Organization of storage of results of intermediate calculations in tasks of authentication of message sources of limited length


Аuthors

Tanygin M. O.*, Chesnokova A. A.**, Dobritsa V. P.***

South-Western State University, 94, 50-let Oktyabrya str., Kursk, 305040, Russia

*e-mail: tanygin@yandex.ru
**e-mail: chesnokova.50@yandex.ru
***e-mail: dobritsa@mail.ru

Abstract

The authors conducted a study on the practical implementation of the approach to the message sources of limited length authentication. This approach is based on the coding application in the blocks chaining mode. Organization of the address space for the intermediate calculations results storing, which are presented in the form of an oriented tree graph, is described. The article demonstrates the possibility of identifying sections for each such graph where its modification occurs, and the sections, which turned out to be unmodified at certain stages of the authentication procedure execution. Such a difference in access modes is a prerequisite for organizing a system of parallel processing of these graph structures.

The article demonstrates as well that application of this memory organization allows dividing the entire procedure of processing a message of limited length into five stages. Of these stages, the three can be implemented by specialized modules that operate in parallel and access the disjoint areas of the register matrix. Implementation of asynchronous parallel operation of modules, executing decoding operations of the incoming data packets, their placing in the disjoint areas of register memory and analyzing the results of intermediate calculations allows to increasing the authentication procedure speed.

An assessment of the theoretically achievable level of parallelization of the message processing procedure was performed as well. The assessment revealed that the bit depth of the authentication code determines the nature of the maximum level of parallelization dependence on the number of interacting sources. In case of the code bit depth exceeds the theoretical applicability limit of the approach based on coding in the block coupling mode, it is advisable to employ no more than five decoding and processing blocks in a tree-like system for parallel operation, while dividing the memory space for storing intermediate results into an appropriate number of areas.

Keywords:

message source, block internal memory, intermediate calculations, authentication, register matrix

References

  1. IEEE Std 802.15.4-2020. IEEE Standard for Low-Rate Wireless Networks, pp.1-800, 23 July 2020. DOI: 10.1109/IEEESTD.2020.9144691

  2. Petrov D. Elektronnye komponenty, 2010, no. 10, pp. 28-32.

  3. Perri L. Arkhitektura interneta veshchei (Architecture of the Internet of Things), Moscow, DMK Press, 2018, 454 p.

  4. Kotov V.N., Mel'nik E.V., Shcherbinin I.P., Korovin Ya.S. Poleznaya model' 89257 G06F 15/00, 2009.11.27

  5. Akimov A.A., Bogatyrev V.E., Finogeev A.G. Trudy mezhdunarodnogo simpoziuma "Nadezhnost' i kachestvo", 2010, vol. 1, pp. 225-229.

  6. Kucheryavyi A.E., Al'-Kadami N.A. Elektrosvyaz', 2015, no. 3, pp. 22–26.

  7. Borzov D.B., Dyubryuks S.A., Sokolova Yu.V. Trudy MAI, 2020, no. 114. URL: https://trudymai.ru/eng/published.php?ID=118998. DOI: 10.34759/trd-2020-114-13

  8. Molchanov D.A. Elektrosvyaz, 2006, no. 6, pp. 24–28.

  9. Kireev A.O., Svetlov A.V. Izvestiya YuFU. Tekhnicheskie nauki, 2011, no. 5 (118), pp. 60–65.

  10. Galkin P.V. ScienceRise, 2014, no. 2 (2), S. 55–61.

  11. Levchenko P., Bankov D., Khorov E., Lyakhov A. Performance Comparison of NB-Fi, Sigfox, and LoRaWAN, Sensors, 2022, vol. 22 (24), pp. 9633. DOI: 10.3390/s22249633

  12. Standart ISO 21384-3:2019(E). Bespilotnye aviatsionnye sistemy. Chast' 3. Ekspluatatsionnye protsedury (ISO 21384-3:2019 standard(E).13. Unmanned aircraft systems. Part 3. Operational procedures). URL: https://www.gostinfo.ru/catalog/Details/?id=6479351

  13. J. Zhao, D. Cheng, Ch. Hao. An Improved Ant Colony Algorithm for Solving the Path Planning Problem of the Omnidirectional Mobile Vehicle, Mathematical Problems in Engineering, 2016, vol. 12. DOI: 10.1155/2016/7672839

  14. D. Shanti, P. Premkumar. Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage, Scientific Research Publishing, 2016, vol. 7, no. 11, pp. 3626-3644. DOI: 10.4236/CS.2016.711307

  15. Black J., Rogaway P., Cryptol J. CBC MACs for arbitrary-length messages: The three-key constructions, 2015, vol. 18, no. 2. pp. 111–131.

  16. Ben Othman S., Alzaid H., Trad A., Youssef H. An efficient secure data aggregation scheme for wireless sensor networks, Information, Intelligence, Systems and Applications (IISA), 2013 Fourth International Conference, 2013. DOI: 10.1109/ii.sa.2013.6623701

  17. Bellare M., Kilian J., Rogaway P. The security of the cipher block chaining message authentication code, Journal of Computer and System Sciences, 2000, vol. 61 (3), pp. 362-399. DOI: 10.1006/jcss.1999.1694

  18. Stallings W. NIST block cipher modes of operation for authentication and combined confidentiality and authentication, Cryptologia, 2010, no. 34, pp. 225- 235. DOI: 10.1080/01611191003598295

  19. Tanygin M.O., Alshaia Kh.Ya., Dobritsa V.P. Trudy MAI, 2020, no. 114. URL: https://trudymai.ru/eng/published.php?ID=119007. DOI: 10.34759/trd-2020-114-155

  20. Plugatarev A.V. Prikaspiiskii zhurnal: upravlenie i vysokie tekhnologii, 2022, no. 4 (60), pp. 30-37. DOI: 10.54398/20741707_2022_4_30

  21. Tanygin M.O., Chesnokova A.A., Akhmad A.A.A. Prikaspiiskii zhurnal: upravlenie i vysokie tekhnologii, 2022, no. 4 (60), pp. 22-29.

  22. Tanygin M.O., Akhmad A.A.A., Kazakova O.V., Golubov D. Izvestiya Yugo-Zapadnogo gosudarstvennogo universiteta, 2023, vol. 27, no. 1, pp. 73-91. DOI: 10.21869/2223-1560-2023-27-1-73-91

  23. Spevakov A.G., Kalutskii I.V. Trudy MAI, 2020, no. 115. URL: https://trudymai.ru/eng/published.php?ID=119939. DOI: 10.34759/trd-2020-115-13

  24. Masyukov I.I., Borzov D.B., Titov D.V., Sokolova Yu.V. Trudy MAI, 2021, no. 119. URL: https://trudymai.ru/eng/published.php?ID=159791. DOI: 10.34759/trd-2021-119-13

  25. Tanygin M.O., Dobroserdov O.G., Vlasova A.O., Akhmad A.A.A. Trudy MAI, 2021, no. 118. URL: https://trudymai.ru/eng/published.php?ID=158253. DOI: 10.34759/trd-2021-118-14

  26. Nestruev D.S., Borzov D.B. Trudy MAI, 2023, no. 128. URL: https://trudymai.ru/eng/published.php?ID=171407. DOI: 10.34759/trd-2023-128-19

  27. Alshaia Khaider Ya.A. Metod i algoritm obrabotki dannykh na osnove identifikatorov v spetsializirovannom vychislitel'nom ustroistve (Method and algorithm of data processing based on identifiers in a specialized computing device): Doctor's thesis, Kursk, 2021, 138 p.


Download

mai.ru — informational site MAI

Copyright © 2000-2024 by MAI

Вход