Customization Modes for the Harris MK-3 Authenticated Encryption Algorithm
MK-3 is a new proprietary authenticated encryption algorithm based on the duplex sponge construction. To provide security autonomy capability, such that different users can have sovereign variants of the encryption algorithm, MK-3 is designed to be customizable. Two levels of customization are suppo...
Uloženo v:
| Vydáno v: | MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM) s. 1 - 5 |
|---|---|
| Hlavní autoři: | , , , , |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
01.10.2018
|
| ISSN: | 2155-7586 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | MK-3 is a new proprietary authenticated encryption algorithm based on the duplex sponge construction. To provide security autonomy capability, such that different users can have sovereign variants of the encryption algorithm, MK-3 is designed to be customizable. Two levels of customization are supported, Factory Customization and Field Customization. Customization is done by modifying functions and function parameters in the algorithm to yield differing cipher functions while preserving the algorithm's security. This paper describes the MK-3 algorithm's customization options and discusses results of testing designed to verify security autonomy among the customized variants. |
|---|---|
| AbstractList | MK-3 is a new proprietary authenticated encryption algorithm based on the duplex sponge construction. To provide security autonomy capability, such that different users can have sovereign variants of the encryption algorithm, MK-3 is designed to be customizable. Two levels of customization are supported, Factory Customization and Field Customization. Customization is done by modifying functions and function parameters in the algorithm to yield differing cipher functions while preserving the algorithm's security. This paper describes the MK-3 algorithm's customization options and discusses results of testing designed to verify security autonomy among the customized variants. |
| Author | Radziszowski, Stanislaw Kaminsky, Alan Kurdziel, Michael Lukowiak, Marcin Bajorski, Peter |
| Author_xml | – sequence: 1 givenname: Peter surname: Bajorski fullname: Bajorski, Peter organization: School of Mathematical Sciences, Rochester Institute of Technology – sequence: 2 givenname: Alan surname: Kaminsky fullname: Kaminsky, Alan organization: Department of Computer Science, Rochester Institute of Technology – sequence: 3 givenname: Michael surname: Kurdziel fullname: Kurdziel, Michael organization: Harris Corporation – sequence: 4 givenname: Marcin surname: Lukowiak fullname: Lukowiak, Marcin organization: Department of Computer Engineering, Rochester Institute of Technology – sequence: 5 givenname: Stanislaw surname: Radziszowski fullname: Radziszowski, Stanislaw organization: Department of Computer Science, Rochester Institute of Technology |
| BookMark | eNotj9FOwjAYRqvRRMQ9ATd9gWH_tuvay2VBQbdwwz1pt39SwzbSlQt8eo1w9SUnOSf5nsnDMA5IyALYEoCZ13pTldt6yRnopc6MyYHfkcTkGjKhVQ46U_dkxiHL0jzT6okk0_TNGAOuFTcwIx_leYpj739s9ONA67HFiXZjoPGAdG1D8BOtP1NBi_MfGaJvbMSWroYmXE7_SnH8GoOPh_6FPHb2OGFy2znZva125Tqttu-bsqhSb1hMlWtd44zoJO8cIrQGlHLoDKLrBNicNUxxJXnrTMOsFNg6brnstJTSSivmZHHNekTcn4Lvbbjsb-fFL6DiUQw |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1109/MILCOM.2018.8599712 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Military & Naval Science Engineering |
| EISBN | 9781538671856 1538671859 |
| EISSN | 2155-7586 |
| EndPage | 5 |
| ExternalDocumentID | 8599712 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IG 6IH 6IL 6IN AAJGR AAWTH ABLEC ABQGA ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IJVOP OCL RIE RIL RIO |
| ID | FETCH-LOGICAL-i90t-6bdbcb93f42fbee1d9166beb9eebf31a70c062642db9c0a43edb2a24f8444a4a3 |
| IEDL.DBID | RIE |
| IngestDate | Wed Aug 27 02:58:55 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i90t-6bdbcb93f42fbee1d9166beb9eebf31a70c062642db9c0a43edb2a24f8444a4a3 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_8599712 |
| PublicationCentury | 2000 |
| PublicationDate | 2018-Oct. |
| PublicationDateYYYYMMDD | 2018-10-01 |
| PublicationDate_xml | – month: 10 year: 2018 text: 2018-Oct. |
| PublicationDecade | 2010 |
| PublicationTitle | MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM) |
| PublicationTitleAbbrev | MILCOM |
| PublicationYear | 2018 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0001286291 ssj0002683877 |
| Score | 2.0717762 |
| Snippet | MK-3 is a new proprietary authenticated encryption algorithm based on the duplex sponge construction. To provide security autonomy capability, such that... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| Title | Customization Modes for the Harris MK-3 Authenticated Encryption Algorithm |
| URI | https://ieeexplore.ieee.org/document/8599712 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTwIxEG6QeNCLChh8pgfjyYVlW_o4GgLxAciBGG6kj1klkcUsiwn_3nbZICZevDTbHjabtrP9ZvrNNwjdkMiGTMVxAM4cAmpdo1hMAmKs8xbaADwPZb_2-XAoJhM5KqG7bS4MAOTkM2j4x_wu3y7MyofKmqItJfclhfc4Z5tcrZ14isPmhe6L70dMEMF5ITTUCmVz8NjvvAw8m0s0ijf9KqmSnyi9o_99yzGq_aTm4dH20DlBJUgq6HBHVbCC6oNceTtd41s8VG4n4cKAq-ips3Jgb17kXmJfCG2JHWzFDgbiB5U6i8eD54BgHznzPCLPl7K4m5h0nf9b8P3H2yKdZe_zGhr3uuPOQ1BUUwhmMswCpq02WpKYRrEGaFmHC5kGLQF0TFqKhyZ0zg2NrJYmVJSA1ZGKaCwopYoqcorKySKBOsKWG0YtBzfMKDOhiKVzs6g1EbchGHGGqn6-pp8bvYxpMVXnfw9foAO_JBuC3CUqZ-kKrtC--cpmy_Q6X-RvuWKn4A |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PT8IwFG6ImqgXFTD4uwfjyUFZy7oeDYGAMORADDfSH29KImDGMOG_tx0LYuLFS7P2sCxt3_q91-99D6F76hsSyDj2wJqDx4xtZBBTj2pjvYUGAM9C2a99PhiE47EYFtDjNhcGADLyGVTdY3aXbxZ65UJltbAhBHclhfcbjPlkk621E1Gx6DxXfnF9PwhpyHkuNVQnohZ1-82XyPG5wmr-rl9FVbIzpX3yv685ReWf5Dw83B47Z6gA8yI63tEVLKJKlGlvJ2v8gAfS7iWcm3AJPTdXFu7N8uxL7EqhLbEFrtgCQdyRibV5HPU8il3szDGJHGPK4NZcJ-vs74KfPt4WyTR9n5XRqN0aNTteXk_BmwqSeoEySitBY-bHCqBuLDIMFCgBoGJal5xoYt0b5hslNJGMglG-9FkcMsYkk_Qc7c0Xc6ggbLgOmOFghwMWaBLGwjpazGifGwI6vEAlN1-Tz41ixiSfqsu_h-_QYWcU9Sf97qB3hY7c8mzoctdoL01WcIMO9Fc6XSa32YJ_A6Lgqyc |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=MILCOM+2018+-+2018+IEEE+Military+Communications+Conference+%28MILCOM%29&rft.atitle=Customization+Modes+for+the+Harris+MK-3+Authenticated+Encryption+Algorithm&rft.au=Bajorski%2C+Peter&rft.au=Kaminsky%2C+Alan&rft.au=Kurdziel%2C+Michael&rft.au=Lukowiak%2C+Marcin&rft.date=2018-10-01&rft.pub=IEEE&rft.eissn=2155-7586&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FMILCOM.2018.8599712&rft.externalDocID=8599712 |