Article

Article title DIFFERENTIAL ANALYSIS OF CIPHER «KUZNYECHIK»
Authors L.K. Babenko, E.A. Ishchukova, E.A. Tolomanenko
Section SECTION I. INFORMATION TECHNOLOGIES AND PROTECTION OF INFORMATION
Month, Year 05, 2017 @en
Index UDC 004.021
DOI
Abstract The aim of this work is an investigation, development and implementation of cipher Kuznyechik, which is a part of standard GOST R 34.12-2015, and an algorithm for its differential analysis. Algorithm Kuznyechik has been considered herein, a working program for encryption and decryption based on this algorithm has been developed. For the analysis of the three rounds of cipher, a scheme for constructing round differentials has been firstly proposed based on the properties of nonlinear transformation S and linear transformation L. Using the proposed differ-ence characteristics, an algorithm for finding the correct pairs of texts has been developed and implemented, confirming the operability of the proposed method of analysis. As a result of this work, the encryption algorithm and the algorithm for finding the correct pairs of texts for differen-tial analysis of three rounds of encryption has been developed, implemented and tested. The pro-grams are implemented in the programming language C ++ in the Microsoft Visual Studio C ++ development environment. The research results are described in details, illustrated in examples, structured in chronological order and visually displayed in the form of illustrations, tables and diagrams in the text of this article. The resulting encryption algorithm and its software implemen-tation can be used to encrypt and decrypt data. The developed algorithm for finding the correct pairs of texts for differential cryptanalysis and its software implementation can be used in the future to continue the investigation of algorithm Kuznyechik, and block ciphers, as a whole, and for improving the method of differential cryptanalysis, increasing the number of rounds studied, and finding an optimized method for analyzing the Kuznyechik algorithm.

Download PDF

Keywords Cryptography; block cipher; SP-network; cryptanalysis; differential cryptanalysis; cipher Kuznyechik; GOST R 34.12-2015.
References 1. Kuznechik (shifr) [Grasshopper (cipher)]. Available at: https://ru.wikipedia.org/wiki/ Kuznechik_(shifr) (Accessed 29 April 2017).
2. Kriptograficheskaya zashchita informatsii Blochnye shifry – GOST R 34.12 – 2015 [Cryptog-raphy, Block ciphers, GOST R 34.12 – 2015]. Available at: https://www.tc26.ru/standard/ gost/GOST R 3412-2015.pdf (Accessed 29 April 2017).
3. Ishchukova E.A., Koshutskiy R.A., Babenko L.K. Razrabotka i realizatsiya vysokoskorostnogo shifrovaniya s ispol'zovaniem algoritma "Kuznechik" [Development and implementation of high speed encryption algorithm "Grasshopper"], Zhurnal Auditorium [Auditorium], 2015, Issue No. 4 (8). "Obshchie i kompleksnye problemy tekhnicheskikh i prikladnykh nauk i otrasley narodnogo khozyaystva" ["Common and complex problems of technical and applied Sciences and branches national economy"].
4. Tolomanenko E.A. Programmnaya realizatsiya shifra "Kuznechik" [Software implementation of the cipher "Grasshopper"], Materialy IX Mezhdunarodnoy studencheskoy elektronnoy nauchnoy konferentsii «Studencheskiy nauchnyy forum» – 2017. "Aktual'nye problemy informatsionnoy bezopasnosti" [Materials of the IX International student electronic scientific conference "Student scientific forum" in 2017. "Actual problems of information security"].
5. Differentsial'nyy kriptoanaliz [The differential cryptanalysis]. Available at: https://ru.wikipedia.org/wiki/Differentsial'nyy_kriptoanaliz (Accessed 29 April 2017).
6. Babenko L.K., Ishchukova E.A. Analiz simmetrichnykh kriptosistem [Analysis of simmetric cryptosystems], Izvestiya YuFU. Tekhnicheskie nauki [Izvestiya SFedU. Engineering Sciences], 2012, No. 11 (136), pp. 136-147.
7. Babenko L.K., Ishchukova E.A. Sovremennye algoritmy shifrovaniya i metody ikh analiza: ucheb. posobie [Modern cryptographic algorithms and methods of analysis: textbook]. Moscow: Gelios ARV, 2006, 376 p.
8. Biham E., Shamir A., Differential Cryptanalysis of the Full 16-round DES, Crypto'92, Springer-Velgar, 1998, 487 p.
9. Biham E., Shamir A., Differential Cryptanalysis of DES-like Cryptosystems, Extended Abstract, Crypto'90, Springer-Velgar, 1998, 2 p.
10. Babenko L.K. Ishchukova E.A. Differentsial'nyy kriptoanaliz blochnykh shifrov s primeneniem raspredelennykh vychisleniy [Differential cryptanalysis of block ciphers with the use of dis-tributed computing], Materialy Mezhdunarodnoy nauchno-tekhnicheskoy konferentsii «Mnogoprotsessornye vychislitel'nye i upravlyayushchie sistemy – 2007» [Materials of Inter-national scientific-technical conference "Multiprocessor computing and control systems – 2007"]. Vol. 1. Taganrog: Izd-vo TTI YuFU, 2007. pp. 222 -227.
11. Ishchukova E.A., Babenko L.K. Poisk differentsialov s maksimal'nymi veroyatnostyami [Search of differentials with maximum probability], Problemy informatizatsii obshchestva [Problems of Informatization of society]. Nal'chik: Izd-vo KBNTs RAN, 2008, pp. 115-120.
12. Babenko L.K., Ishchukova E.A. Differential Analysis GOST Encryption Algorithm, Proceedings of the 3rd Internaternational Conference of Security of Information and Networks (SIN 2010), pp. 149-157, ACM, New York, 2010.
13. Babenko L.K., Ishchukova E.A. Analiz sovremennykh kriptograficheskikh sistem s pomoshch'yu metoda differentsial'nogo kriptoanaliza [Analysis of modern cryptographic systems using the method of differential cryptanalysis], Aktual'nye aspekty zashchity informatsii v Yuzhnom federal'nom universitete: monografiya [Actual aspects of information security in the southern Federal University: monograph]. Taganrog: Izd-vo TTI YuFU, 2011, pp. 102-181.
14. Babenko L.K., Ishchukova E.A. Uchebnoe posobie po kursu "Kriptograficheskie metody i sredstva obespecheniya informatsionnoy bezopasnosti" [The textbook for the course "Crypto-graphic methods and means of ensuring information security"]. Taganrog: Izd-vo TTI YuFU, 2011, 148 p.
15. Panasenko S. Algoritmy shifrovaniya. Spetsial'nyy spravochnik [The encryption algorithms. A special Handbook]. Saint-Petersburg: BKhV-Peterburg, 2009, 576 p.
16. Shnayer B. Prikladnaya kriptografiya: Protokoly, algoritmy, iskhodnye teksty na yazyke Si [Applied cryptography: Protocols, algorithms, and source code in C language]. Moscow: TRIUMF, 2002, 648 p.
17. Stollings V. Kriptografiya i zashchita setey: printsipy i praktika [Cryptography and network security: principles and practice]. 2nd ed.: The translation from English. Mщысщц: Izd. dom «Vil'yams», 2001.
18. Babenko L.K. Mishustina (Ishchukova) E.A. Primenenie metodov kriptoanaliza dlya issledovaniya stoykosti sovremennykh blochnykh shifrov [Application of methods of crypta-nalysis to study the life of modern block ciphers], Tezisy dokladov X vserossiyskoy nauchnoy konferentsii “Problemy informatsionnoy bezopasnosti v sisteme vysshey shkoly” [Abstracts of the X all-Russian scientific conference “Problems of information security in higher school”]. Moscow: MIFI, 2003.
19. V GOSTe sidel «Kuznechik» [Guest sat "Grasshopper"]. Available at: https://habrahabr.ru/ post/266359/ (Accessed 29 April 2017).
20. Ishchukova E.A., Kalmykov I.A. Differentsial'nye svoystva S-blokov zameny dlya algo-ritma GOST 28147-89 [Differential properties of S-block replacement for algo-rhythm GOST 28147-89], Inzhenernyy vestnik Dona [Engineering journal of Don], 2015, No. 4. Available at: http://www.ivdon.ru/ru/magazine/archive/n4y2015/3284.

Comments are closed.