Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography]
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor
Guidelines for authors

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Mat. Vopr. Kriptogr.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography], 2024, Volume 15, Issue 2, Pages 47–68
DOI: https://doi.org/10.4213/mvk469
(Mi mvk469)
 

This article is cited in 1 scientific paper (total in 1 paper)

About «$k$-bit security» of MACs based on hash function Streebog

V. A. Kiryukhinab

a LLC «SFB Lab», Moscow
b JSC «InfoTeCS», Moscow
References:
Abstract: Various message authentication codes (MACs), including HMAC-Streebog and Streebog-K, are based on the keyless hash function Streebog. Under the assumption that the compression function of Streebog is resistant to the related key attacks, the security proofs of these algorithms (in the single key setting) were recently presented at CTCrypt 2022.
Generic related key attacks have the great impact on the security bounds. Guessing any one of the $q$ related keys can be $q$ times faster than guessing a single secret key. However, if different related keys are used to process different inputs, then the adversary should choose a specific key when guessing, not any one. This simple observation fortunately holds for MACs based on Streebog.
We carefully detail the resources of the adversary in the related key settings, revisit the proof, and obtain new security bounds. Let $n$ be the bit length of the hash function state. If the amount of processed data is less than about $2^{n-k}$ blocks, then for HMAC-Streebog-512 and Streebog-K, the only effective method of forgery (or distinguishing) is guessing the $k$-bit secret key or the tag if it is shorter than the key. So, we can speak about «$k$-bit security» without specifying the amount of material, if the key length is no longer than half of a state. The bound for HMAC-Streebog-256 is worse and equal to $2^{\frac{n}{2}-k}$ blocks.
We describe several attacks that show the tightness of the obtained security bounds. Hence, the latter cannot be significantly improved further.
Key words: Streebog, PRF, HMAC, provable security.
Received 02.IX.2023
Document Type: Article
UDC: 519.719.2
Language: Russian
Citation: V. A. Kiryukhin, “About «$k$-bit security» of MACs based on hash function Streebog”, Mat. Vopr. Kriptogr., 15:2 (2024), 47–68
Citation in format AMSBIB
\Bibitem{Kir24}
\by V.~A.~Kiryukhin
\paper About <<$k$-bit security>> of MACs based on hash function Streebog
\jour Mat. Vopr. Kriptogr.
\yr 2024
\vol 15
\issue 2
\pages 47--68
\mathnet{http://mi.mathnet.ru/mvk469}
\crossref{https://doi.org/10.4213/mvk469}
Linking options:
  • https://www.mathnet.ru/eng/mvk469
  • https://doi.org/10.4213/mvk469
  • https://www.mathnet.ru/eng/mvk/v15/i2/p47
  • This publication is cited in the following 1 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Математические вопросы криптографии
    Statistics & downloads:
    Abstract page:100
    Full-text PDF :2
    References:12
    First page:4
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024