A METHOD OF THE TRANSMITTED BLOCKS INFORMATION INTEGRITY CONTROL

Authors

  • M. O. Tanygin Southwest State University, Kursk, Russian Federation
  • H. Y. Alshaeaa Southwest State University, Kursk, Russian Federation
  • E. A. Kuleshova Southwest State University, Kursk, Russian Federation

DOI:

https://doi.org/10.15588/1607-3274-2020-1-18

Keywords:

Probability calculation, messages limited in length, authentication control, hash field length, duplicating branches in a chain.

Abstract

Context. For the proper operation of the hardware and software systems, it is necessary that the hardware component receives data only from the corresponding software. Otherwise, the data received from extraneous programs that can be perceived and processed by the device, which can lead to errors in the operation of the device or even a complete loss of its functionality or data. 

Objective. In order to increase the reliability of legal software data and identify the challenges of the transfer of blocks, this article focuses on a comprehensive study of the problems arising from the transmission of information in the form of separate data blocks. 

Method. The methods of integrity control in modes of transmission are described. The method based on hashes and block delivery time is analyzed in detail, analysis the methods of reducing the probability of errors occurring in the receiver and the possibility of reducing the reception of the extraneous blocks when receiving individual blocks of information. This is done by using a set of mathematical equations. And measure the extent of the effect of intensity of receiving extraneous blocks and hash field length.

Results. In the process of analyzing systems in which information is transmitted by block, when using the method of formation of information chains based on the method the hashes and the delivery time of the block, where we note, when the value of the hash field is equal to 6 or more, the probability of occurrence of duplicate branches is acceptably low. Where, when hash field more then 6, the parameter of length of a chain practically does not affect the final probability of constructing a chain from the extraneous blocks. The very same value of the probability of constructing a false chain, the length exceeding the chain of legal blocks at hash field more 6 is about1 10–3, which it’s acceptable for real information transmission systems.

Conclusions. Based on the analysis, we can conclude that in systems in which information is transmitted block by block, when using the method of generating information chains based on the hash and block arrival time, with a hash field of 6 or more, the probability of occurrence of duplicate branches is acceptably low. 

Author Biographies

M. O. Tanygin, Southwest State University, Kursk

Dr. Sc., Associate Professor, Head of the department of Information Security

H. Y. Alshaeaa, Southwest State University, Kursk

Post-graduate student of the department of Information Security

E. A. Kuleshova, Southwest State University, Kursk

Post-graduate student of the department of Information Security

References

National Institute of Standards and Technology. Recommendation for Block Cipher Modes of Operation: NIST Special Publication 800–38A. Gaithersburg, Maryland, October 2010. 11p.

National Institute of Standards and Technology. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. NIST Special Publication 800–38C. Gaithersburg, Maryland, May 2004. 25p.

Tanygin M. O., Tipikin A. P. Architecture of system of hardware restriction of access to information on a computer hard disk, Telecommunications, 2006, No. 3, pp. 44–46.

Knudson L. Block Chaining Modes of Operation. NIST First Modes of Operation Workshop [Electronic resource]. October 2010. Access mode: http://csrc.nist.gov/groups/ST/toolkit/BCM/workshops.html.

Gervais A., Ghassan O., Wüst K., Glykantzis V., Ritzdorf H., Capkun S. On the Security and Performance of Proof of Work Blockchains [Electronic resource], 2016. – Access mode: https://eprint.iacr.org/2016/555.pdf.

Black J., Rogaway P. and Shrimpton T. CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions. Advances in Cryptology, CRYPTO ‘00. Santa Barbara, California, 2000, pp. 197–215.

Swan M. Blockchain: Blueprint for a New Economy. O’Reilly Media, Inc., 2015, 152 p.

McGrew D., Viega J. The Security and Performance of the Galois/Counter Mode (GCM) of Operation, In Proceedings: Indocrypt, 2004, pp. 343–355.

Tanygin M.O. Method of Control of Data Transmitted Between Software and Hardware, Computer Science and Engineering: Materials of the IV International Conference of Young Scientists CSE-2010. Lviv, Publishing House of Polytechnics, 2010, pp. 344–345.

Bellare M., Kilian J., Rogaway P. The security of the cipher block chaining message authentication code, JCSS, 1994, Vol. 3, No. 3, pp. 341–358.

Stallings W. NIST Block Cipher Modes of Operation for Authentication and Combined Confidentiality and Authentication, Cryptologia, 2010, pp. 225 – 23.

Stallings W. The Advanced Encryption Standard. Cryptologia, 2002, No. 26, pp. 165–188.

Tanygin M.O. Calculation of the probability of collisions when using the message authentication algorithm, News SWSU, 2012, pp. 179–183.

Gubarev A. V., Tanygin M. O. Research of dependence of time of searching legal instruction words from the width of the buffer the received instruction words, Telecommunications, 2015, pp. 21–26.

Stallings W. NIST Block Cipher Modes of Operation for Confidentiality, Cryptologia, 34(2), pp. 163–175.

Tilborg H. C. Encyclopedia of Cryptography and Security. Heidelberg, Springer, 2005, pp. 11–15.

Lipmaa H. P., Rogaway P., and Wagner D. CTR Mode Encryption. NIST First Modes of Operation Workshop [Electronic resource]. Access mode: http://csrc.nist.gov/groups/ST/toolkit/BCM/ workshops.html.

Voydock V., Kent S. Security Mechanisms in High-Level Network Protocols, Computing Surveys, June 1983, pp. 135–171.

Tanygin M.O., Search and elimination of collisions in information exchange through open communication channels, Problems of Informatics in Education, Management, Economics and Technology: a collection of articles of the Xth International Scientific and Technical Conference. Penza, Privolzhsky House of Knowledge, 2010. pp. 62–64.

Downloads

How to Cite

Tanygin, M. O., Alshaeaa, H. Y., & Kuleshova, E. A. (2020). A METHOD OF THE TRANSMITTED BLOCKS INFORMATION INTEGRITY CONTROL. Radio Electronics, Computer Science, Control, (1), 181–189. https://doi.org/10.15588/1607-3274-2020-1-18

Issue

Section

Progressive information technologies