Heuristic Methods for the Design of Cryptographic Boolean Functions

Total Page:16

File Type:pdf, Size:1020Kb

Heuristic Methods for the Design of Cryptographic Boolean Functions I. Moskovchenko, A. Kuznetsov, S. Kavun et al. / International Journal of Computing, 18(3) 2019, 265-277 Print ISSN 1727-6209 [email protected] On-line ISSN 2312-5381 www.computingonline.net International Journal of Computing HEURISTIC METHODS FOR THE DESIGN OF CRYPTOGRAPHIC BOOLEAN FUNCTIONS Illarion Moskovchenko 1,2), Alexandr Kuznetsov 2,3), Sergii Kavun 4), Berik Akhmetov 5), Ivan Bilozertsev 2,3), Serhii Smirnov 6) 1) Ivan Kozhedub Kharkiv National Air Force University, Sumska str., 77/79, Kharkiv, 61023, Ukraine 2) V. N. Karazin Kharkiv National University, Svobody sq., 6, Kharkiv, 61022, Ukraine, [email protected], [email protected], [email protected] 3) JSC “Institute of Information Technologies”, Bakulin St., 12, Kharkiv, 61166, Ukraine 4) Kharkiv University of Technology “STEP”, Malom’yasnitska st. 9/11, 61010, Kharkiv, Ukraine, [email protected] 5) Yessenov University, 32 microdistricts, 130003, Aktau, The Republic of Kazakhstan, [email protected] 6) Central Ukrainian National Technical University, University Avenue 8, Kropyvnytskyi, 25006, Ukraine, [email protected] Paper history: Abstract: In this article, heuristic methods of hill climbing for cryptographic Received 20 November 2018 Boolean functions satisfying the required properties of balance, nonlinearity, Received in revised form 28 June 2019 Accepted 10 September 2019 autocorrelation, and other stability indicators are considered. A technique for Available online 30 September 2019 estimating the computational efficiency of gradient search methods, based on the construction of selective (empirical) distribution functions characterizing the probability of the formation of Boolean functions with indices of stability not lower than required, is proposed. As an indicator of computational efficiency, an average number of attempts is proposed to be performed using a heuristic Keywords: method to form a cryptographic Boolean function with the required properties. heuristic methods; Comparative assessments of the effectiveness of the heuristic methods are cryptographic Boolean functions; symmetric cryptography; considered. The results of investigations of the cryptographic properties of the nonlinear substitute blocks. formed Boolean functions in comparison with the best known assessments are given. On the basis of the conducted research, it can be concluded that the functions constructed in accordance with the developed method have high persistence indexes and exceed the known functions by these indicators. Copyright © Research Institute for Intelligent Computer Systems, 2019. All rights reserved. 1. INTRODUCTION investigated. In [12, 13], the influence of S-blocks on avalanche effects, differential and linear An important element of most modern symmetric properties of block ciphers is investigated. The ciphers are non-linear replacement blocks [1-7], papers [14, 15] are dedicated to the study of the which are described with the help of Boolean or, in properties of nonlinear replacement nodes in modern general, vector cryptographic functions [6]. stream ciphers in comparison with the "Strumok" Indicators of the cryptographic strength of such algorithm proposed as a new standard of stream functions (balance, nonlinearity, autocorrelation, encryption in Ukraine [16]. etc.) directly affect the efficiency of symmetric Methods for constructing S-blocks are ciphers, their resistance to most modern investigated by many authors, for example, in [17- cryptanalytical attacks [5-15]. In particular, the 20]. However, the most developed and widespread is algebraic properties of S-blocks of modern block the mathematical apparatus of cryptographic ciphers are investigated in [5-7] and their influence Boolean functions [21-28]. In particular, a new on sustainability to algebraic cryptanalysis is shown. recursive construction of a Boolean function with In [8-11], combinatorial properties of non-linear maximum algebraic immunity is presented in [21]; knots in the context of the security evaluation of in [22, 23] genetic algorithms for constructing various encryption modes and key schedules were Boolean functions with the required cryptographic 265 I. Moskovchenko, A. Kuznetsov, S. Kavun et al. / International Journal of Computing, 18(3) 2019, 265-277 properties are examined; in [24] the method of The sequence of the function f is (1,-1) – a simulation of annealing is investigated; evolutionary f () f () sequence, defined as ( ( 1) 0 , ( 1) 1 , …, methods are studied in [25, 26]; papers [27, 28] are f () dedicated to the heuristic methods of gradient ( 1) 2n1 ) [21-28]. search. The truth table of a function f is (0,1) - a The purpose of this paper is to continue studies n sequence, defined as (f(0), f(1), f () ) [21-28]. of the method of gradient descent, first proposed in 2 1 [28], an assessment of its computational complexity The sequence of the function f is balanced if its in comparison with the closest analog in [27]. For (0,1) -sequence ((1, -1) - sequence) contains the this purpose, the necessary terms and definitions in same number of zeros and ones (ones and minus Section 2 are introduced; the heuristic methods ones). The function f is balanced if its sequence is studied in [27, 28] are summarized in Section 3 and balanced [21-28]. the calculated data for the required number of The balance of the function is an indicator of operations for the realization of gradient descent stability, reflecting the weakness of the output (Table I) is provided. Section 4 evaluates the sequence to statistical attacks. properties of the gradient-lift method for the An affine function f is a function of the form f = formation of high non-linear correlation-immune a1x1 … anxn с, где aj, с GF(2), j = 1, 2,..., cryptographic Boolean functions. In section 5 a п. Function f is called linear, if с = 0 [21-28]. methodology for assessing the effectiveness of The Hamming weight of the vector ((0,1)- heuristic methods is proposed and the results of sequence ), denoted by W(), is the number of comparative studies are represented. In particular, it ones in the vector (sequence) [21-28]. has been shown that the method of gradient descent The Hamming distance d (f,g) between the in [28] for a significantly smaller number of sequences of two functions f and g is the number of iterations (in dozens of times) makes it possible to positions in which the sequences of these functions form cryptographic Boolean functions with the are different [21-28]. required indices of nonlinearity and autocorrelation. The nonlinearity of the NS transformation is the Section 6 presents the results of investigations of the minimum Hamming distance between the output cryptographic properties of the formed Boolean sequence S and all output sequences of affine functions and compares them with the best known functions over a certain field [21-28]: NS = min assessments. In conclusion, the obtained results are {d(S,)}, where - is the set of affine functions. summarized and directions for further research are The nonlinearity of the function Nf is the minimal formulated briefly. Hamming distance Nf between the function f and all affine functions over GF (2n) [21-28]: where is the 2. INDICES OF STABILITY set of affine functions. OF CRYPTOGRAPHIC BOOLEAN For an arbitrary function f, the nonlinearity of Nf n n – 1 n/2 – 1 FUNCTIONS over GF (2 ) can reach [21-28]: Nf 2 – 2 . For a balanced function f over GF (2n) (n 3), the The basic concepts and definitions of the nonlinearity of Nf can reach [21-28]: mathematical apparatus of Boolean algebra used in evaluating the effectiveness of non-linear nodes to n1 n /2 1 replace symmetric ciphers were introduced in [21- 2 2 2 ,n 2 k , N f , 28]. 2n1 2 n /2 1 ,n 2 k 1, The Boolean function f of n variables is the function [21-28], variables is the function that maps n from the field GF(2 ) of all binary vectors x = (x1, where x – is the maximal even integer less …, xn) of length n to the field GF(2). Usually Boolean functions are represented in algebraic than or equal to х. Non-linearity of the function is an indicator normal form (ANF) and are considered as the sum of the products of the component coordinates. reflecting the stability of functions to correlative The algebraic degree deg (f) is the degree of the (linear) attacks. longest summand of a function represented in an The function f has a correlation immunity of algebraic normal form. Algebraic degree reflects the order k if the output sequence of the function y Y resistance to analytical attacks, designed to reduce is statistically independent of any subset of k input this function to cryptographically weak (linear). coordinates [21-28]: {x1, …, xk} P(y Y / {x1, …, xk} Х) = P(y Y). Equivalent definition of correlation immunity in terms of the Walsh transform [21-28]: the function f 266 I. Moskovchenko, A. Kuznetsov, S. Kavun et al. / International Journal of Computing, 18(3) 2019, 265-277 n over the field GF(2 ) has correlation immunity of f(x) f(x α) is balanced α Vn, W(α) 0; order k, CI(k) if its Walsh transform satisfies the f(x) , x takes the value of one 2n-1 2n/2 – 1 equality F() = 0 for all V such as 1 W() n times α V ; k: V , F() = 0, CI (f) = k. n n f(x) h(x), where h(x) – affine function, is also a The Walsh transformation F() of the function f bent function. over the field GF(2n) is defined as the real-valued Autocorrelation function ̂() for s 0...n 1 is function [21-28]: 2 defined as F() = 2-n ( 1) f(), x x , x . where Vn, f(х), ,x N (,x -is the scalar product w1x1 … wnxn) . The value of autocorrelation reflects the stability Correlation-immune function of the k-th order is of the functions to the class of analytic attacks, a function possessing correlation immunity of the designed to find a correlation between the fragments order of k.
Recommended publications
  • Cryptanalysis of Block Ciphers with New Design Strategies
    Cryptanalysis of Block Ciphers with New Design Strategies Mohamed Tolba A Thesis in The Concordia Institute for Information Systems Engineering Presented in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy (Information Systems Engineering) at Concordia University Montreal, Quebec, Canada October 2017 ©Mohamed Tolba, 2017 CONCORDIA UNIVERSITY SCHOOL OF GRADUATE STUDIES This is to certify that the thesis prepared By: Mohamed Tolba Entitled: Cryptanalysis of Block Ciphers with New Design Strategies and submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Information Systems Engineering) complies with the regulations of the University and meets the accepted standards with re- spect to originality and quality. Signed by the final examining committee: Chair Dr. Theodore Stathopoulos External Examiner Dr. Huapeng Wu External to Program Dr. Anjali Agarwal Examiner Dr. Lingyu Wang Examiner Dr. Mohammad Mannan Thesis Supervisor Dr. Amr M. Youssef Approved by Dr. Chadi Assi, Graduate Program Director December 4th,2017 Dr. Amir Asif, Dean, Faculty of Engineering and Computer Science Abstract Cryptanalysis of Block Ciphers with New Design Strategies Mohamed Tolba, Ph.D. Concordia University, 2017 Block ciphers are among the mostly widely used symmetric-key cryptographic primitives, which are fundamental building blocks in cryptographic/security systems. Most of the public- key primitives are based on hard mathematical problems such as the integer factorization in the RSA algorithm and discrete logarithm problem in the DiffieHellman. Therefore, their security are mathematically proven. In contrast, symmetric-key primitives are usually not constructed based on well-defined hard mathematical problems. Hence, in order to get some assurance in their claimed security properties, they must be studied against different types of cryptanalytic techniques.
    [Show full text]
  • Analysis of the Kupyna-256 Hash Function
    Analysis OF THE Kupyna-256 Hash Function Christoph DobrAUNIG Maria Eichlseder Florian Mendel FSE 2016 M I T + Permutation-based DESIGN 2 N H −1 H AES-like ROUND TRANSFORMATIONS I T ⊕ I 2 2 N N Similar TO Grøstl Modular ADDITIONS INSIDE www.iaik.tugraz.at The Kupyna Hash Function UkrAINIAN STANDARD DSTU 7564:2014 [Oli+15; Олi+15a] M1 M2 M T IV F F F Ω HASH 2 2 2 N N N N N 2 f256; 512g 1 / 14 www.iaik.tugraz.at The Kupyna Hash Function UkrAINIAN STANDARD DSTU 7564:2014 [Oli+15; Олi+15a] M1 M2 M T IV F F F Ω HASH 2 2 2 N N N N N 2 f256; 512g M I T + Permutation-based DESIGN 2 N H −1 H AES-like ROUND TRANSFORMATIONS I T ⊕ I 2 2 N N Similar TO Grøstl Modular ADDITIONS INSIDE 1 / 14 www.iaik.tugraz.at The Kupyna-256 Round TRANSFORMATIONS Kupyna-512: 8 × 16 state, 14 ROUNDS Kupyna-256: 8 × 8 state, 10 rounds: AddConstant SubBytes ShiftBytes MixBytes f3f3f3f3f3f3f3f3 f0f0f0f0f0f0f0f0 f0f0f0f0f0f0f0f0 S + f0f0f0f0f0f0f0f0 T : f0f0f0f0f0f0f0f0 f0f0f0f0f0f0f0f0 f0f0f0f0f0f0f0f0 f¯ı e¯ı d¯ı c¯ı b¯ı a¯ı 9¯ı 8¯ı 0I 1I 2I 3I 4I 5I 6I 7I T ⊕: S R = MB ◦ RB ◦ SB ◦ AC I 2 / 14 Destroys byte-alignment & MDS PROPERTY BrANCH NUMBER OF T + REDUCED FROM 9 TO ≤ 6: MB AC > MB > AC > X1:(00 00 00 00 00 00 00 00) 7−−!(00 00 00 00 00 00 00 00) 7−!(F3 F0 F0 F0 F0 F0 F0 70); > MB > AC > X2:(00 00 00 00 00 00 00 FF) 7−−!(DB C7 38 AB FF 24 FF FF) 7−!(CE B8 29 9C F0 15 F0 70); > MB > AC > ∆:(00 00 00 00 00 00 00FF ) 7−−!(DB C7 38 AB FF 24 FF FF) 7−!(3D 48 D9 6C 00 E5 00 00): www.iaik.tugraz.at Modular Constant Addition Prevent SAME TRAILS FOR T +, T ⊕ Grøstl INSTEAD HAS
    [Show full text]
  • Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain
    I. J. Computer Network and Information Security, 2021, 2, 1-15 Published Online April 2021 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2021.02.01 Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain Alexandr Kuznetsov1 , Inna Oleshko2, Vladyslav Tymchenko3, Konstantin Lisitsky4, Mariia Rodinko5 and Andrii Kolhatin6 1,3,4,5,6 V. N. Karazin Kharkiv National University, Svobody sq., 4, Kharkiv, 61022, Ukraine E-mail: [email protected], [email protected], [email protected], [email protected], [email protected] 2 Kharkiv National University of Radio Electronics, Nauky Ave. 14, Kharkiv, 61166, Ukraine E-mail: [email protected] Received: 30 June 2020; Accepted: 21 October 2020; Published: 08 April 2021 Abstract: A blockchain, or in other words a chain of transaction blocks, is a distributed database that maintains an ordered chain of blocks that reliably connect the information contained in them. Copies of chain blocks are usually stored on multiple computers and synchronized in accordance with the rules of building a chain of blocks, which provides secure and change-resistant storage of information. To build linked lists of blocks hashing is used. Hashing is a special cryptographic primitive that provides one-way, resistance to collisions and search for prototypes computation of hash value (hash or message digest). In this paper a comparative analysis of the performance of hashing algorithms that can be used in modern decentralized blockchain networks are conducted. Specifically, the hash performance on different desktop systems, the number of cycles per byte (Cycles/byte), the amount of hashed message per second (MB/s) and the hash rate (KHash/s) are investigated.
    [Show full text]
  • Cryptanalysis of the Round-Reduced Kupyna Hash Function
    Cryptanalysis of the Round-Reduced Kupyna Hash Function Jian Zou1;2, Le Dong3 1Mathematics and Computer Science of Fuzhou University, Fuzhou, China, 350108 2Key Lab of Information Security of Network Systems (Fuzhou University), Fuzhou, China, China, 350108 3 College of Mathematics and Information Science, Henan Normal University, Xinxiang, China, 453007 [email protected], [email protected] Abstract. The Kupyna hash function was selected as the new Ukrainian standard DSTU 7564:2014 in 2015. It is designed to replace the old In- dependent States (CIS) standard GOST 34.311-95. The Kupyna hash function is an AES-based primitive, which uses Merkle-Damg˚ardcom- pression function based on Even-Mansour design. In this paper, we show the first cryptanalytic attacks on the round-reduced Kupyna hash func- tion. Using the rebound attack, we present a collision attack on 5-round of the Kupyna-256 hash function. The complexity of this collision at- tack is (2120; 264) (in time and memory). Furthermore, we use guess-and- determine MitM attack to construct pseudo-preimage attacks on 6-round Kupyna-256 and Kupyna-512 hash function, respectively. The complex- ity of these preimage attacks are (2250:33; 2250:33) and (2498:33; 2498:33) (in time and memory), respectively. Key words: Kupyna, preimage attack, collision attack, rebound attack, meet-in-the-middle, guess-and-determine 1 Introduction Cryptographic hash functions are playing important roles in the modern cryp- tography. They have many important applications, such as authentication and digital signatures. In general, hash function must satisfy three security require- ments: preimage resistance, second preimage resistance and collision resistance.
    [Show full text]
  • Embeddability Is One of the Most Important Properties for Dedicate Interconnection Networks
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING XX, XXX-XXX (201X) Cryptanalysis of the Round-Reduced Kupyna 1,2 3 JIAN ZOU , LE DONG 1Mathematics and Computer Science of Fuzhou University, Fuzhou, China, 350108 2Key Lab of Information Security of Network Systems (Fuzhou University), Fuzhou, China, 350108 3 Henan Engineering Laboratory for Big Data Statistical Analysis and Optimal Control, Henan Normal University, Xinxiang, China, 453007 E-mail: {[email protected], [email protected]} Kupyna was approved as the new Ukrainian hash standard in 2015. In this paper, we show several pseudo-preimage attacks and collision attacks on Kupyna. Due to the wide-pipe design, it is hard to construct pseudo-preimage attacks on Kupyna. Combining the meet-in-the-middle attack with the guess-and-determine technique, we propose some pseudo-preimage attacks on the compression function for 5-round Kupyna-256 and 7-round Kupyna-512. The complexities of these two pseudo-preimage attacks are 2229.5 (for 5-round Kupyna-256) and 2499 (for 7-round Kupyna-512) respectively. Regarding the collision attack, we can not only construct a collision attack on the 7-round Kupyna-512 compression function with a complexity of 2159.3, but also construct a colli- sion attack on the 5-round Kupyna-512 hash function with a complexity of 2240. Key words: Kupyna, pseudo-preimage, collision, rebound attack, meet-in-the-middle. 1 INTRODUCTION Cryptographic hash functions are playing important roles in the modern cryptography. In general, hash function must satisfy three security requirements: preimage resistance, second preimage resistance and collision resistance. Regarding the preimage attack, the meet-in-the-middle (MitM) attack proposed by Aoki and Sasaki [1] was a generic method to construct preimage attacks against hash function.
    [Show full text]
  • 008/511.Pdf 5
    УДК 004.056.5 DOI:10.30837/rt.2019.3.198.06 О.О. КУЗНЕЦОВ, д-р техн. наук, В.А. ТИМЧЕНКО, К.Є. ЛИСИЦЬКИЙ, М.Ю. РОДІНКО, М.С. ЛУЦЕНКО, К.Ю. ШЕХАНІН, А.О. КОЛГАТІН ДОСЛІДЖЕННЯ ШВИДКОДІЇ ТА СТАТИСТИЧНОЇ БЕЗПЕКИ АЛГОРИТМІВ КРИПТОГРАФІЧНОГО ҐЕШУВАННЯ Вступ Cтаття є продовженням попередніх робіт «Алгоритми криптографічного ґешування, які застосовуються в сучасних блокчейн-системах» та «Дослідження алгоритмів криптографіч- ного ґешування, які застосовуються в сучасних блокчейн-системах». В цій роботі проводяться порівняльні дослідження алгоритмів криптографічного ґешу- вання, які застосовуються (або можуть застосовуватися) в сучасних децентралізованих блок- чейн-системах. Зокрема досліджується швидкодія ґешування на різних десктопних системах, оцінюється кількість тактів обчислювальної системи на один байт (Cycles/byte), обсяг ґешо- ваного повідомлення за одну секунду (MB/s) та кількість сформованих ґеш-кодів за секунду (KHash/s). Додатково проводяться дослідження швидкодії окремих криптографічних функцій ґешування на графічних обчислювачах. Для оцінки статистичної безпеки проводяться дослі- дження вихідних послідовностей криптографічних функцій ґешування при обробці ними надмірних вхідних даних (які сформовано за допомогою звичайного лічильника). Для порів- няльних досліджень показників статистичної безпеки використовується методика NIST STS (Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications), яку рекомендовано Національним інститутом стандартів і технологій США для дослідження генераторів випадкових
    [Show full text]
  • Computer Science and Cybersecurity (Cs&Cs
    ISSN XXXX-XXXX CS&CS, Issue 1(5) 2017 UDC 004 056 55 PROPOSALS OF COMPARATIVE ANALYSIS AND DECISION MAKING DURING THE COMPETITION REGARDING THE CERTAIN BENEFITS OF ASYMMETRIC POST QUANTUM CRYPTOGRAPHIC PRIMITIVES I. Gorbenko, Yu. Gorbenko, M. Yesina, V. Ponomar V.N. Karazin Kharkiv National University, Svobody sq., 4, Kharkov, 61022, Ukraine [email protected]; [email protected]; [email protected]; [email protected] Reviewer: Roman Olіynikov, Dr., Full Professor, V.N. Karazin Kharkiv National University, Svobody sq., 4, Kharkov, 61022, Ukraine [email protected] Received on February 2017 Abstract. The paper considers proposals on the implementation of cryptographic primitives comparative analysis and substantiation, development and experimental confirmation of methodical bases application possibilities of sys- tem unconditional and conditional criteria selection and application, and methods and technique of comparative analysis and making the decision on asymmetric post quantum cryptographic primitives type directional encryption, and keys encapsulation and electronic signatures mechanisms. Some criteria and indicators that can be used for comparative analysis of properties of the candidates for the post quantum cryptographic primitives are presented. Comparative analysis of the existing mechanisms of perspective electronic signatures in accordance with ISO/IEC 14888-3:2016 standard and some cryptographic primitives that are considered possible to use in the post quantum period is carried out. The results of the cryptographic primitives conducted estimation are presented. Conclusions and recommendations on the use of certain cryptographic primitives estimation methods are made. Keywords: electronic signature mechanisms analysis, weight indices, electronic signature, electronic signature esti- mation criterion, electronic signature comparison analysis methods. 1 Introduction In 2016 there were the series of important events, that have significantly affected to the intensive development of post quantum cryptography.
    [Show full text]
  • Statistical Testing of Blockchain Hash Algorithms
    Statistical Testing of Blockchain Hash Algorithms Alexandr Kuznetsov 1 [0000-0003-2331-6326], Maria Lutsenko 1 [0000-0003-2075-5796], Kateryna Kuznetsova 1 [0000-0002-5605-9293], Olena Martyniuk 2 [0000-0002-0377-7881], Vitalina Babenko 1 [0000-0002-4816-4579] and Iryna Perevozova 3[0000-0002-3878-802X] 1 V. N. Karazin Kharkiv National University, Kharkiv, Ukraine [email protected], [email protected], [email protected], [email protected] 2 International Humanitarian University, Odessa, Ukraine, [email protected] 3 Ivano-Frankivsk National Technical University of Oil and Gas, Ivano-Frankivsk, Ukraine, [email protected] Abstract. Various methods are used for statistical testing of cryptographic algo- rithms, for example, NIST STS (A Statistical Test Suite for the Validation of Random Number Generators and Pseudo Random Number Generators for Cryptographic Applications) and DIEHARD (Diehard Battery of Tests of Ran- domness). Tests consists of verification the hypothesis of randomness for se- quences generated at the output of a cryptographic algorithm (for example, a keys generator, encryption algorithms, a hash function, etc.). In this paper, we use the NIST STS technique and study the statistical properties of the most common hashing functions that are used or can be used in modern blockchain networks. In particular, hashing algorithms are considered which specified in national and international standards, as well as little-known hash functions that were developed for limited use in specific applications. Thus, in this paper, we consider the most common hash functions used in more than 90% of blockchain networks. The research results are given as average by testing data of 100 se- quences of 108 bytes long, which means that is, the size of the statistical sample for each algorithm was 1010 bytes.
    [Show full text]
  • View the Index
    INDEX OF TERMS 2013, 2 Axolotl, 11 65537, 2 Backdoor, 11 A5/0, 2 Backtracking resistance, 11 A5/1, 2 Backward secrecy, 11 A5/2, 3 Base64, 12 A5/3, 3 BassOmatic, 12 A5/4, 3 BB84, 12 Adaptive attack, 3 bcrypt, 12 AEAD (authenticated encryption Biclique cryptanalysis, 13 with associated data) , 3 BIKE (Bit Flipping Key AES (Advanced Encryption Encapsulation), 13 Standard), 4 BIP (Bitcoin improvement AES-CCM, 4 proposal), 13 AES-GCM, 5 Bit Gold, 14 AES-GCM-SIV, 5 Bitcoin, 14 AES-NI, 5 Black, 14 AES-SIV, 6 BLAKE, 14 AIM (Advanced INFOSEC Machine), 6 BLAKE2, 14 AKA, 6 BLAKE3, 14 AKS (Agrawal–Kayal–Saxena), 7 Bleichenbacher attack, 15 Algebraic cryptanalysis, 7 Blind signature, 15 Alice, 7 Block cipher, 16 All-or-nothing transform (AONT), 7 Blockchain, 16 Anonymous signature, 8 Blockcipher, 17 Applied Cryptography, 8 Blowfish, 17 Applied cryptography, 8 BLS (Boneh-Lynn-Shacham) ARC4, 8 signature, 17 Argon2, 8 Bob, 18 ARX (Add-Rotate-XOR), 9 Boolean function, 18 ASIACRYPT, 9 Boomerang attack, 18 Asymmetric cryptography, 9 BQP (bounded-error quantum Attack, 9 polynomial time), 19 Attribute-based encryption (ABE), 10 Braid group cryptography, 19 Authenticated cipher, 11 Brainpool curves, 19 Break-in recovery, 20 Cryptologia, 29 Broadcast encryption, 20 Cryptology, 29 Brute-force attack, 20 Cryptonomicon, 29 Bulletproof, 20 Cryptorchidism, 30 Byzantine fault tolerance, 21 Cryptovirology, 30 CAESAR, 21 CRYPTREC, 30 Caesar’s cipher, 22 CSIDH (Commutative Supersingular CAVP (Cryptographic Algorithm Isogeny Diffie–Hellman), 30 Validation Program), 22
    [Show full text]
  • A New Encryption Standard of Ukraine: the Kalyna Block Cipher (DSTU 7624:2014)
    A New Encryption Standard of Ukraine: The Kalyna Block Cipher (DSTU 7624:2014) Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Yurii Gorbenko and Viktor Dolgov JSC Institute of Information Technologies, State Service of Special Communication and Information Protection of Ukraine, V.N.Karazin Kharkiv National University Kharkiv National University of Radio Electronics Ukraine November 24th, 2015 NISK 2015 Alesund,˚ Norway R. Oliynykov, I. Gorbenko, O. Kazymyrov, et al. A New Encryption Standard of Ukraine: The Kalyna Block Cipher 1 / 23 R. Oliynykov, I. Gorbenko, O. Kazymyrov, et al. A New Encryption Standard of Ukraine: The Kalyna Block Cipher 2 / 23 My path: 2009-2015 R. Oliynykov, I. Gorbenko, O. Kazymyrov, et al. A New Encryption Standard of Ukraine: The Kalyna Block Cipher 3 / 23 Outline Second generation of block ciphers in the post-Soviet states The new Ukrainian block cipher Kalyna Performance comparison with other ciphers Other sections of the Ukrainian national standard DSTU 7624:2014 Conclusions R. Oliynykov, I. Gorbenko, O. Kazymyrov, et al. A New Encryption Standard of Ukraine: The Kalyna Block Cipher 4 / 23 The block cipher GOST 28147-89 Advantages a well known and researched cipher, adopted as the national standard in 1990 acceptable encryption speed appropriate for lightweight cryptography "good" S-boxes provide practical strength Disadvantages theoretically broken huge classes of weak keys special S-boxes allow practical ciphertext-only attacks significantly slower performance in comparison to modern block ciphers like AES R. Oliynykov, I. Gorbenko, O. Kazymyrov, et al. A New Encryption Standard of Ukraine: The Kalyna Block Cipher 5 / 23 Replacements for GOST 28147-89 in Belarus Belarus: STB 34.101.31-2011 the block length is 128 bits; the key length is 128, 192 or 256 bits 8-round Feistel network with a Lai-Massey scheme a single byte S-box with good cryptographic properties no key schedule like in GOST no cryptanalytical attacks better than exhaustive search are known faster than GOST, but slower than AES R.
    [Show full text]
  • The Kupyna Hash Function (DSTU 7564:2014)
    A New Standard of Ukraine: The Kupyna Hash Function (DSTU 7564:2014) Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Artem Boiko, Oleksandr Dyrda, Viktor Dolgov and Andrii Pushkaryov JSC Institute of Information Technologies, State Service of Special Communication and Information Protection of Ukraine, V.N.Karazin Kharkiv National University Kharkiv National University of Radio Electronics Ukraine November 24th, 2015 NISK 2015 R. Oliynykov, I. Gorbenko, O. Kazymyrov, et al. Alesund,˚ A New Norway Standard of Ukraine: The Kupyna Hash Function 1 / 20 Outline Retrospective The new Ukrainian hash function Kupyna Performance comparison with other ciphers Conclusions R. Oliynykov, I. Gorbenko, O. Kazymyrov, et al. A New Standard of Ukraine: The Kupyna Hash Function 2 / 20 Retrospective theoretical attacks on the previous hash standard GOST 34.311:2009 (GOST 34.311-95) its computational inefficiency in modern platforms 256-bit length of a hash value is insufficient for some applications replacement in the other post-Soviet states the Belarusian standard STB 34.101.31-2011 defines a hash function GOST R 34.11-2012 ("Streebog") is the new hash function in Russia R. Oliynykov, I. Gorbenko, O. Kazymyrov, et al. A New Standard of Ukraine: The Kupyna Hash Function 3 / 20 Theoretical weaknesses of GOST 34.311:2009 Complexities of cryptanalytic attacks less than brute-force: pre-image attacks 2192 a collision attack 2105 Cryptanalytic attacks are theoretical memory complexity is 275 R. Oliynykov,
    [Show full text]
  • H0= IV H= Ω( Ht) (1.2)
    UDC 004 056 55 O.Kachko, Ph.D., D.Televnyi THE KUPYNA HASH FUNCTION CRYPTANALYSIS WITH MERKLE TRESS SIGNATURE SCHEMES Introduction In the modern world, digital signatures (DSAs) have become a crucial element in any cryptographic system. Their usage is not limited only by enterprise or banking systems. The application happens to be huger than thought. The «MUST HAVE» feature of every modern CRM or ERP system. The most widely used systems are based on the asymmetric pair cryptography. With the development of quantum computing a new problem appears for existing signatures. Some are based on the asymmetric transformation, mostly in GF or EC. Thus, quantum algorithms can solve Discrete logarithm tasks or factorization in seemingly short time and memory which makes existing schemes vulnerable. To gain enough strength either a key size must be increased, or a signature run timing, that would result to insufficiency of the signatures. Since late 70’s other schemes were developed. One of them is hash-based signatures. But the machine capabilities did not allow to use them rather than RSA or DSAs. Modern hardware lacks such problems, as well as new algorithms were developed. The signature schemes can be divided into OTS (Lamport, Winternitz, etc.) and FTS (Merkle trees, etc.). Since the large scaling of systems, the later are more preferred. The main goal of this paper is to analyze the security of Merkle Tree Signature Schemes and the national standard application to it. 1. The Kupyna hash function Ukraine had used the GOST 34.311-95 [1] has function before it was replaced in 2015 by DSTU 7564:2014 [2].
    [Show full text]