"SANDWICH"-LIKE KEYED ALGORITHM BASED ON THE "STREEBOG" HASH FUNCTION

被引:0
|
作者
Kiryukhin, V. A. [1 ,2 ]
Sergeev, A. M. [1 ]
机构
[1] LLC SFB Lab, Moscow, Russia
[2] JSC InfoTeCS, Moscow, Russia
来源
关键词
Streebog; PRF; HMAC; provable security; REDUCED-ROUND GOST; PREIMAGE ATTACKS; CRYPTANALYSIS; SECURE;
D O I
10.17223/20710410/63/2
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
We propose a keyed cryptographic algorithm based on the "Streebog" hash function. We do not make any structural changes to the hash function itself, but only introduce a special type of padding. As a result, the key appears on both sides of the message in so-called "sandwich" manner - hence the name Streebog-S for our construction. "Sandwich" properties make it possible to simplify defenses against side -channel attacks while maintaining their effectiveness. We prove that Streebog-S and other algorithms based on "Streebog", HMAC-Streebog and Streebog-K, remain secure as pseudorandom functions (PRF) and message authentication codes (MAC) even when almost all internal states are leaked to the adversary. This leakage resistance requires additional properties from the underlying compression function, namely collision- and preimage-resistance.
引用
收藏
页码:24 / 48
页数:25
相关论文
共 50 条
  • [1] BentSign: keyed hash algorithm based on bent Boolean function and chaotic attractor
    Todorova, M.
    Stoyanov, B.
    Szczypiorski, K.
    Graniszewski, W.
    Kordov, K.
    BULLETIN OF THE POLISH ACADEMY OF SCIENCES-TECHNICAL SCIENCES, 2019, 67 (03) : 557 - 569
  • [2] Keyed hash function based on a chaotic map
    Kanso, A.
    Yahyaoui, H.
    Almulla, M.
    INFORMATION SCIENCES, 2012, 186 (01) : 249 - 264
  • [3] Keyed hash function based on a dynamic lookup table of functions
    Li, Yantao
    Xiao, Di
    Deng, Shaojiang
    INFORMATION SCIENCES, 2012, 214 : 56 - 75
  • [4] A fast and efficient chaos-based keyed hash function
    Kanso, A.
    Ghebleh, M.
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2013, 18 (01) : 109 - 123
  • [5] Design and Evaluation of Chaotic Iterations Based Keyed Hash Function
    Lin, Zhuosheng
    Guyeux, Christophe
    Yu, Simin
    Wang, Qianxue
    INFORMATION SCIENCE AND APPLICATIONS 2017, ICISA 2017, 2017, 424 : 404 - 414
  • [6] Parallel keyed hash function construction based on chaotic maps
    Xiao, Di
    Liao, Xiaofeng
    Deng, Shaojiang
    PHYSICS LETTERS A, 2008, 372 (26) : 4682 - 4688
  • [7] Keyed Hash function based on composite nonlinear autoregressive filter
    Wang, XM
    Zhang, JS
    Zhang, WF
    ACTA PHYSICA SINICA, 2005, 54 (12) : 5566 - 5573
  • [8] Cryptanalysis on a parallel keyed hash function based on chaotic maps
    Guo, Wei
    Wang, Xiaoming
    He, Dake
    Cao, Yang
    PHYSICS LETTERS A, 2009, 373 (36) : 3201 - 3206
  • [10] A chaos-based keyed hash function based on fixed point representation
    Je Sen Teh
    Kaijun Tan
    Moatsum Alawida
    Cluster Computing, 2019, 22 : 649 - 660