RUS  ENG
Full version
JOURNALS // Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] // Archive

Mat. Vopr. Kriptogr., 2023 Volume 14, Issue 2, Pages 77–96 (Mi mvk439)

This article is cited in 4 papers

Keyed Streebog is a secure PRF and MAC

V. A. Kiryukhinab

a LLC «SFB Lab», Moscow
b JSC «InfoTeCS», Moscow

Abstract: One of the most popular ways to turn a keyless hash function into a keyed one is the HMAC algorithm. This approach is too expensive in some cases due to double hashing. Excessive overhead can be avoided by using features of the hash function. The paper presents a simple and safe keyed cryptoalgorithm (conventionally called «Streebog-K») from hash function Streebog $\mathsf{H}(M)$. Let $K$ be a secret key, then $\mathsf{KH}(K,M)=\mathsf{H}(K||M)$ is a secure pseudorandom function (PRF) and, therefore, a good message authentification code (MAC). The proof is obtained by reduction of the security of the presented construction to the resistance of the underlying compression function to the related key attacks (PRF-RKA). The security bounds of Streebog-K are essentially the same as those of HMAC-Streebog, but the computing speed doubles when short messages are used.

Key words: Streebog, Streebog-K, PRF, MAC, HMAC, provable security.

UDC: 519.719.2

Received 02.IX.2022

Language: English

DOI: 10.4213/mvk439



© Steklov Math. Inst. of RAS, 2025