RUS  ENG
Full version
JOURNALS // Prikladnaya Diskretnaya Matematika. Supplement // Archive

Prikl. Diskr. Mat. Suppl., 2023 Issue 16, Pages 96–98 (Mi pdma617)

Mathematical Methods of Cryptography

Key-recovery security of keyed hash functions based on GOST 34.11-2018 (“Streebog”)

A. M. Sergeeva, V. A. Kiryukhinba

a ООО «СФБ Лаб», г. Москва
b Infotecs, Moscow

Abstract: Keyless hash function GOST 34.11-2018 (“Streebog”) is used in many keyed cryptoalgorithms, including HMAC-Streebog and Streebog-K. Using the provable security approach, we obtain the upper bounds on the probability of recovering the secret key for the two algorithms mentioned. We also propose a sandwich-like method of converting “Streebog” to the keyed cryptoalgorithm (conventionally called Streebog-S) without changing the hash function itself. Streebog-S is a secure pseudorandom function and a secure message authentication code. Unlike HMAC-Streebog and Streebog-K, the only key-recovery method for Streebog-S is straightforward guessing. This statement holds under the assumption that the similar is true for the underlying iteratively applied compression function.

Keywords: Streebog, HMAC, provable security.

UDC: 519.7

DOI: 10.17223/2226308X/16/24



© Steklov Math. Inst. of RAS, 2024