"SANDWICH"-LIKE KEYED ALGORITHM BASED ON THE "STREEBOG" HASH FUNCTION

被引:0
|
作者
Kiryukhin, V. A. [1 ,2 ]
Sergeev, A. M. [1 ]
机构
[1] LLC SFB Lab, Moscow, Russia
[2] JSC InfoTeCS, Moscow, Russia
来源
关键词
Streebog; PRF; HMAC; provable security; REDUCED-ROUND GOST; PREIMAGE ATTACKS; CRYPTANALYSIS; SECURE;
D O I
10.17223/20710410/63/2
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
We propose a keyed cryptographic algorithm based on the "Streebog" hash function. We do not make any structural changes to the hash function itself, but only introduce a special type of padding. As a result, the key appears on both sides of the message in so-called "sandwich" manner - hence the name Streebog-S for our construction. "Sandwich" properties make it possible to simplify defenses against side -channel attacks while maintaining their effectiveness. We prove that Streebog-S and other algorithms based on "Streebog", HMAC-Streebog and Streebog-K, remain secure as pseudorandom functions (PRF) and message authentication codes (MAC) even when almost all internal states are leaked to the adversary. This leakage resistance requires additional properties from the underlying compression function, namely collision- and preimage-resistance.
引用
收藏
页码:24 / 48
页数:25
相关论文
共 50 条
  • [11] Collision of one keyed hash function based on chaotic map and analysis
    Shandong Computer Science Center, Jinan 250014, China
    不详
    Wuli Xuebao, 2008, 5 (2737-2742):
  • [12] Cryptanalysis on a parallel keyed hash function based on chaotic neural network
    Wang, Xing-yuan
    Zhao, Jian-feng
    NEUROCOMPUTING, 2010, 73 (16-18) : 3224 - 3228
  • [13] Parallel keyed hash function construction based on chaotic neural network
    Xiao, Di
    Liao, Xiaofeng
    Wang, Yong
    NEUROCOMPUTING, 2009, 72 (10-12) : 2288 - 2296
  • [14] The collision of one keyed hash function based on chaotic map and analysis
    Wang Ji-Zhi
    Wang Mei-Qin
    Wang Ying-Long
    ACTA PHYSICA SINICA, 2008, 57 (05) : 2737 - 2742
  • [15] A keyed hash function based on the modified coupled chaotic map lattice
    Li, Da
    Hu, Gang
    Wang, Shihong
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2012, 17 (06) : 2579 - 2587
  • [16] A chaos-based keyed hash function based on fixed point representation
    Teh, Je Sen
    Tan, Kaijun
    Alawida, Moatsum
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : 649 - 660
  • [17] Improving the security of a parallel keyed hash function based on chaotic maps
    Xiao, Di
    Liao, Xiaofeng
    Wang, Yong
    PHYSICS LETTERS A, 2009, 373 (47) : 4346 - 4353
  • [18] The design of keyed hash function based on CNN-MD structure
    Wang, Yu
    Chen, Liquan
    Wang, Xingyuan
    Wu, Ge
    Yu, Kunliang
    Lu, Tianyu
    CHAOS SOLITONS & FRACTALS, 2021, 152
  • [19] Orchini Similarity User Authentication Based Streebog Hash Function for Secured Data Storage in Cloud
    Bebe, P. Calista
    Akila, D.
    PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND KNOWLEDGE ECONOMY (ICCIKE' 2019), 2019, : 468 - 473
  • [20] A more secure parallel keyed hash function based on chaotic neural network
    Huang, Zhongquan
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2011, 16 (08) : 3245 - 3256