Customization Modes for the Harris MK-3 Authenticated Encryption Algorithm

MK-3 is a new proprietary authenticated encryption algorithm based on the duplex sponge construction. To provide security autonomy capability, such that different users can have sovereign variants of the encryption algorithm, MK-3 is designed to be customizable. Two levels of customization are suppo...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM) s. 1 - 5
Hlavní autoři: Bajorski, Peter, Kaminsky, Alan, Kurdziel, Michael, Lukowiak, Marcin, Radziszowski, Stanislaw
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 01.10.2018
ISSN:2155-7586
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract MK-3 is a new proprietary authenticated encryption algorithm based on the duplex sponge construction. To provide security autonomy capability, such that different users can have sovereign variants of the encryption algorithm, MK-3 is designed to be customizable. Two levels of customization are supported, Factory Customization and Field Customization. Customization is done by modifying functions and function parameters in the algorithm to yield differing cipher functions while preserving the algorithm's security. This paper describes the MK-3 algorithm's customization options and discusses results of testing designed to verify security autonomy among the customized variants.
AbstractList MK-3 is a new proprietary authenticated encryption algorithm based on the duplex sponge construction. To provide security autonomy capability, such that different users can have sovereign variants of the encryption algorithm, MK-3 is designed to be customizable. Two levels of customization are supported, Factory Customization and Field Customization. Customization is done by modifying functions and function parameters in the algorithm to yield differing cipher functions while preserving the algorithm's security. This paper describes the MK-3 algorithm's customization options and discusses results of testing designed to verify security autonomy among the customized variants.
Author Radziszowski, Stanislaw
Kaminsky, Alan
Kurdziel, Michael
Lukowiak, Marcin
Bajorski, Peter
Author_xml – sequence: 1
  givenname: Peter
  surname: Bajorski
  fullname: Bajorski, Peter
  organization: School of Mathematical Sciences, Rochester Institute of Technology
– sequence: 2
  givenname: Alan
  surname: Kaminsky
  fullname: Kaminsky, Alan
  organization: Department of Computer Science, Rochester Institute of Technology
– sequence: 3
  givenname: Michael
  surname: Kurdziel
  fullname: Kurdziel, Michael
  organization: Harris Corporation
– sequence: 4
  givenname: Marcin
  surname: Lukowiak
  fullname: Lukowiak, Marcin
  organization: Department of Computer Engineering, Rochester Institute of Technology
– sequence: 5
  givenname: Stanislaw
  surname: Radziszowski
  fullname: Radziszowski, Stanislaw
  organization: Department of Computer Science, Rochester Institute of Technology
BookMark eNotj9FOwjAYRqvRRMQ9ATd9gWH_tuvay2VBQbdwwz1pt39SwzbSlQt8eo1w9SUnOSf5nsnDMA5IyALYEoCZ13pTldt6yRnopc6MyYHfkcTkGjKhVQ46U_dkxiHL0jzT6okk0_TNGAOuFTcwIx_leYpj739s9ONA67HFiXZjoPGAdG1D8BOtP1NBi_MfGaJvbMSWroYmXE7_SnH8GoOPh_6FPHb2OGFy2znZva125Tqttu-bsqhSb1hMlWtd44zoJO8cIrQGlHLoDKLrBNicNUxxJXnrTMOsFNg6brnstJTSSivmZHHNekTcn4Lvbbjsb-fFL6DiUQw
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/MILCOM.2018.8599712
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Military & Naval Science
Engineering
EISBN 9781538671856
1538671859
EISSN 2155-7586
EndPage 5
ExternalDocumentID 8599712
Genre orig-research
GroupedDBID 6IE
6IF
6IG
6IH
6IL
6IN
AAJGR
AAWTH
ABLEC
ABQGA
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IJVOP
OCL
RIE
RIL
RIO
ID FETCH-LOGICAL-i90t-6bdbcb93f42fbee1d9166beb9eebf31a70c062642db9c0a43edb2a24f8444a4a3
IEDL.DBID RIE
IngestDate Wed Aug 27 02:58:55 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-6bdbcb93f42fbee1d9166beb9eebf31a70c062642db9c0a43edb2a24f8444a4a3
PageCount 5
ParticipantIDs ieee_primary_8599712
PublicationCentury 2000
PublicationDate 2018-Oct.
PublicationDateYYYYMMDD 2018-10-01
PublicationDate_xml – month: 10
  year: 2018
  text: 2018-Oct.
PublicationDecade 2010
PublicationTitle MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM)
PublicationTitleAbbrev MILCOM
PublicationYear 2018
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001286291
ssj0002683877
Score 2.0717762
Snippet MK-3 is a new proprietary authenticated encryption algorithm based on the duplex sponge construction. To provide security autonomy capability, such that...
SourceID ieee
SourceType Publisher
StartPage 1
Title Customization Modes for the Harris MK-3 Authenticated Encryption Algorithm
URI https://ieeexplore.ieee.org/document/8599712
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTwIxEG6QeNCLChh8pgfjyYVlW_o4GgLxAciBGG6kj1klkcUsiwn_3nbZICZevDTbHjabtrP9ZvrNNwjdkMiGTMVxAM4cAmpdo1hMAmKs8xbaADwPZb_2-XAoJhM5KqG7bS4MAOTkM2j4x_wu3y7MyofKmqItJfclhfc4Z5tcrZ14isPmhe6L70dMEMF5ITTUCmVz8NjvvAw8m0s0ijf9KqmSnyi9o_99yzGq_aTm4dH20DlBJUgq6HBHVbCC6oNceTtd41s8VG4n4cKAq-ips3Jgb17kXmJfCG2JHWzFDgbiB5U6i8eD54BgHznzPCLPl7K4m5h0nf9b8P3H2yKdZe_zGhr3uuPOQ1BUUwhmMswCpq02WpKYRrEGaFmHC5kGLQF0TFqKhyZ0zg2NrJYmVJSA1ZGKaCwopYoqcorKySKBOsKWG0YtBzfMKDOhiKVzs6g1EbchGHGGqn6-pp8bvYxpMVXnfw9foAO_JBuC3CUqZ-kKrtC--cpmy_Q6X-RvuWKn4A
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PT8IwFG6ImqgXFTD4uwfjyUFZy7oeDYGAMORADDfSH29KImDGMOG_tx0LYuLFS7P2sCxt3_q91-99D6F76hsSyDj2wJqDx4xtZBBTj2pjvYUGAM9C2a99PhiE47EYFtDjNhcGADLyGVTdY3aXbxZ65UJltbAhBHclhfcbjPlkk621E1Gx6DxXfnF9PwhpyHkuNVQnohZ1-82XyPG5wmr-rl9FVbIzpX3yv685ReWf5Dw83B47Z6gA8yI63tEVLKJKlGlvJ2v8gAfS7iWcm3AJPTdXFu7N8uxL7EqhLbEFrtgCQdyRibV5HPU8il3szDGJHGPK4NZcJ-vs74KfPt4WyTR9n5XRqN0aNTteXk_BmwqSeoEySitBY-bHCqBuLDIMFCgBoGJal5xoYt0b5hslNJGMglG-9FkcMsYkk_Qc7c0Xc6ggbLgOmOFghwMWaBLGwjpazGifGwI6vEAlN1-Tz41ixiSfqsu_h-_QYWcU9Sf97qB3hY7c8mzoctdoL01WcIMO9Fc6XSa32YJ_A6Lgqyc
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=MILCOM+2018+-+2018+IEEE+Military+Communications+Conference+%28MILCOM%29&rft.atitle=Customization+Modes+for+the+Harris+MK-3+Authenticated+Encryption+Algorithm&rft.au=Bajorski%2C+Peter&rft.au=Kaminsky%2C+Alan&rft.au=Kurdziel%2C+Michael&rft.au=Lukowiak%2C+Marcin&rft.date=2018-10-01&rft.pub=IEEE&rft.eissn=2155-7586&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FMILCOM.2018.8599712&rft.externalDocID=8599712