CRYPTOGRAPHICALLY STRICT USER IDENTIFICATION BASED ON HASH TRANSFORMATIONS WITH PROGRAMMED COLLISIONS

Authors

  • Daiko Ihor Volodumirivich National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", Ukraine
  • Markovskyi Oleksandr Petrovich National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", Ukraine
  • Steblevets Tetyana Oleksandrivna National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", Ukraine

Abstract

The article proposes an approach to high-speed remote users identification based on hash transformation with programmed collision whose fulfils the role of session paroles. The hash transformation is constructed in the form of a multilayer structure, the elements of which are tabular nonlinear Boolean transformations and permutations. A hash transformation synthesis procedure has been developed. Keywords: remote user entification, hash transfrmation, zero-knowledge identification. Fig .: 2. Tabl .: 0. Bibl .: 11.

Published

2023-11-08

Issue

Section

Security, Fault Tolerance