DOI: https://doi.org/10.15588/1607-3274-2020-1-18

A METHOD OF THE TRANSMITTED BLOCKS INFORMATION INTEGRITY CONTROL

M. O. Tanygin, H. Y. Alshaeaa, E. A. Kuleshova

Abstract


Context. For the proper operation of the hardware and software systems, it is necessary that the hardware component receives data only from the corresponding software. Otherwise, the data received from extraneous programs that can be perceived and processed by the device, which can lead to errors in the operation of the device or even a complete loss of its functionality or data. 

Objective. In order to increase the reliability of legal software data and identify the challenges of the transfer of blocks, this article focuses on a comprehensive study of the problems arising from the transmission of information in the form of separate data blocks. 

Method. The methods of integrity control in modes of transmission are described. The method based on hashes and block delivery time is analyzed in detail, analysis the methods of reducing the probability of errors occurring in the receiver and the possibility of reducing the reception of the extraneous blocks when receiving individual blocks of information. This is done by using a set of mathematical equations. And measure the extent of the effect of intensity of receiving extraneous blocks and hash field length.

Results. In the process of analyzing systems in which information is transmitted by block, when using the method of formation of information chains based on the method the hashes and the delivery time of the block, where we note, when the value of the hash field is equal to 6 or more, the probability of occurrence of duplicate branches is acceptably low. Where, when hash field more then 6, the parameter of length of a chain practically does not affect the final probability of constructing a chain from the extraneous blocks. The very same value of the probability of constructing a false chain, the length exceeding the chain of legal blocks at hash field more 6 is about1 10–3, which it’s acceptable for real information transmission systems.

Conclusions. Based on the analysis, we can conclude that in systems in which information is transmitted block by block, when using the method of generating information chains based on the hash and block arrival time, with a hash field of 6 or more, the probability of occurrence of duplicate branches is acceptably low. 


Keywords


Probability calculation, messages limited in length, authentication control, hash field length, duplicating branches in a chain.

Full Text:

PDF

References


National Institute of Standards and Technology. Recommendation for Block Cipher Modes of Operation: NIST Special Publication 800–38A. Gaithersburg, Maryland, October 2010. 11p.

National Institute of Standards and Technology. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. NIST Special Publication 800–38C. Gaithersburg, Maryland, May 2004. 25p.

Tanygin M. O., Tipikin A. P. Architecture of system of hardware restriction of access to information on a computer hard disk, Telecommunications, 2006, No. 3, pp. 44–46.

Knudson L. Block Chaining Modes of Operation. NIST First Modes of Operation Workshop [Electronic resource]. October 2010. Access mode: http://csrc.nist.gov/groups/ST/toolkit/BCM/workshops.html.

Gervais A., Ghassan O., Wüst K., Glykantzis V., Ritzdorf H., Capkun S. On the Security and Performance of Proof of Work Blockchains [Electronic resource], 2016. – Access mode: https://eprint.iacr.org/2016/555.pdf.

Black J., Rogaway P. and Shrimpton T. CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions. Advances in Cryptology, CRYPTO ‘00. Santa Barbara, California, 2000, pp. 197–215.

Swan M. Blockchain: Blueprint for a New Economy. O’Reilly Media, Inc., 2015, 152 p.

McGrew D., Viega J. The Security and Performance of the Galois/Counter Mode (GCM) of Operation, In Proceedings: Indocrypt, 2004, pp. 343–355.

Tanygin M.O. Method of Control of Data Transmitted Between Software and Hardware, Computer Science and Engineering: Materials of the IV International Conference of Young Scientists CSE-2010. Lviv, Publishing House of Polytechnics, 2010, pp. 344–345.

Bellare M., Kilian J., Rogaway P. The security of the cipher block chaining message authentication code, JCSS, 1994, Vol. 3, No. 3, pp. 341–358.

Stallings W. NIST Block Cipher Modes of Operation for Authentication and Combined Confidentiality and Authentication, Cryptologia, 2010, pp. 225 – 23.

Stallings W. The Advanced Encryption Standard. Cryptologia, 2002, No. 26, pp. 165–188.

Tanygin M.O. Calculation of the probability of collisions when using the message authentication algorithm, News SWSU, 2012, pp. 179–183.

Gubarev A. V., Tanygin M. O. Research of dependence of time of searching legal instruction words from the width of the buffer the received instruction words, Telecommunications, 2015, pp. 21–26.

Stallings W. NIST Block Cipher Modes of Operation for Confidentiality, Cryptologia, 34(2), pp. 163–175.

Tilborg H. C. Encyclopedia of Cryptography and Security. Heidelberg, Springer, 2005, pp. 11–15.

Lipmaa H. P., Rogaway P., and Wagner D. CTR Mode Encryption. NIST First Modes of Operation Workshop [Electronic resource]. Access mode: http://csrc.nist.gov/groups/ST/toolkit/BCM/ workshops.html.

Voydock V., Kent S. Security Mechanisms in High-Level Network Protocols, Computing Surveys, June 1983, pp. 135–171.

Tanygin M.O., Search and elimination of collisions in information exchange through open communication channels, Problems of Informatics in Education, Management, Economics and Technology: a collection of articles of the Xth International Scientific and Technical Conference. Penza, Privolzhsky House of Knowledge, 2010. pp. 62–64.


GOST Style Citations


1. National Institute of Standards and Technology. Recommendation for Block Cipher Modes of Operation: NIST Special Publication 800–38A. Gaithersburg, Maryland, October 2010. 11p.

2. National Institute of Standards and Technology. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. NIST Special Publication 800–38C. Gaithersburg, Maryland, May 2004. 25p.

3. Tanygin M. O. Architecture of system of hardware restriction of access to information on a computer hard disk / M. O. Tanygin, A. P. Tipikin // Telecommunications. – 2006. – № 3. – P. 44–46.

4. Knudson L. Block Chaining Modes of Operation. NIST First Modes of Operation Workshop [Electronic resource] / L. Knudson. – October 2010. – Access mode: http://csrc.nist.gov/groups/ST/toolkit/BCM/workshops.html.

5. Gervais A. On the Security and Performance of Proof of Work Blockchains [Electronic resource] / [A. Gervais, O. Ghassan, K. Wüst et al.] – 2016. – Access mode: https://eprint.iacr.org/2016/555.pdf.

6. Black J. CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions. Advances in Cryptology / J. Black, P. Rogaway, and T. Shrimpton // CRYPTO ‘00. – Santa Barbara, California. – 2000. – P. 197–215.

7. Swan M. Blockchain: Blueprint for a New Economy / M. Swan. – O’Reilly Media, Inc., 2015. – 152 p.

8. McGrew D. The Security and Performance of the Galois/Counter Mode (GCM) of Operation / D. McGrew, J. Viega // In Proceedings: Indocrypt. – 2004. – P. 343–355.

9. Таныгин М. О. Метод контроля данных, передаваемых между программным и аппаратным обеспечением / М. О. Таныгин // Информатика и вычислительная техника: материалы IV Международной конференции молодых ученых CSE-2010. – Львов : Изд-во Политехники, 2010 – С. 344–345.

10. Bellare M. The security of the cipher block chaining message authentication code / M. Bellare, J. Kilian, P. Rogaway // JCSS. – 1994. – Vol. 3, No. 3. – P. 341–358.

11. Stallings W. NIST Block Cipher Modes of Operation for Authentication and Combined Confidentiality and Authentication / W. Stallings // Cryptologia. – 2010. – P. 225–23.

12. Stallings W. The Advanced Encryption Standard. Cryptologia. – 2002. – № 26. – P. 165–188.

13. Таныгин М.О. Расчет вероятности коллизий при использовании алгоритма аутентификации сообщений / М.О. Таныгин // Новости ЮУрГУ. – 2012. – С. 179–183.

14. Губарев А. В. Исследование зависимости времени поиска юридического слова инструкции от ширины буфера полученного слова инструкции / А. В. Губарев, М. О. Таныгин // Телекоммуникации. – 2015 – С. 21–26.

15. Stallings W. NIST Block Cipher Modes of Operation for Confidentiality / W. Stallings // Cryptologia. – 34(2). – P. 163–175.

16. Tilborg H. C. Encyclopedia of Cryptography and Security / H. C. Tilborg // Heidelberg: Springer. – 2005. – P. 11–15.

17. Lipmaa H. CTR Mode Encryption. NIST First Modes of Operation Workshop [Electronic resource] / H. P. Lipmaa, P. Rogaway, and D. Wagner. – Access mode: http://csrc.nist.gov/groups/ST/toolkit/BCM/ workshops.html.

18. Voydock V. Security Mechanisms in High-Level Network Protocols / V. Voydock, S. Kent // Computing Surveys. – June 1983. – P. 135–171.

19. Таныгин М. О. Поиск и устранение коллизий при обмене информацией по открытым каналам связи / М. О. Таныгин // Проблемы информатики в образовании, управлении, экономике и технологии: сборник статей X Международной научно-технической конференции. – Пенза : Приволжский Дом знаний. – 2010. – С. 62–64.







Copyright (c) 2020 M. O. Tanygin, H. Y. Alshaeaa, E. A. Kuleshova

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Address of the journal editorial office:
Editorial office of the journal «Radio Electronics, Computer Science, Control»,
National University "Zaporizhzhia Polytechnic", 
Zhukovskogo street, 64, Zaporizhzhia, 69063, Ukraine. 
Telephone: +38-061-769-82-96 – the Editing and Publishing Department.
E-mail: rvv@zntu.edu.ua

The reference to the journal is obligatory in the cases of complete or partial use of its materials.