Article

Article title INTEGRATED APPROACH TO THE ASSESSMENT OF RELIABILITY OF GOST R34.12-2015 STANDARD
Authors L.K. Babenko, E.A. Ishchukova, D.M. Alekseev, A.V. Krasovsky, M.V. Pismensky
Section SECTION I. INFORMATION TECHNOLOGIE AND PROTECTION OF INFORMATION
Month, Year 09, 2016 @en
Index UDC 681.03.245
DOI 10.18522/2311-3103-2016-9-2736
Abstract The aim of this work is the development, implementation and investigation of sequential and parallel algorithms for evaluating the reliability of two ciphers that are a part of the new symmetric cipher’s standard GOST R 34.12-2015. The analysis is carried out using different types of cryptanalysis, namely: linear analysis, slide attacks and derivative methods for differential analysis, such as the method of impossible differentials and the method of related-key attack. Examined are two symmetric encryption algorithms that make up the new Russian standard GOST R34.12-2015. These ciphers have a different construction of the scheme: Magma algorithm is based on a Feistel network, and Kuznyechik algorithm is on the basis of SP-network. Thus, reliability properties are investigated for construction of two basic schemes for modern symmetric block encryption algorithm. One way to improve performance in the analysis of various cryptosystems is to use a distributed multiprocessor computing to accelerate the process of analysis and get the result as soon as possible. The MPI technology is used in the paper. One of the advantages of programs developed using the MPI library is the possibility of their use as a specially equipped cluster, and the cluster of con-ventional PC linked by a network. As a result, sequential and parallel algorithms were designed, implemented, and tested for resistance investigation of ciphers included in the project of a new data encryption standard in our country. Programs were implemented in the environment of MS Visual Studio C ++. For parallel programming used was the MPICH package to perform multi-processor computing. The study of developed and implemented algorithms resulted in extensive experimental data, systematized in the form of tables and graphs. These algorithms and implementation in the future could be used for analysis of other block ciphers that have a similar structure. Cryptography; block cipher; Feistel scheme; SP-network; differential analysis; linear anal-ysis; slide attack; impossible differential analysis; related keys; secret key.

Download PDF

Keywords Cryptography; block cipher; Feistel scheme; SP-network; differential analysis; linear anal-ysis; slide attack; impossible differential analysis; related keys; secret key.
References 1. Kriptograficheskaya zashchita informatsii. Blochnye shifry [Cryptographic protection of in-formation. Block ciphers]. Available at: https://www.tc26.ru/standard/gost/GOST_R_3412-2015.pdf.
2. Babenko L.K. Ishchukova E.A. Sidorov I.D. Parallel'nye algoritmy dlya resheniya zadach zashchity informatsii [Parallel algorithms for solving problems of information security]. Mos-cow: Goryachaya liniya Telekom, 2014, 304 p.
3. Babenko L.K., Ishchukova E.A., Lomov I.S. Matematicheskoe modelirovanie kriptograficheskogo algoritma «Kuznechik» [Mathematical modeling of a cryptographic algo-rithm "Grasshopper"], Informatsionnoe protivodeystvie ugrozam terrorizma [Information counteraction to the terrorism threats], 2015, pp. 166-176.
4. Biryukov A., Vagner D. Slaydovye ataki [Slide attacks], Trudy bystrogo programmnogo shifrovaniya. Lektsii v oblasti komp'yuternykh nauk [Proceedings of fast software encryption. Lectures in computer science], 1999, No. 1636, pp. 245-259.
5. Biryukov A., Vagner D. Rasshirennaya slaydovaya ataka. Dostizheniya v kriptologii [Advanced slide attack. Advances in cryptology], Evrokript. Lektsii v oblasti komp'yuternykh nauk [Eurocrypt. Lectures in computer science], 2000, No. 1807, pp. 589-606.
6. Matsui M. Linear Cryptanalysis Method for DES Cipher, Advances in Cryptology – EUROCRYPT’93, Springer-Verlag, 1998, 386 p.
7. Babenko L.K., Ishchukova E.A. Sovremennye algoritmy blochnogo shifrovaniya i metody ikh analiza [Modern block encryption algorithms and methods of their analysis]. Moscow: Gelios ARV, 2006, 376 p.
8. Biham E., Biryukov A., Shamir A. Cryptanalysis of Skipjack Reduced to 31 Rounds using Im-possible Differentials, Advances in Cryptology - EUROCRYPT '99. Prague: Springer-Verlag, pp. 12-23.
9. Raphael C.-W. Phan. Impossible Differential Cryptanalysis of Mini-AES, Cryptologia, October 2003, No. XXVII (4), pp. 283-292.
10. Raphael C.-W. Phan, Mohammad Umar Siddiqi Generalised Impossible Differentials of Ad-vanced Encryption Standard, Electronics Letters, July 2001, No. 37 (14), pp. 896-898.
11. Pis'menskiy M.V., Ishchukova E.A. Kriptoanaliz S-AES s pomoshch'yu metoda nevozmozhnykh differentsialov [Cryptanalysis of S-AES using the method of impossible differentials], «Studencheskiy nauchnyy forum» - 2016. Aktual'nye problemy informatsionnoy bezopasnosti ["Student's scientific forum" in 2016. Actual problems of information security]. Available at: http://www.scienceforum.ru/2016/pdf/24173.pdf.
12. Eli Biham, Orr Dunkelman, and Nathan Keller. New results on boomerang and rectangle at-tacks, In FSE’02. Springer, 2002, Vol. 2365 of LNCS.
13. Eli Biham, Orr Dunkelman, and Nathan Keller. Related-key boomerang and rectangle attacks, In EUROCRYPT’05. Springer, 2005, Vol. 3494 of LNCS, pp. 507-525.
14. Biryukov A., Khovratovich D., and Iv. Nikoli´c. Examples of differential multicollisions for 13 and 14 rounds of AES-256, 2009. Available at: http://eprint. iacr.org/2009/242.pdf.
15. Rudskoy V. On zero rractical significance of “key recovery attack on full GOST block cipher with zero time and memory”, 2010. Available at: http://eprint.iacr.org/2010.
16. Pudovkina M.A., Khoruzhenko G.I. Ataka na shifrsistemu GOST 28147-89 s 12 svyazannymi klyuchami [The attack on simsystem GOST 28147-89 with 12 related keys], Matematicheskie voprosy kriptografiii [Mathematical problems kriptografii], 2013, Vol. 4, Issue 2, pp. 127-152.
17. Ishchukova E.A., Kalmykov I.A. Differentsial'nye svoystva S-blokov zameny dlya algoritma GOST 28147-89 [Differential properties of S-block replacement algorithm GOST 28147-89], Inzhenernyy vestnik Dona [Engineering journal of Don], 2015, No. 4. Available at: http://ivdon.ru/ru/magazine/archive/n4y2015/3284.
18. Krasovskiy A.V. Teoreticheskaya ataka na polnyy shifr Kuznechik so svyazannymi klyuchami [A theoretical attack on the full cipher Grasshopper with associated keys], Materialy VII Vserossiyskoy molodezhnoy shkoly-seminara po problemam informatsionnoy bezopasnosti «Perspektiva-2016» [Proceedings of the VII all-Russian youth school-seminar on problems of information security "Perspective-2016"]. Taganrog: Izd-vo YuFU, 2016, pp. 135-144.
19. Ishchukova E.A., Alekseev D.M. Algoritm analiza shifra Magma s ispol'zovaniem metoda slaydovoy ataki [The analysis algorithm of the cipher Magma using the slide attack], Nauchnoe periodicheskoe izdanie «CETERIS PARIBUS» [Scientific periodical "CETERIS PARIBUS"], 2015, No. 5 (5), pp. 24-27. Available at: http://efir-msk.ru/sbornik/%D0%A1% D0%A05.pdf.
20. Ishchukova E.A., Alekseev D.M. Ispol'zovanie tekhnologii MPI dlya analiza algoritma shifrovaniya Magma [The use of MPI technology for the analysis of the encryption algorithm of Magma], Sbornik trudov XIII Vserossiyskoy nauchnoy konferentsii molodykh uchenykh, aspirantov i studentov, g. Taganrog, 2015 g. [Proceedings of the XIII all-Russian scientific conference of young scientists, postgraduates and students, Taganrog, 2015]. Rostov-na-Donu: Izd-vo YuFU, 2016, Vol. 3, pp. 234-247.

Comments are closed.