecommunication systems under conditions of various internal and external impacts Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2017, 76(19), стр. 1705-1717.

Gorbenko, I., Kudryashov, I., Malieieva, H. Comparative Analysis of Candidates for a Post-Quantum CPU Based on MQ Cryptographic Transformation. 2018 International Scientific-Practical Conference on Problems of Info communications Science and Technology, PIC S and T 2018 - Proceedings, 2019, стр. 442–446, 8632070.

Горбенко, І.Д. Прикладна криптологія. Монографія / І.Д. Горбенко, Ю.І. Горбенко. – Харків: ХНУРЕ, 2012 р. - 868 с.

Горбенко Ю.І. Побудова, аналіз, стандартизація та застосування криптографічних систем. Під загальною редакцією професора Горбенка І.Д. Харків.: Видавництво «Форт», 2015. – 959 с.

Published

2022-03-30

How to Cite

Gorbenko, I. ., & Zamula, A. . (2022). Scientific approach to probabilistic assessment of information protection against imposing false messages in telecommunication systems. Radiotekhnika, 1(208), 7–15. https://doi.org/10.30837/rt.2022.1.208.01

Issue

Section

Articles