Scientific approach to probabilistic assessment of information protection against imposing false messages in telecommunication systems
DOI:
https://doi.org/10.30837/rt.2022.1.208.01Keywords:
cyber and information security threats, authenticity, MAC code, MAC code attacks, collision, MAC code stabilityAbstract
To date, in all economically developed countries of the world, multibillion-dollar scientific and exploratory research is being carried out on the problems of building quantum-resistant cryptographic systems. In particular, work is being carried out on the analysis, development and research of models, methods and computational algorithms for post-quantum cryptographic transformations, their possible standardization and implementation. At the same time, it is necessary to have an objective, scientifically based approach for assessing the level of information security, which can be guaranteed when implementing one or another protection mechanism. This paper presents formulated scientific approaches, derived expressions making it possible to evaluate the strength of MAC codes as mechanisms for ensuring the authenticity, integrity, and authenticity of messages. It is shown that it is necessary to use the statistics of joint message distributions for accurate calculation of the MAC codes simulation and collision stability. It is proved that the lower limits for the probabilities of imitation and substitution ignore the statistical properties of authenticators arrays. They are based on the pseudo-randomness model of f(x) function and determine the minimum requirements for the key space size and the MAC values space. The upper bounds for the imitation and substitution probabilities are related to combinatorial properties of the MAC arrays and evaluate the value of collisions in the space of MAC values f(x) and messages for the worst case choice of keys and messages. Collision characteristics of MAC codes are considered. The derived equations make it possible to solve accurately the problem of determining the number of experiments indispensable to create a collision with a certain probability on a set of MAC code values. The MAS stability estimates for one of the types of hash functions are obtained using the derived equations.
References
Gorbenko, I., Zamula, A., Ho, T.L., Rodionov, S. Derived Signals Systems for Information Communication Systems Applications: Synthesis, Formation, Processing and Properties 2020 IEEE International Conference on Problems of Info communications Science and Technology, PIC S and T 2020 – Proceedings this link is disabled, 2021, стр. 13–18, 9468058.
Gorbenko, I., Zamula, O. Devising Methods to Synthesize Discrete Complex Signals with required Properties for Application in Modern Information and Communication Systems. Eastern-European Journal of Enterprise Technologies this link is disabled, 2021, 3, стр. 16–26.
Gorbenko, I.D., Zamula, A.A. Information security and noise immunity of telecommunication systems under conditions of various internal and external impacts Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2017, 76(19), стр. 1705-1717.
Gorbenko, I., Kudryashov, I., Malieieva, H. Comparative Analysis of Candidates for a Post-Quantum CPU Based on MQ Cryptographic Transformation. 2018 International Scientific-Practical Conference on Problems of Info communications Science and Technology, PIC S and T 2018 - Proceedings, 2019, стр. 442–446, 8632070.
Горбенко, І.Д. Прикладна криптологія. Монографія / І.Д. Горбенко, Ю.І. Горбенко. – Харків: ХНУРЕ, 2012 р. - 868 с.
Горбенко Ю.І. Побудова, аналіз, стандартизація та застосування криптографічних систем. Під загальною редакцією професора Горбенка І.Д. Харків.: Видавництво «Форт», 2015. – 959 с.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).