Cryptanalysis of the Round-Reduced Kupyna Hash Function
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Cryptanalysis of Block Ciphers with New Design Strategies
Cryptanalysis of Block Ciphers with New Design Strategies Mohamed Tolba A Thesis in The Concordia Institute for Information Systems Engineering Presented in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy (Information Systems Engineering) at Concordia University Montreal, Quebec, Canada October 2017 ©Mohamed Tolba, 2017 CONCORDIA UNIVERSITY SCHOOL OF GRADUATE STUDIES This is to certify that the thesis prepared By: Mohamed Tolba Entitled: Cryptanalysis of Block Ciphers with New Design Strategies and submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Information Systems Engineering) complies with the regulations of the University and meets the accepted standards with re- spect to originality and quality. Signed by the final examining committee: Chair Dr. Theodore Stathopoulos External Examiner Dr. Huapeng Wu External to Program Dr. Anjali Agarwal Examiner Dr. Lingyu Wang Examiner Dr. Mohammad Mannan Thesis Supervisor Dr. Amr M. Youssef Approved by Dr. Chadi Assi, Graduate Program Director December 4th,2017 Dr. Amir Asif, Dean, Faculty of Engineering and Computer Science Abstract Cryptanalysis of Block Ciphers with New Design Strategies Mohamed Tolba, Ph.D. Concordia University, 2017 Block ciphers are among the mostly widely used symmetric-key cryptographic primitives, which are fundamental building blocks in cryptographic/security systems. Most of the public- key primitives are based on hard mathematical problems such as the integer factorization in the RSA algorithm and discrete logarithm problem in the DiffieHellman. Therefore, their security are mathematically proven. In contrast, symmetric-key primitives are usually not constructed based on well-defined hard mathematical problems. Hence, in order to get some assurance in their claimed security properties, they must be studied against different types of cryptanalytic techniques. -
Analysis of the Kupyna-256 Hash Function
Analysis OF THE Kupyna-256 Hash Function Christoph DobrAUNIG Maria Eichlseder Florian Mendel FSE 2016 M I T + Permutation-based DESIGN 2 N H −1 H AES-like ROUND TRANSFORMATIONS I T ⊕ I 2 2 N N Similar TO Grøstl Modular ADDITIONS INSIDE www.iaik.tugraz.at The Kupyna Hash Function UkrAINIAN STANDARD DSTU 7564:2014 [Oli+15; Олi+15a] M1 M2 M T IV F F F Ω HASH 2 2 2 N N N N N 2 f256; 512g 1 / 14 www.iaik.tugraz.at The Kupyna Hash Function UkrAINIAN STANDARD DSTU 7564:2014 [Oli+15; Олi+15a] M1 M2 M T IV F F F Ω HASH 2 2 2 N N N N N 2 f256; 512g M I T + Permutation-based DESIGN 2 N H −1 H AES-like ROUND TRANSFORMATIONS I T ⊕ I 2 2 N N Similar TO Grøstl Modular ADDITIONS INSIDE 1 / 14 www.iaik.tugraz.at The Kupyna-256 Round TRANSFORMATIONS Kupyna-512: 8 × 16 state, 14 ROUNDS Kupyna-256: 8 × 8 state, 10 rounds: AddConstant SubBytes ShiftBytes MixBytes f3f3f3f3f3f3f3f3 f0f0f0f0f0f0f0f0 f0f0f0f0f0f0f0f0 S + f0f0f0f0f0f0f0f0 T : f0f0f0f0f0f0f0f0 f0f0f0f0f0f0f0f0 f0f0f0f0f0f0f0f0 f¯ı e¯ı d¯ı c¯ı b¯ı a¯ı 9¯ı 8¯ı 0I 1I 2I 3I 4I 5I 6I 7I T ⊕: S R = MB ◦ RB ◦ SB ◦ AC I 2 / 14 Destroys byte-alignment & MDS PROPERTY BrANCH NUMBER OF T + REDUCED FROM 9 TO ≤ 6: MB AC > MB > AC > X1:(00 00 00 00 00 00 00 00) 7−−!(00 00 00 00 00 00 00 00) 7−!(F3 F0 F0 F0 F0 F0 F0 70); > MB > AC > X2:(00 00 00 00 00 00 00 FF) 7−−!(DB C7 38 AB FF 24 FF FF) 7−!(CE B8 29 9C F0 15 F0 70); > MB > AC > ∆:(00 00 00 00 00 00 00FF ) 7−−!(DB C7 38 AB FF 24 FF FF) 7−!(3D 48 D9 6C 00 E5 00 00): www.iaik.tugraz.at Modular Constant Addition Prevent SAME TRAILS FOR T +, T ⊕ Grøstl INSTEAD HAS -
Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain
I. J. Computer Network and Information Security, 2021, 2, 1-15 Published Online April 2021 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2021.02.01 Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain Alexandr Kuznetsov1 , Inna Oleshko2, Vladyslav Tymchenko3, Konstantin Lisitsky4, Mariia Rodinko5 and Andrii Kolhatin6 1,3,4,5,6 V. N. Karazin Kharkiv National University, Svobody sq., 4, Kharkiv, 61022, Ukraine E-mail: [email protected], [email protected], [email protected], [email protected], [email protected] 2 Kharkiv National University of Radio Electronics, Nauky Ave. 14, Kharkiv, 61166, Ukraine E-mail: [email protected] Received: 30 June 2020; Accepted: 21 October 2020; Published: 08 April 2021 Abstract: A blockchain, or in other words a chain of transaction blocks, is a distributed database that maintains an ordered chain of blocks that reliably connect the information contained in them. Copies of chain blocks are usually stored on multiple computers and synchronized in accordance with the rules of building a chain of blocks, which provides secure and change-resistant storage of information. To build linked lists of blocks hashing is used. Hashing is a special cryptographic primitive that provides one-way, resistance to collisions and search for prototypes computation of hash value (hash or message digest). In this paper a comparative analysis of the performance of hashing algorithms that can be used in modern decentralized blockchain networks are conducted. Specifically, the hash performance on different desktop systems, the number of cycles per byte (Cycles/byte), the amount of hashed message per second (MB/s) and the hash rate (KHash/s) are investigated. -
Embeddability Is One of the Most Important Properties for Dedicate Interconnection Networks
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING XX, XXX-XXX (201X) Cryptanalysis of the Round-Reduced Kupyna 1,2 3 JIAN ZOU , LE DONG 1Mathematics and Computer Science of Fuzhou University, Fuzhou, China, 350108 2Key Lab of Information Security of Network Systems (Fuzhou University), Fuzhou, China, 350108 3 Henan Engineering Laboratory for Big Data Statistical Analysis and Optimal Control, Henan Normal University, Xinxiang, China, 453007 E-mail: {[email protected], [email protected]} Kupyna was approved as the new Ukrainian hash standard in 2015. In this paper, we show several pseudo-preimage attacks and collision attacks on Kupyna. Due to the wide-pipe design, it is hard to construct pseudo-preimage attacks on Kupyna. Combining the meet-in-the-middle attack with the guess-and-determine technique, we propose some pseudo-preimage attacks on the compression function for 5-round Kupyna-256 and 7-round Kupyna-512. The complexities of these two pseudo-preimage attacks are 2229.5 (for 5-round Kupyna-256) and 2499 (for 7-round Kupyna-512) respectively. Regarding the collision attack, we can not only construct a collision attack on the 7-round Kupyna-512 compression function with a complexity of 2159.3, but also construct a colli- sion attack on the 5-round Kupyna-512 hash function with a complexity of 2240. Key words: Kupyna, pseudo-preimage, collision, rebound attack, meet-in-the-middle. 1 INTRODUCTION Cryptographic hash functions are playing important roles in the modern cryptography. In general, hash function must satisfy three security requirements: preimage resistance, second preimage resistance and collision resistance. Regarding the preimage attack, the meet-in-the-middle (MitM) attack proposed by Aoki and Sasaki [1] was a generic method to construct preimage attacks against hash function. -
008/511.Pdf 5
УДК 004.056.5 DOI:10.30837/rt.2019.3.198.06 О.О. КУЗНЕЦОВ, д-р техн. наук, В.А. ТИМЧЕНКО, К.Є. ЛИСИЦЬКИЙ, М.Ю. РОДІНКО, М.С. ЛУЦЕНКО, К.Ю. ШЕХАНІН, А.О. КОЛГАТІН ДОСЛІДЖЕННЯ ШВИДКОДІЇ ТА СТАТИСТИЧНОЇ БЕЗПЕКИ АЛГОРИТМІВ КРИПТОГРАФІЧНОГО ҐЕШУВАННЯ Вступ Cтаття є продовженням попередніх робіт «Алгоритми криптографічного ґешування, які застосовуються в сучасних блокчейн-системах» та «Дослідження алгоритмів криптографіч- ного ґешування, які застосовуються в сучасних блокчейн-системах». В цій роботі проводяться порівняльні дослідження алгоритмів криптографічного ґешу- вання, які застосовуються (або можуть застосовуватися) в сучасних децентралізованих блок- чейн-системах. Зокрема досліджується швидкодія ґешування на різних десктопних системах, оцінюється кількість тактів обчислювальної системи на один байт (Cycles/byte), обсяг ґешо- ваного повідомлення за одну секунду (MB/s) та кількість сформованих ґеш-кодів за секунду (KHash/s). Додатково проводяться дослідження швидкодії окремих криптографічних функцій ґешування на графічних обчислювачах. Для оцінки статистичної безпеки проводяться дослі- дження вихідних послідовностей криптографічних функцій ґешування при обробці ними надмірних вхідних даних (які сформовано за допомогою звичайного лічильника). Для порів- няльних досліджень показників статистичної безпеки використовується методика NIST STS (Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications), яку рекомендовано Національним інститутом стандартів і технологій США для дослідження генераторів випадкових -
Computer Science and Cybersecurity (Cs&Cs
ISSN XXXX-XXXX CS&CS, Issue 1(5) 2017 UDC 004 056 55 PROPOSALS OF COMPARATIVE ANALYSIS AND DECISION MAKING DURING THE COMPETITION REGARDING THE CERTAIN BENEFITS OF ASYMMETRIC POST QUANTUM CRYPTOGRAPHIC PRIMITIVES I. Gorbenko, Yu. Gorbenko, M. Yesina, V. Ponomar V.N. Karazin Kharkiv National University, Svobody sq., 4, Kharkov, 61022, Ukraine [email protected]; [email protected]; [email protected]; [email protected] Reviewer: Roman Olіynikov, Dr., Full Professor, V.N. Karazin Kharkiv National University, Svobody sq., 4, Kharkov, 61022, Ukraine [email protected] Received on February 2017 Abstract. The paper considers proposals on the implementation of cryptographic primitives comparative analysis and substantiation, development and experimental confirmation of methodical bases application possibilities of sys- tem unconditional and conditional criteria selection and application, and methods and technique of comparative analysis and making the decision on asymmetric post quantum cryptographic primitives type directional encryption, and keys encapsulation and electronic signatures mechanisms. Some criteria and indicators that can be used for comparative analysis of properties of the candidates for the post quantum cryptographic primitives are presented. Comparative analysis of the existing mechanisms of perspective electronic signatures in accordance with ISO/IEC 14888-3:2016 standard and some cryptographic primitives that are considered possible to use in the post quantum period is carried out. The results of the cryptographic primitives conducted estimation are presented. Conclusions and recommendations on the use of certain cryptographic primitives estimation methods are made. Keywords: electronic signature mechanisms analysis, weight indices, electronic signature, electronic signature esti- mation criterion, electronic signature comparison analysis methods. 1 Introduction In 2016 there were the series of important events, that have significantly affected to the intensive development of post quantum cryptography. -
Statistical Testing of Blockchain Hash Algorithms
Statistical Testing of Blockchain Hash Algorithms Alexandr Kuznetsov 1 [0000-0003-2331-6326], Maria Lutsenko 1 [0000-0003-2075-5796], Kateryna Kuznetsova 1 [0000-0002-5605-9293], Olena Martyniuk 2 [0000-0002-0377-7881], Vitalina Babenko 1 [0000-0002-4816-4579] and Iryna Perevozova 3[0000-0002-3878-802X] 1 V. N. Karazin Kharkiv National University, Kharkiv, Ukraine [email protected], [email protected], [email protected], [email protected] 2 International Humanitarian University, Odessa, Ukraine, [email protected] 3 Ivano-Frankivsk National Technical University of Oil and Gas, Ivano-Frankivsk, Ukraine, [email protected] Abstract. Various methods are used for statistical testing of cryptographic algo- rithms, for example, NIST STS (A Statistical Test Suite for the Validation of Random Number Generators and Pseudo Random Number Generators for Cryptographic Applications) and DIEHARD (Diehard Battery of Tests of Ran- domness). Tests consists of verification the hypothesis of randomness for se- quences generated at the output of a cryptographic algorithm (for example, a keys generator, encryption algorithms, a hash function, etc.). In this paper, we use the NIST STS technique and study the statistical properties of the most common hashing functions that are used or can be used in modern blockchain networks. In particular, hashing algorithms are considered which specified in national and international standards, as well as little-known hash functions that were developed for limited use in specific applications. Thus, in this paper, we consider the most common hash functions used in more than 90% of blockchain networks. The research results are given as average by testing data of 100 se- quences of 108 bytes long, which means that is, the size of the statistical sample for each algorithm was 1010 bytes. -
View the Index
INDEX OF TERMS 2013, 2 Axolotl, 11 65537, 2 Backdoor, 11 A5/0, 2 Backtracking resistance, 11 A5/1, 2 Backward secrecy, 11 A5/2, 3 Base64, 12 A5/3, 3 BassOmatic, 12 A5/4, 3 BB84, 12 Adaptive attack, 3 bcrypt, 12 AEAD (authenticated encryption Biclique cryptanalysis, 13 with associated data) , 3 BIKE (Bit Flipping Key AES (Advanced Encryption Encapsulation), 13 Standard), 4 BIP (Bitcoin improvement AES-CCM, 4 proposal), 13 AES-GCM, 5 Bit Gold, 14 AES-GCM-SIV, 5 Bitcoin, 14 AES-NI, 5 Black, 14 AES-SIV, 6 BLAKE, 14 AIM (Advanced INFOSEC Machine), 6 BLAKE2, 14 AKA, 6 BLAKE3, 14 AKS (Agrawal–Kayal–Saxena), 7 Bleichenbacher attack, 15 Algebraic cryptanalysis, 7 Blind signature, 15 Alice, 7 Block cipher, 16 All-or-nothing transform (AONT), 7 Blockchain, 16 Anonymous signature, 8 Blockcipher, 17 Applied Cryptography, 8 Blowfish, 17 Applied cryptography, 8 BLS (Boneh-Lynn-Shacham) ARC4, 8 signature, 17 Argon2, 8 Bob, 18 ARX (Add-Rotate-XOR), 9 Boolean function, 18 ASIACRYPT, 9 Boomerang attack, 18 Asymmetric cryptography, 9 BQP (bounded-error quantum Attack, 9 polynomial time), 19 Attribute-based encryption (ABE), 10 Braid group cryptography, 19 Authenticated cipher, 11 Brainpool curves, 19 Break-in recovery, 20 Cryptologia, 29 Broadcast encryption, 20 Cryptology, 29 Brute-force attack, 20 Cryptonomicon, 29 Bulletproof, 20 Cryptorchidism, 30 Byzantine fault tolerance, 21 Cryptovirology, 30 CAESAR, 21 CRYPTREC, 30 Caesar’s cipher, 22 CSIDH (Commutative Supersingular CAVP (Cryptographic Algorithm Isogeny Diffie–Hellman), 30 Validation Program), 22 -
A New Encryption Standard of Ukraine: the Kalyna Block Cipher (DSTU 7624:2014)
A New Encryption Standard of Ukraine: The Kalyna Block Cipher (DSTU 7624:2014) Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Yurii Gorbenko and Viktor Dolgov JSC Institute of Information Technologies, State Service of Special Communication and Information Protection of Ukraine, V.N.Karazin Kharkiv National University Kharkiv National University of Radio Electronics Ukraine November 24th, 2015 NISK 2015 Alesund,˚ Norway R. Oliynykov, I. Gorbenko, O. Kazymyrov, et al. A New Encryption Standard of Ukraine: The Kalyna Block Cipher 1 / 23 R. Oliynykov, I. Gorbenko, O. Kazymyrov, et al. A New Encryption Standard of Ukraine: The Kalyna Block Cipher 2 / 23 My path: 2009-2015 R. Oliynykov, I. Gorbenko, O. Kazymyrov, et al. A New Encryption Standard of Ukraine: The Kalyna Block Cipher 3 / 23 Outline Second generation of block ciphers in the post-Soviet states The new Ukrainian block cipher Kalyna Performance comparison with other ciphers Other sections of the Ukrainian national standard DSTU 7624:2014 Conclusions R. Oliynykov, I. Gorbenko, O. Kazymyrov, et al. A New Encryption Standard of Ukraine: The Kalyna Block Cipher 4 / 23 The block cipher GOST 28147-89 Advantages a well known and researched cipher, adopted as the national standard in 1990 acceptable encryption speed appropriate for lightweight cryptography "good" S-boxes provide practical strength Disadvantages theoretically broken huge classes of weak keys special S-boxes allow practical ciphertext-only attacks significantly slower performance in comparison to modern block ciphers like AES R. Oliynykov, I. Gorbenko, O. Kazymyrov, et al. A New Encryption Standard of Ukraine: The Kalyna Block Cipher 5 / 23 Replacements for GOST 28147-89 in Belarus Belarus: STB 34.101.31-2011 the block length is 128 bits; the key length is 128, 192 or 256 bits 8-round Feistel network with a Lai-Massey scheme a single byte S-box with good cryptographic properties no key schedule like in GOST no cryptanalytical attacks better than exhaustive search are known faster than GOST, but slower than AES R. -
The Kupyna Hash Function (DSTU 7564:2014)
A New Standard of Ukraine: The Kupyna Hash Function (DSTU 7564:2014) Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Artem Boiko, Oleksandr Dyrda, Viktor Dolgov and Andrii Pushkaryov JSC Institute of Information Technologies, State Service of Special Communication and Information Protection of Ukraine, V.N.Karazin Kharkiv National University Kharkiv National University of Radio Electronics Ukraine November 24th, 2015 NISK 2015 R. Oliynykov, I. Gorbenko, O. Kazymyrov, et al. Alesund,˚ A New Norway Standard of Ukraine: The Kupyna Hash Function 1 / 20 Outline Retrospective The new Ukrainian hash function Kupyna Performance comparison with other ciphers Conclusions R. Oliynykov, I. Gorbenko, O. Kazymyrov, et al. A New Standard of Ukraine: The Kupyna Hash Function 2 / 20 Retrospective theoretical attacks on the previous hash standard GOST 34.311:2009 (GOST 34.311-95) its computational inefficiency in modern platforms 256-bit length of a hash value is insufficient for some applications replacement in the other post-Soviet states the Belarusian standard STB 34.101.31-2011 defines a hash function GOST R 34.11-2012 ("Streebog") is the new hash function in Russia R. Oliynykov, I. Gorbenko, O. Kazymyrov, et al. A New Standard of Ukraine: The Kupyna Hash Function 3 / 20 Theoretical weaknesses of GOST 34.311:2009 Complexities of cryptanalytic attacks less than brute-force: pre-image attacks 2192 a collision attack 2105 Cryptanalytic attacks are theoretical memory complexity is 275 R. Oliynykov, -
H0= IV H= Ω( Ht) (1.2)
UDC 004 056 55 O.Kachko, Ph.D., D.Televnyi THE KUPYNA HASH FUNCTION CRYPTANALYSIS WITH MERKLE TRESS SIGNATURE SCHEMES Introduction In the modern world, digital signatures (DSAs) have become a crucial element in any cryptographic system. Their usage is not limited only by enterprise or banking systems. The application happens to be huger than thought. The «MUST HAVE» feature of every modern CRM or ERP system. The most widely used systems are based on the asymmetric pair cryptography. With the development of quantum computing a new problem appears for existing signatures. Some are based on the asymmetric transformation, mostly in GF or EC. Thus, quantum algorithms can solve Discrete logarithm tasks or factorization in seemingly short time and memory which makes existing schemes vulnerable. To gain enough strength either a key size must be increased, or a signature run timing, that would result to insufficiency of the signatures. Since late 70’s other schemes were developed. One of them is hash-based signatures. But the machine capabilities did not allow to use them rather than RSA or DSAs. Modern hardware lacks such problems, as well as new algorithms were developed. The signature schemes can be divided into OTS (Lamport, Winternitz, etc.) and FTS (Merkle trees, etc.). Since the large scaling of systems, the later are more preferred. The main goal of this paper is to analyze the security of Merkle Tree Signature Schemes and the national standard application to it. 1. The Kupyna hash function Ukraine had used the GOST 34.311-95 [1] has function before it was replaced in 2015 by DSTU 7564:2014 [2]. -
Heuristic Methods for the Design of Cryptographic Boolean Functions
I. Moskovchenko, A. Kuznetsov, S. Kavun et al. / International Journal of Computing, 18(3) 2019, 265-277 Print ISSN 1727-6209 [email protected] On-line ISSN 2312-5381 www.computingonline.net International Journal of Computing HEURISTIC METHODS FOR THE DESIGN OF CRYPTOGRAPHIC BOOLEAN FUNCTIONS Illarion Moskovchenko 1,2), Alexandr Kuznetsov 2,3), Sergii Kavun 4), Berik Akhmetov 5), Ivan Bilozertsev 2,3), Serhii Smirnov 6) 1) Ivan Kozhedub Kharkiv National Air Force University, Sumska str., 77/79, Kharkiv, 61023, Ukraine 2) V. N. Karazin Kharkiv National University, Svobody sq., 6, Kharkiv, 61022, Ukraine, [email protected], [email protected], [email protected] 3) JSC “Institute of Information Technologies”, Bakulin St., 12, Kharkiv, 61166, Ukraine 4) Kharkiv University of Technology “STEP”, Malom’yasnitska st. 9/11, 61010, Kharkiv, Ukraine, [email protected] 5) Yessenov University, 32 microdistricts, 130003, Aktau, The Republic of Kazakhstan, [email protected] 6) Central Ukrainian National Technical University, University Avenue 8, Kropyvnytskyi, 25006, Ukraine, [email protected] Paper history: Abstract: In this article, heuristic methods of hill climbing for cryptographic Received 20 November 2018 Boolean functions satisfying the required properties of balance, nonlinearity, Received in revised form 28 June 2019 Accepted 10 September 2019 autocorrelation, and other stability indicators are considered. A technique for Available online 30 September 2019 estimating the computational efficiency of gradient search methods, based on the construction of selective (empirical) distribution functions characterizing the probability of the formation of Boolean functions with indices of stability not lower than required, is proposed. As an indicator of computational efficiency, an average number of attempts is proposed to be performed using a heuristic Keywords: method to form a cryptographic Boolean function with the required properties.