Abstract | ||
---|---|---|
MK-3 is a new proprietary authenticated encryption algorithm based on the duplex sponge construction. To provide security autonomy capability, such that different users can have sovereign variants of the encryption algorithm, MK-3 is designed to be customizable. Two levels of customization are supported, Factory Customization and Field Customization. Customization is done by modifying functions and function parameters in the algorithm to yield differing cipher functions while preserving the algorithm's security. This paper describes the MK-3 algorithm's customization options and discusses results of testing designed to verify security autonomy among the customized variants. |
Year | DOI | Venue |
---|---|---|
2018 | 10.1109/MILCOM.2018.8599712 | MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM) |
Keywords | Field | DocType |
proprietary authenticated encryption algorithm,duplex sponge construction,security autonomy capability,function parameters,customized variants,Harris MK-3 authenticated encryption algorithm,field customization,factory customization,differing cipher functions,algorithm security,MK-3 algorithm customization,security autonomy | Cipher,Computer science,Algorithm,Encryption,Authenticated encryption,Personalization | Conference |
ISSN | ISBN | Citations |
2155-7578 | 978-1-5386-7186-3 | 0 |
PageRank | References | Authors |
0.34 | 2 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Bajorski, P. | 1 | 19 | 2.94 |
Alan Kaminsky | 2 | 45 | 6.24 |
Michael T. Kurdziel | 3 | 2 | 1.78 |
Marcin Lukowiak | 4 | 38 | 9.16 |
Stanislaw P. Radziszowski | 5 | 108 | 23.90 |