|
This article is cited in 6 scientific papers (total in 6 papers)
On the cryptographic properties of algorithms accompanying the applications of standards GOST R 34.11-2012 and GOST R 34.10-2012
E. K. Alekseev, I. B. Oshkin, V. O. Popov, S. V. Smyshlyaev CryptoPro LLC, Moscow
Abstract:
For a number of commonly accepted models of eavesdropper the cryptographic properties of the algorithms accompanying the standards GOST R 34.11-2012 and GOST R 34.10-2012 are justified, namely, the algorithm generating the message autentication codes, algorithms generating pseudorandom sequences and key exchange algorithm. The conclusions on the security of these algorithms are based on the properties of the GOST R 34.11-2012 algorithm and on the classical complexity-theoretical problems (decisional and computational Diffie – Hellman problems).
Key words:
cryptographic algorithms, message authentication, pseudorandom sequence generators, key generation algorithms.
Received 13.IX.2015
Citation:
E. K. Alekseev, I. B. Oshkin, V. O. Popov, S. V. Smyshlyaev, “On the cryptographic properties of algorithms accompanying the applications of standards GOST R 34.11-2012 and GOST R 34.10-2012”, Mat. Vopr. Kriptogr., 7:1 (2016), 5–38
Linking options:
https://www.mathnet.ru/eng/mvk172https://doi.org/10.4213/mvk172 https://www.mathnet.ru/eng/mvk/v7/i1/p5
|
Statistics & downloads: |
Abstract page: | 985 | Full-text PDF : | 915 | References: | 75 |
|