Dynamic Cryptographic Algorithms Kuznyechik and Magma
DOI:
https://doi.org/10.54654/isj.v1i11.85Keywords:
Block cipher, Kuznyechik, Magma, random permutation, MDS matrixTóm tắt
Abstract—The cryptographic algorithms Kuznyechik and Magma since 2015 are block cipher standardized in the Russian Federation, formally called GOST R 34.12-2015. Both use fixed functions as a priori selected and differ on the structure, the block length and the bit-level of the processed blocks. In the present paper, we provide a dynamic variant of Kuznyechik and Magma where some of their functions are randomly generated and dependent on pseudorandom sequences.
Tóm tắt—Các thuật toán mã hóa Kuznyechik và MAGMA từ năm 2015 là mật mã khối được tiêu chuẩn hóa ở Liên bang Nga, được gọi chính thức là GOST R 34.12-2015. Hai thuật toán này đều sử dụng các hàm chức năng được lựa chọn ưu tiên và khác nhau về cấu trúc, độ dài khối và mức bit của các khối được xử lý. Trong bài báo này, nhóm tác giả cung cấp một biến thể động của Kuznyechik và MAGMA, trong đó một số hàm chức năng của chúng được tạo ngẫu nhiên và phụ thuộc vào chuỗi giả ngẫu nhiên.
Downloads
References
[1] Federal Agency on Technical Regulation and Metrology (2015). “National Standard of the Russian Federation GOST R34.12-2015”.
[2] Dygin, D. et al (2015). "On a new Russian Encryption Standard." Matematicheskie Voprosy Kriptografii 6(2): 29-34.
[3] Ishchukova, E., L. Babenko and M. Anikeev (2017). “Two simplified versions of Kuznyechik cipher (GOST R 34.12-2015)”. 10th International Conference on Security of Information and Networks, ACM.
[4] Ishchukova, E., L. Babenko and M. Anikeev (2016). “Fast Implementation and Cryptanalysis of GOST R 34.12-2015 Block Ciphers”. 9th International Conference on Security of Information and Networks, ACM.
[5] de la Cruz, R.A. (2019). “Generation of 8-Bit S-Boxes Having Almost Optimal Cryptographic Properties Using Smaller 4-Bit S-Boxes and Finite Field Multiplication”. Progress in Cryptology – LATINCRYPT2017. LNCS, 11368, Springer, Cham.
[6] Zhuojun L. Qiuping L. and Baofeng W. (2018). “Direct Construction of (involutory) MDS matrix from Block Vandermonde and Cauchy-like Matrix”. 7th International Workshop, WAIFI 2018, Bergen, Norway.
[7] Freyre, P. and Díaz, N. (2015). "Generación aleatoria de permutaciones del grupo simétrico o del grupo alternado." Revista Investigación Operacional. 36(2): 186-191.
[8] Freyre P, Díaz N, Díaz R and Pérez C. (2014). “Random generation of MDS matrices”. Proceedings of Current Trends in Cryptology CTCrypt2014. Russia.
[9] Biham E. and Shamir A. (1991). “Differential Cryptanalysis of DES-like Cryptosystems”. Journal of Cryptology vol. 4, no. 1, pp 3-72.
[10] Matsui M. (1993). “Lineal Cryptanalysis method for DES Cipher”. Advances in Cryptology-Eurocrypt93. Springer-Verlag, pp 386-397.
[11] Marshalko V, Bondarenko I, Agafonoba V (2019). “Abstract of the results of the analysis of Kuznyechik”. RusCrypto. Russia.
[12] Akhmetzyanova, L., et al (2017). "On the properties of the CTR encryption mode of Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing". Matematicheskie Voprosy Kriptografii. 8(2).
[13] Markku-Juhani O. Saariment. (2019). “A chosen key attacks against the secret S-box of GOST”. IACR 540.
[14] Dmukh, A., Dygin, D. and Marshalko, G. (2015). “A lightweight-friendly modification of GOST block cipher”, IACR Cryptology ePrint Archive, 065.
[15] Nicolas C. (2011). “Security Evaluation of GOST 28147-89 in view of international standardization”. IACR-211.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).