"SANDWICH"-LIKE KEYED ALGORITHM BASED ON THE "STREEBOG" HASH FUNCTION

被引:0
|
作者
Kiryukhin, V. A. [1 ,2 ]
Sergeev, A. M. [1 ]
机构
[1] LLC SFB Lab, Moscow, Russia
[2] JSC InfoTeCS, Moscow, Russia
来源
关键词
Streebog; PRF; HMAC; provable security; REDUCED-ROUND GOST; PREIMAGE ATTACKS; CRYPTANALYSIS; SECURE;
D O I
10.17223/20710410/63/2
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
We propose a keyed cryptographic algorithm based on the "Streebog" hash function. We do not make any structural changes to the hash function itself, but only introduce a special type of padding. As a result, the key appears on both sides of the message in so-called "sandwich" manner - hence the name Streebog-S for our construction. "Sandwich" properties make it possible to simplify defenses against side -channel attacks while maintaining their effectiveness. We prove that Streebog-S and other algorithms based on "Streebog", HMAC-Streebog and Streebog-K, remain secure as pseudorandom functions (PRF) and message authentication codes (MAC) even when almost all internal states are leaked to the adversary. This leakage resistance requires additional properties from the underlying compression function, namely collision- and preimage-resistance.
引用
收藏
页码:24 / 48
页数:25
相关论文
共 50 条
  • [31] A Topologically Simple Keyed Hash Function Based on Circular Chaotic Sinusoidal Map Network
    Jiteurtragool, N.
    Ketthong, P.
    Wannaboon, C.
    San-Um, W.
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 1089 - 1094
  • [32] Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter
    Zhang, Jiashu
    Wang, Xiaomin
    Zhang, Wenfang
    PHYSICS LETTERS A, 2007, 362 (5-6) : 439 - 448
  • [33] Chaotic neural networks and farfalle construction based parallel keyed secure hash function
    Belal, Mohamad Mulham
    Maitra, Tanmoy
    Giri, Debasis
    Das, Ashok Kumar
    SECURITY AND PRIVACY, 2022, 5 (06)
  • [34] SPHINCS+ post-quantum digital signature scheme with Streebog hash function
    Kiktenko, E. O.
    Bulychev, A. A.
    Karagodin, P. A.
    Pozhar, N. O.
    Anufriev, M. N.
    Fedorov, A. K.
    FIFTH INTERNATIONAL CONFERENCE ON QUANTUM TECHNOLOGIES (ICQT-2019), 2020, 2241
  • [35] Chaotic Complex Hashing: A simple chaotic keyed hash function based on complex quadratic map
    Ayubi, Peyman
    Setayeshi, Saeed
    Rahmani, Amir Masoud
    CHAOS SOLITONS & FRACTALS, 2023, 173
  • [36] Efficient and Secure Keyed Hash Function Scheme Based on RC4 Stream Cipher
    Noura, Hassan
    Salman, Ola
    Chehab, Ali
    Couturier, Raphael
    2020 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2020, : 531 - 537
  • [37] The duplicated webpage deletion algorithm based on hash function
    Kong, Suran
    2007 International Symposium on Computer Science & Technology, Proceedings, 2007, : 447 - 449
  • [38] Constructing Keyed Hash Algorithm Using Enhanced Chaotic Map with Varying Parameter
    Liu, Hongjun
    Kadir, Abdurahman
    Ma, Chao
    Xu, Chengbo
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [39] Keyed one-way Hash function construction based on the chaotic dynamic S-Box
    Guo Xian-Feng
    Zhang Jia-Shu
    ACTA PHYSICA SINICA, 2006, 55 (09) : 4442 - 4449
  • [40] Data Information Security Algorithm Based on Chaos and Hash Function
    Liu, Hui
    APPLIED MATHEMATICS AND NONLINEAR SCIENCES, 2023,