Article

Article title DEVELOPMENT AND ANALYSIS OF ALGORITHMS OF ATTACK ON THE GOST R34.11-94 USING MULTIPROCESSOR SYSTEM
Authors L.K. Babenko, A.S. Kirillov
Section SECTION 6. INFORMATION SAFETY
Month, Year 01, 2012 @en
Index UDC 681.03.245
DOI
Abstract This article describes features of implementation of algorithms of attack on the GOST hash function, and results of it’s analysis concerning the possibility of solution task of GOST R34.11-94 attack. As a result of investigations it was found that the existing algorithms do not allow a full attack on the GOST in acceptable period of time, as indicated by estimates obtained on the basis of the experiments presented in this paper. Implemented algorithms can be applied with great success for attack on other hash functions.

Download PDF

Keywords GOST; hash function; parallel computing; preimage attack; multicollision.
References 1. Мао, Венбо. Современная криптография: теория и практика: Пер. с англ. – М.: Изд. дом "Вильямс", 2005. – 768 с.
2. Cryptographic Hashes [Электронный ресурс] 2009. – Режим доступа: http://www.vpnc.org/ hash.html, свободный. – Загл. с экрана.
3. Schneier B., Hoffman P. Attacks on Cryptographic Hashes in Internet Protocols [Электронный ресурс] / P. Hoffman VPN Consortium B. Schneier Counterpane Internet Security, 2005.
– Режим доступа: http://tools.ietf.org/html/rfc4270, свободный. – Загл. с экрана.
4. ГОСТ Р 34.11-94. Криптографическая защита информации. Функция хэширования. – М.: Изд-во стандартов, 1994. – 15 с.
5. Florian Mendel, Norbert Pramstaller, and Christian Rechberger. A (Second) Preimage Attack on the GOST Hash Function. In Kaisa Nyberg, editor, FSE, volume 5086 of LNCS. – Springer, 2008. – P. 224-234
6. Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt. Cryptanalysis of the GOST Hash Function. Advances in Cryptology, CRYPTO 2008: 28th Annual International Conference Santa Barbara, CA, USA, August 2008. Proceedings. Springer,
2008.
7. Antoine Joux. Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. In Matthew K. Franklin, editor, CRYPTO, volume 3152 of LNCS, Springer, 2004. – Р. 306-316.
8. Birthday problem [Электронный ресурс] – Режим доступа: http://en.wikipedia.org/wiki/
Birthday_problem, свободный. – Загл. с экрана.
9. Murmur264 [Электронный ресурс] – Режим доступа: http://www.team5150.com/~andrew/noncryptohashzoo/Murmur264.html, свободный. – Загл. с экрана.

Comments are closed.