Array-Based Statistical Analysis of the MK-3 Customizable Authenticated Encryption Algorithm
Uloženo v:
| Název: | Array-Based Statistical Analysis of the MK-3 Customizable Authenticated Encryption Algorithm |
|---|---|
| Autoři: | Peter Bajorski, Alan Kaminsky, Michael Kurdziel, Marcin Łukowiak, Stanisław Radziszowski |
| Informace o vydavateli: | Research Square Platform LLC, 2023. |
| Rok vydání: | 2023 |
| Popis: | To provide security autonomy capability, such that different users can have independent variants of the encryption algorithm, MK-3 is designed to be customizable. Two levels of customization are supported, Factory Customization and Field Customization. Customization is done by modifying functions and function parameters in the algorithm to yield unique cipher functions while preserving the algorithm’s cryptographic security. The main goal of this work is to present the results from the statistical analysis of the customizable MK-3 encryption cypher, focusing on field customized mixers. We recall the main components of the MK-3 algorithm and overview a subset of available factory and field customizations for MK-3. We test the main instances of the field customized versions and give a general argument for their desired statistical properties expected from an encryption cypher. |
| Druh dokumentu: | Article |
| DOI: | 10.21203/rs.3.rs-3237742/v1 |
| Rights: | CC BY |
| Přístupové číslo: | edsair.doi...........a2d914b8f23fb818ab1cbce1d7988cb1 |
| Databáze: | OpenAIRE |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Bajorski%20P Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edsair DbLabel: OpenAIRE An: edsair.doi...........a2d914b8f23fb818ab1cbce1d7988cb1 RelevancyScore: 898 AccessLevel: 3 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 897.639770507813 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: Array-Based Statistical Analysis of the MK-3 Customizable Authenticated Encryption Algorithm – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Peter+Bajorski%22">Peter Bajorski</searchLink><br /><searchLink fieldCode="AR" term="%22Alan+Kaminsky%22">Alan Kaminsky</searchLink><br /><searchLink fieldCode="AR" term="%22Michael+Kurdziel%22">Michael Kurdziel</searchLink><br /><searchLink fieldCode="AR" term="%22Marcin+Łukowiak%22">Marcin Łukowiak</searchLink><br /><searchLink fieldCode="AR" term="%22Stanisław+Radziszowski%22">Stanisław Radziszowski</searchLink> – Name: Publisher Label: Publisher Information Group: PubInfo Data: Research Square Platform LLC, 2023. – Name: DatePubCY Label: Publication Year Group: Date Data: 2023 – Name: Abstract Label: Description Group: Ab Data: To provide security autonomy capability, such that different users can have independent variants of the encryption algorithm, MK-3 is designed to be customizable. Two levels of customization are supported, Factory Customization and Field Customization. Customization is done by modifying functions and function parameters in the algorithm to yield unique cipher functions while preserving the algorithm’s cryptographic security. The main goal of this work is to present the results from the statistical analysis of the customizable MK-3 encryption cypher, focusing on field customized mixers. We recall the main components of the MK-3 algorithm and overview a subset of available factory and field customizations for MK-3. We test the main instances of the field customized versions and give a general argument for their desired statistical properties expected from an encryption cypher. – Name: TypeDocument Label: Document Type Group: TypDoc Data: Article – Name: DOI Label: DOI Group: ID Data: 10.21203/rs.3.rs-3237742/v1 – Name: Copyright Label: Rights Group: Cpyrght Data: CC BY – Name: AN Label: Accession Number Group: ID Data: edsair.doi...........a2d914b8f23fb818ab1cbce1d7988cb1 |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsair&AN=edsair.doi...........a2d914b8f23fb818ab1cbce1d7988cb1 |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.21203/rs.3.rs-3237742/v1 Languages: – Text: Undetermined Titles: – TitleFull: Array-Based Statistical Analysis of the MK-3 Customizable Authenticated Encryption Algorithm Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Peter Bajorski – PersonEntity: Name: NameFull: Alan Kaminsky – PersonEntity: Name: NameFull: Michael Kurdziel – PersonEntity: Name: NameFull: Marcin Łukowiak – PersonEntity: Name: NameFull: Stanisław Radziszowski IsPartOfRelationships: – BibEntity: Dates: – D: 29 M: 08 Type: published Y: 2023 Identifiers: – Type: issn-locals Value: edsair – Type: issn-locals Value: edsairFT |
| ResultId | 1 |
Nájsť tento článok vo Web of Science