|
This article is cited in 4 scientific papers (total in 4 papers)
Related-key attacks on the compression function of Streebog
V. A. Kiryukhinab a LLC «SFB Lab», Moscow
b JSC «InfoTeCS», Moscow
Abstract:
Related-key attacks against block ciphers are often considered unrealistic. In practice, as far as possible, the existence of a known «relation» between the secret encryption keys is avoided. Despite this, related keys arise directly in some widely used keyed hash functions. This is especially true for HMAC-Streebog, where known constants and selected parameters are added to the secret key. The relation is determined by addition modulo $2$ and $2^{n}$. The security of HMAC reduces to the properties of the used compression function. Therefore, as an initial analysis we propose key-recovery methods for 10 and 11 rounds (out of 12) of Streebog compression function in the related-key setting. The result shows that Streebog successfully resists attacks even in the model with such powerful adversaries.
Key words:
Streebog, related-key, truncated differentials.
Received 29.VII.2022
Citation:
V. A. Kiryukhin, “Related-key attacks on the compression function of Streebog”, Mat. Vopr. Kriptogr., 14:2 (2023), 59–76
Linking options:
https://www.mathnet.ru/eng/mvk438https://doi.org/10.4213/mvk438 https://www.mathnet.ru/eng/mvk/v14/i2/p59
|
|