Information security with message authentication code

Cover Page

Cite item

Abstract

This article describes three Message authentication code algorithms. These algorithms ensure the authenticity of the message between two or more parties to the transaction and can be applied in such information bank systems as CFT and so on. Also the results of testing the software implementation of these algorithms are described here.

About the authors

T A Bilyk

Moscow State Institute of Electronics and Mathematics

Email: bilyk-t@yandex.ru <mailto:bilyk-t@yandex.ru>
Кафедра информационной безопасности; Московский государственный институт электроники и математики; Moscow State Institute of Electronics and Mathematics

A A Vnukov

Peoples' Friendship University of Russia

Email: bilyk-t@yandex.ru <mailto:bilyk-t@yandex.ru>
Кафедра кибернетики и мехатроникиИнженерный факультет; Российский университет дружбы народов; Peoples' Friendship University of Russia

References


Copyright (c) 2012 Билык Т.А., Внуков А.А.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies