Information security with message authentication code

Cover Page

Abstract


This article describes three Message authentication code algorithms. These algorithms ensure the authenticity of the message between two or more parties to the transaction and can be applied in such information bank systems as CFT and so on. Also the results of testing the software implementation of these algorithms are described here.

T A Bilyk

Moscow State Institute of Electronics and Mathematics

Email: bilyk-t@yandex.ru <mailto:bilyk-t@yandex.ru>
Кафедра информационной безопасности; Московский государственный институт электроники и математики; Moscow State Institute of Electronics and Mathematics

A A Vnukov

Peoples' Friendship University of Russia

Email: bilyk-t@yandex.ru <mailto:bilyk-t@yandex.ru>
Кафедра кибернетики и мехатроникиИнженерный факультет; Российский университет дружбы народов; Peoples' Friendship University of Russia

Views

Abstract - 41

PDF (Russian) - 26


Copyright (c) 2012 Билык Т.А., Внуков А.А.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.