Customization Modes for the Harris MK-3 Authenticated Encryption Algorithm

MK-3 is a new proprietary authenticated encryption algorithm based on the duplex sponge construction. To provide security autonomy capability, such that different users can have sovereign variants of the encryption algorithm, MK-3 is designed to be customizable. Two levels of customization are suppo...

Full description

Saved in:
Bibliographic Details
Published in:MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM) pp. 1 - 5
Main Authors: Bajorski, Peter, Kaminsky, Alan, Kurdziel, Michael, Lukowiak, Marcin, Radziszowski, Stanislaw
Format: Conference Proceeding
Language:English
Published: IEEE 01.10.2018
ISSN:2155-7586
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract MK-3 is a new proprietary authenticated encryption algorithm based on the duplex sponge construction. To provide security autonomy capability, such that different users can have sovereign variants of the encryption algorithm, MK-3 is designed to be customizable. Two levels of customization are supported, Factory Customization and Field Customization. Customization is done by modifying functions and function parameters in the algorithm to yield differing cipher functions while preserving the algorithm's security. This paper describes the MK-3 algorithm's customization options and discusses results of testing designed to verify security autonomy among the customized variants.
AbstractList MK-3 is a new proprietary authenticated encryption algorithm based on the duplex sponge construction. To provide security autonomy capability, such that different users can have sovereign variants of the encryption algorithm, MK-3 is designed to be customizable. Two levels of customization are supported, Factory Customization and Field Customization. Customization is done by modifying functions and function parameters in the algorithm to yield differing cipher functions while preserving the algorithm's security. This paper describes the MK-3 algorithm's customization options and discusses results of testing designed to verify security autonomy among the customized variants.
Author Radziszowski, Stanislaw
Kaminsky, Alan
Kurdziel, Michael
Lukowiak, Marcin
Bajorski, Peter
Author_xml – sequence: 1
  givenname: Peter
  surname: Bajorski
  fullname: Bajorski, Peter
  organization: School of Mathematical Sciences, Rochester Institute of Technology
– sequence: 2
  givenname: Alan
  surname: Kaminsky
  fullname: Kaminsky, Alan
  organization: Department of Computer Science, Rochester Institute of Technology
– sequence: 3
  givenname: Michael
  surname: Kurdziel
  fullname: Kurdziel, Michael
  organization: Harris Corporation
– sequence: 4
  givenname: Marcin
  surname: Lukowiak
  fullname: Lukowiak, Marcin
  organization: Department of Computer Engineering, Rochester Institute of Technology
– sequence: 5
  givenname: Stanislaw
  surname: Radziszowski
  fullname: Radziszowski, Stanislaw
  organization: Department of Computer Science, Rochester Institute of Technology
BookMark eNotj9FOwjAYRqvRRMQ9ATd9gWH_tuvay2VBQbdwwz1pt39SwzbSlQt8eo1w9SUnOSf5nsnDMA5IyALYEoCZ13pTldt6yRnopc6MyYHfkcTkGjKhVQ46U_dkxiHL0jzT6okk0_TNGAOuFTcwIx_leYpj739s9ONA67HFiXZjoPGAdG1D8BOtP1NBi_MfGaJvbMSWroYmXE7_SnH8GoOPh_6FPHb2OGFy2znZva125Tqttu-bsqhSb1hMlWtd44zoJO8cIrQGlHLoDKLrBNicNUxxJXnrTMOsFNg6brnstJTSSivmZHHNekTcn4Lvbbjsb-fFL6DiUQw
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/MILCOM.2018.8599712
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Military & Naval Science
Engineering
EISBN 9781538671856
1538671859
EISSN 2155-7586
EndPage 5
ExternalDocumentID 8599712
Genre orig-research
GroupedDBID 6IE
6IF
6IG
6IH
6IL
6IN
AAJGR
AAWTH
ABLEC
ABQGA
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IJVOP
OCL
RIE
RIL
RIO
ID FETCH-LOGICAL-i90t-6bdbcb93f42fbee1d9166beb9eebf31a70c062642db9c0a43edb2a24f8444a4a3
IEDL.DBID RIE
IngestDate Wed Aug 27 02:58:55 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-6bdbcb93f42fbee1d9166beb9eebf31a70c062642db9c0a43edb2a24f8444a4a3
PageCount 5
ParticipantIDs ieee_primary_8599712
PublicationCentury 2000
PublicationDate 2018-Oct.
PublicationDateYYYYMMDD 2018-10-01
PublicationDate_xml – month: 10
  year: 2018
  text: 2018-Oct.
PublicationDecade 2010
PublicationTitle MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM)
PublicationTitleAbbrev MILCOM
PublicationYear 2018
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001286291
ssj0002683877
Score 2.0717762
Snippet MK-3 is a new proprietary authenticated encryption algorithm based on the duplex sponge construction. To provide security autonomy capability, such that...
SourceID ieee
SourceType Publisher
StartPage 1
Title Customization Modes for the Harris MK-3 Authenticated Encryption Algorithm
URI https://ieeexplore.ieee.org/document/8599712
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTwIxEG6QeNCLChh8pgfjyYXubnfbHg2BoLLIgQM30seskgiYZTHh39suG8TEi7e2h6aZvr5Ov_kGoTvjAzFUSXv62RVMY-doAh15jKdGEiFlBIWI64ANh3wyEaMKetjFwgBAQT6DlisWf_lmqdfOVdbmkRDMpRQ-YCzexmrt-VMsNi91X1w9iHnIGSuFhnwi2snToPOaODYXb5U9_UqpUtwovZP_jeUUNX5C8_Bod-mcoQosauh4T1WwhppJobydbfA9Hkq7knC5gevoubO2YG9exl5ilwhthS1sxRYG4r7M7I7HyYsXYuc5czwix5cyuLvQ2aY4W_Djx9sym-Xv8wYa97rjTt8rsyl4M0FyL1ZGaSXClAapAvCNxYWxAiUAVBr6khFN7OOGBkYJTSQNwahABjTllFJJZXiOqovlApoImyggTDLhp2FEDTBrB6oNpH5KuNZcXKC6s9f0c6uXMS1Ndfl38xU6clOyJchdo2qereEGHeqvfLbKbotJ_gY9PKgd
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LTwIxEG4ImqgXFTD47sF4cqG726Xt0RAICIscOHAjfcwqiYBZwIR_b7tsEBMv3toemmb6-jr95huEHowPxFAl7elnVzBtOEcT6MhjPDGSCCkjyERc-2ww4OOxGBbQ0y4WBgAy8hnUXDH7yzcLvXausjqPhGAupfBBRGlAttFaex4Vi85z5RdXDxo85IzlUkM-EfW422--xo7PxWt5X7-SqmR3Svv0f6M5Q5Wf4Dw83F0756gA8xI62dMVLKFqnGlvpxv8iAfSriWcb-EyemmuLdyb5dGX2KVCW2ILXLEFgrgjU7vncdzzQux8Z45J5BhTBrfmOt1kpwt-_nhbpNPV-6yCRu3WqNnx8nwK3lSQlddQRmklwoQGiQLwjUWGDQVKAKgk9CUjmtjnDQ2MEppIGoJRgQxowimlksrwAhXnizlUETZRQJhkwk_CiBpg1g5UG0j8hHCtubhEZWevyedWMWOSm-rq7-Z7dNQZxf1JvzvoXaNjNz1butwNKq7SNdyiQ_21mi7Tu2zCvwEqFKtk
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=MILCOM+2018+-+2018+IEEE+Military+Communications+Conference+%28MILCOM%29&rft.atitle=Customization+Modes+for+the+Harris+MK-3+Authenticated+Encryption+Algorithm&rft.au=Bajorski%2C+Peter&rft.au=Kaminsky%2C+Alan&rft.au=Kurdziel%2C+Michael&rft.au=Lukowiak%2C+Marcin&rft.date=2018-10-01&rft.pub=IEEE&rft.eissn=2155-7586&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FMILCOM.2018.8599712&rft.externalDocID=8599712