Description
MK-3 is a new proprietary authenticated encryption algorithm based on the duplex sponge construction. To provide security autonomy capability, such that different users can have sovereign variants of the encryption algorithm, MK-3 is designed to be customizable. Two levels of customization are supported, Factory Customization and Field Customization. Customization is done by modifying functions and function parameters in the algorithm to yield differing cipher functions while preserving the algorithm’s security. This paper describes the MK-3 algorithm’s customization options and discusses results of testing designed to verify security autonomy among the customized variants.
Date of creation, presentation, or exhibit
9-30-2018
Document Type
Conference Paper
Department, Program, or Center
Computer Science (GCCIS)
Recommended Citation
P. Bajorski, A. Kaminsky, M. Kurdziel, M. Łukowiak and S. Radziszowski, "Customization Modes for the Harris MK-3 Authenticated Encryption Algorithm," MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM), Los Angeles, CA, 2018, pp. 1-5, doi: 10.1109/MILCOM.2018.8599712.
Campus
RIT – Main Campus
Comments
© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.