RUS  ENG
Full version
JOURNALS // Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] // Archive

Mat. Vopr. Kriptogr., 2023 Volume 14, Issue 2, Pages 59–76 (Mi mvk438)

This article is cited in 4 papers

Related-key attacks on the compression function of Streebog

V. A. Kiryukhinab

a LLC «SFB Lab», Moscow
b JSC «InfoTeCS», Moscow

Abstract: Related-key attacks against block ciphers are often considered unrealistic. In practice, as far as possible, the existence of a known «relation» between the secret encryption keys is avoided. Despite this, related keys arise directly in some widely used keyed hash functions. This is especially true for HMAC-Streebog, where known constants and selected parameters are added to the secret key. The relation is determined by addition modulo $2$ and $2^{n}$. The security of HMAC reduces to the properties of the used compression function. Therefore, as an initial analysis we propose key-recovery methods for 10 and 11 rounds (out of 12) of Streebog compression function in the related-key setting. The result shows that Streebog successfully resists attacks even in the model with such powerful adversaries.

Key words: Streebog, related-key, truncated differentials.

UDC: 519.719.2

Received 29.VII.2022

Language: English

DOI: 10.4213/mvk438



© Steklov Math. Inst. of RAS, 2024