"SANDWICH"-LIKE KEYED ALGORITHM BASED ON THE "STREEBOG" HASH FUNCTION

被引:0
|
作者
Kiryukhin, V. A. [1 ,2 ]
Sergeev, A. M. [1 ]
机构
[1] LLC SFB Lab, Moscow, Russia
[2] JSC InfoTeCS, Moscow, Russia
来源
关键词
Streebog; PRF; HMAC; provable security; REDUCED-ROUND GOST; PREIMAGE ATTACKS; CRYPTANALYSIS; SECURE;
D O I
10.17223/20710410/63/2
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
We propose a keyed cryptographic algorithm based on the "Streebog" hash function. We do not make any structural changes to the hash function itself, but only introduce a special type of padding. As a result, the key appears on both sides of the message in so-called "sandwich" manner - hence the name Streebog-S for our construction. "Sandwich" properties make it possible to simplify defenses against side -channel attacks while maintaining their effectiveness. We prove that Streebog-S and other algorithms based on "Streebog", HMAC-Streebog and Streebog-K, remain secure as pseudorandom functions (PRF) and message authentication codes (MAC) even when almost all internal states are leaked to the adversary. This leakage resistance requires additional properties from the underlying compression function, namely collision- and preimage-resistance.
引用
收藏
页码:24 / 48
页数:25
相关论文
共 50 条
  • [41] A Lightweight NFC Authentication Algorithm Based on Modified Hash Function
    Cao, Fang-Ming
    Liu, Dao-Wei
    International Journal of Network Security, 2022, 24 (03): : 436 - 443
  • [42] Key storage management scheme based on keyed hash tree with state
    Wang X.
    Ma J.
    Miao Y.
    Zhang K.
    Wu Q.
    2018, Editorial Board of Journal on Communications (39): : 94 - 102
  • [43] Data integrity algorithm based on additive generators and hash function
    Vladimir Fomichev
    Dmitry Bobrovskiy
    Alisa Koreneva
    Timur Nabiev
    Dmitry Zadorozhny
    Journal of Computer Virology and Hacking Techniques, 2022, 18 : 31 - 41
  • [44] Research of New Index Generation Algorithm Based on Hash Function
    Xu, WenLong
    Tang, Zhuo
    Chen, Zhuo
    Li, RenFa
    PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2012, : 799 - 802
  • [45] Efficient implementation of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 hash function
    Michail, HE
    Kakarountas, AP
    Milidonis, A
    Goutis, CE
    ICECS 2004: 11TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, 2004, : 567 - 570
  • [46] Data integrity algorithm based on additive generators and hash function
    Fomichev, Vladimir
    Bobrovskiy, Dmitry
    Koreneva, Alisa
    Nabiev, Timur
    Zadorozhny, Dmitry
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2022, 18 (01) : 31 - 41
  • [47] High Speed Implementation of the Keyed-Hash Message Authentication Code (HMAC) Based on SHA-1 Algorithm
    Suhaili, Shamsiah Binti
    Watanabe, Takahiro
    ADVANCED SCIENCE LETTERS, 2017, 23 (11) : 11096 - 11100
  • [48] A Chaos-Based Keyed Hash Function for Secure Protocol and Messege Authentication in Mobile Ad Hoc Wireless Networks
    Chankasame, Winai
    San-Um, Wimol
    2015 SCIENCE AND INFORMATION CONFERENCE (SAI), 2015, : 1357 - 1364
  • [49] Enhanced Secure Hash Algorithm-512 based on Quadratic Function
    De Guzman, Froilan E.
    Gerardo, Bobby D.
    Medina, Ruji P.
    2018 IEEE 10TH INTERNATIONAL CONFERENCE ON HUMANOID, NANOTECHNOLOGY, INFORMATION TECHNOLOGY, COMMUNICATION AND CONTROL, ENVIRONMENT AND MANAGEMENT (HNICEM), 2018,
  • [50] LBP feature and hash function based dual watermarking algorithm for database
    Li, De
    Ma, Chi
    Gao, Haoyang
    Jin, Xun
    DATA & KNOWLEDGE ENGINEERING, 2023, 148