SlideShare a Scribd company logo
1 of 34
Download to read offline
Russian cryptography: block ciphers
and modes of operation for them
Borodin Mikhail
Yekaterinburg, 2016
Contents
• Block cipher
• History of block ciphers
• GOST 28147-89
• КузНечиК, Kuznyechik
• Modes of operation for block ciphers
Block ciphers
basic block cipher: a cipher that implements a
reversible mapping of the set of plaintext blocks of the
fixed length to the set of chiphertext blocks of the same
length for any fixed key.
The NIST competition
• provide a high level of security
• be completely specified and easy to understand
• be economically implementable in electronic devices
• be available to all users
• be efficient to use
• be exportable
The security of the algorithm must reside in the key;
the security should not depend on the secrecy of the
algorithm.
The algorithm must:
The NIST competition, IBM «Lucifer»
IBM
Lucifer NIST
NSA
DES
What is
better?
DES
32-bit32-bit
Li-1 Ri-1
Li Ri
F+Ki
48-bit
The NIST competition, AES
Main requirements:
• block size of 128 bits
• three key lengths: 128, 192 and 256 bits
• free distribution
Additional requirements:
• easy hardware and software implementation of
used operations
• focus on 32-bit processors
• simple cipher structure for cryptanalysis
possibility.
AES, Rijndael
Input 128-bit
AddRoundKey
SubBytes
ShiftRows
MixColumns
AddRoundKey
SubBytes
ShiftRows
AddRoundKey
Output 128-bit
Nr-1
Input 128-bit
AddRoundKey
InvSubBytes
InvShiftRows
InvMixColumns
AddRoundKey
InvShiftRows
InvSubBytes
AddRoundKey
Output 128-bit
Nr-1
Encryption Decryption
GOST 28147-89
Main characteristics:
• block size of 64 bits
• key length of 256 bits
• based on Feistel network
• unfixed 4-to-4-bit S-boxes
• 32 rounds
GOST 28147-89
32-bit32-bit
Li-1 Ri-1
Li Ri
+ <<<11 S-box
F
Ki
32-bit
GOST 28147-89
GOST 28147-89
Disadvantages:
• small block length
• there are theoretical
attacks
Advantages:
• high-speed software and
hardware implementations
• there are compact
implementation
• the lack of practical attacks
Features:
• unfixed S-boxes
• simple key schedule
GOST R 34.12-2015
Main characteristics:
• block size of 128 bits
• key length of 256 bits
• based on SP-network
• 8-to-8-bit S-box
• recursive MDS-code
«КузНечиК», Kuznyechik
Kuznyechik
Input 128-bit
X
S
L
X
Output 128-bit
9
Encryption Decryption
Input 128-bit
X
Inv L
Inv S
X
Output 128-bit
9
Kuznyechik, implementations
Platform: i7-2600 @ 3.4GHz, Win7, Compiler
VS2008 x64:
• Encryption - 138 MB/sec (24 c/byte)
• Decryption - 120 MB/sec (27 c/byte)
NVIDIA GeForce GTX TITAN, CUDA-cores -2688,
GPU memory – 6 GB, Intel Core i7-4770K:
• Encryption - 5518 MB/sec
Modes of operation
• Electronic Codebook, ECB
• Counter, CTR
• Output Feedback, OFB
• Cipher Block Chaining, CBC
• Cipher Feedback, CFB
• Message Authentication Code algorithm
Padding
Let 𝐫 = 𝑷 𝐦𝐨𝐝 𝐧.
1. 𝑃 =
𝑃, if 𝑟 = 0
𝑃||0 𝑛−𝑟
, else
2. 𝑃||1||0 𝑛−𝑟−1
3. 𝑃 =
𝑃, if 𝑟 = 0
𝑃||1||0 𝑛−𝑟−1
, else
n-bit r-bitn-bit (n-r)-bit
Electronic Codebook, ECB
Counter, CTR
Output Feedback, OFB
Output Feedback, OFB
Cipher Block Chaining, CBC
Cipher Block Chaining, CBC
Cipher Feedback, CFB
Cipher Feedback, CFB
Message Authentication Code algorithm
Thank you
for your attention!
• ГОСТ Р 34.12–2015 "Информационная технология. Криптографическая защита информации.
Блочные шифры"
• ГОСТ Р 34.13–2015 "Информационная технология. Криптографическая защита информации. Режимы
работы блочных шифров"
• FIPS PUB 46-3", Data Encryption Standard (DES)”, January 15, 1977, 1999
• ISO/IEC 18033-3:2010 Information technology – Security techniques – Encryption algorithms – Part 3:
Block ciphers
• Schneier B. Applied cryptography: protocols, algorithms, and source code in C. – john wiley & sons, 2007
• Бондаренко А., Маршалко Г., Шишкин В. ГОСТ Р 34.12–2015: чего ожидать от нового стандарта? //
Information Security/ – 2015. – № 4. – С. 48–50
• http://competitions.cr.yp.to/aes.html
• https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation
• A. Poschmann, S. Ling, H. Wang, 256 bit standardized crypto for 650 GE – GOST revisited, CHES 2010,
LNCS 6225, pp. 219-233, 2010
• С. Смышляев. Вопросы применимости российских криптоалгоритмов,
events.yandex.ru/events/meetings/24-july-2015/
• T. Isobe. A Single-Key Attack on the Full GOST Block Cipher, LNCS v. 6733, p. 290–305. Springer, 2011
• М. А. Бородин, А. С. Рыбкин «Высокоскоростные программные реализации блочного шифра
"Кузнечик"» Проблемы информационной безопасности. Компьютерные системы. - 2014. - № 3. - С.
67-73
• I. Dinur, O. Dunkelman, A. Shamir. Improved Attacks on Full GOST, eprint.iacr.org
• D. Fomin, Implementation of an XSL block cipher with MDS-matrix liner transformation on NVIDIA CUDA.
In 3rd Workshop on Current Trends in Cryptology (CTCrypt 2014)
• D. Fomin, A timing attack on CUDA implementations of an AES-type block cipher, CTCrypr 2015
Preproceedings, Kazan, 2015.

More Related Content

Viewers also liked

Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Advanced monitoring
 
Игнорируем уязвимости сегодня? Расплачиваемся завтра!
Игнорируем уязвимости сегодня? Расплачиваемся завтра!Игнорируем уязвимости сегодня? Расплачиваемся завтра!
Игнорируем уязвимости сегодня? Расплачиваемся завтра!Advanced monitoring
 
Vulnerability Prevention. Управляем уязвимостями – предупреждаем атаки
Vulnerability Prevention. Управляем уязвимостями – предупреждаем атакиVulnerability Prevention. Управляем уязвимостями – предупреждаем атаки
Vulnerability Prevention. Управляем уязвимостями – предупреждаем атакиAdvanced monitoring
 
Расследование инцидентов ИБ с помощью открытых интернет-источников
Расследование инцидентов ИБ с помощью открытых интернет-источниковРасследование инцидентов ИБ с помощью открытых интернет-источников
Расследование инцидентов ИБ с помощью открытых интернет-источниковAdvanced monitoring
 
Threat Intelligence вам поможет, если его правильно приготовить…
Threat Intelligence вам поможет, если его правильно приготовить…Threat Intelligence вам поможет, если его правильно приготовить…
Threat Intelligence вам поможет, если его правильно приготовить…Advanced monitoring
 
Практический опыт мониторинга и анализа компьютерных атак
Практический опыт мониторинга и анализа компьютерных атакПрактический опыт мониторинга и анализа компьютерных атак
Практический опыт мониторинга и анализа компьютерных атакAdvanced monitoring
 
Анализ защищенности ПО и инфраструктур – подходы и результаты
Анализ защищенности ПО и инфраструктур – подходы и результатыАнализ защищенности ПО и инфраструктур – подходы и результаты
Анализ защищенности ПО и инфраструктур – подходы и результатыAdvanced monitoring
 
Crypto regulations in Russia
Crypto regulations in RussiaCrypto regulations in Russia
Crypto regulations in RussiaAleksey Lukatskiy
 
Encryption Boot Camp on the JVM
Encryption Boot Camp on the JVMEncryption Boot Camp on the JVM
Encryption Boot Camp on the JVMMatthew McCullough
 
New in russia electronic (digital) signatures, electronic vat invoices, elect...
New in russia electronic (digital) signatures, electronic vat invoices, elect...New in russia electronic (digital) signatures, electronic vat invoices, elect...
New in russia electronic (digital) signatures, electronic vat invoices, elect...Awara Direct Search
 
Huawei smart grid rus
Huawei smart grid rusHuawei smart grid rus
Huawei smart grid rusNick Turunov
 
Cybercrime in Russia: Trends and Issues
Cybercrime in Russia: Trends and IssuesCybercrime in Russia: Trends and Issues
Cybercrime in Russia: Trends and IssuesAlex Matrosov
 
Вебинар по криптомаршрутизаторам, 14.12.2016
Вебинар по криптомаршрутизаторам, 14.12.2016Вебинар по криптомаршрутизаторам, 14.12.2016
Вебинар по криптомаршрутизаторам, 14.12.2016S-Terra CSP
 
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB FlashingSanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB FlashingBrent Muir
 
How to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usableHow to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usableDenis Gundarev
 
OpenPGP and Russian Cryptography
OpenPGP and Russian CryptographyOpenPGP and Russian Cryptography
OpenPGP and Russian CryptographyDmitry Baryshkov
 

Viewers also liked (16)

Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
 
Игнорируем уязвимости сегодня? Расплачиваемся завтра!
Игнорируем уязвимости сегодня? Расплачиваемся завтра!Игнорируем уязвимости сегодня? Расплачиваемся завтра!
Игнорируем уязвимости сегодня? Расплачиваемся завтра!
 
Vulnerability Prevention. Управляем уязвимостями – предупреждаем атаки
Vulnerability Prevention. Управляем уязвимостями – предупреждаем атакиVulnerability Prevention. Управляем уязвимостями – предупреждаем атаки
Vulnerability Prevention. Управляем уязвимостями – предупреждаем атаки
 
Расследование инцидентов ИБ с помощью открытых интернет-источников
Расследование инцидентов ИБ с помощью открытых интернет-источниковРасследование инцидентов ИБ с помощью открытых интернет-источников
Расследование инцидентов ИБ с помощью открытых интернет-источников
 
Threat Intelligence вам поможет, если его правильно приготовить…
Threat Intelligence вам поможет, если его правильно приготовить…Threat Intelligence вам поможет, если его правильно приготовить…
Threat Intelligence вам поможет, если его правильно приготовить…
 
Практический опыт мониторинга и анализа компьютерных атак
Практический опыт мониторинга и анализа компьютерных атакПрактический опыт мониторинга и анализа компьютерных атак
Практический опыт мониторинга и анализа компьютерных атак
 
Анализ защищенности ПО и инфраструктур – подходы и результаты
Анализ защищенности ПО и инфраструктур – подходы и результатыАнализ защищенности ПО и инфраструктур – подходы и результаты
Анализ защищенности ПО и инфраструктур – подходы и результаты
 
Crypto regulations in Russia
Crypto regulations in RussiaCrypto regulations in Russia
Crypto regulations in Russia
 
Encryption Boot Camp on the JVM
Encryption Boot Camp on the JVMEncryption Boot Camp on the JVM
Encryption Boot Camp on the JVM
 
New in russia electronic (digital) signatures, electronic vat invoices, elect...
New in russia electronic (digital) signatures, electronic vat invoices, elect...New in russia electronic (digital) signatures, electronic vat invoices, elect...
New in russia electronic (digital) signatures, electronic vat invoices, elect...
 
Huawei smart grid rus
Huawei smart grid rusHuawei smart grid rus
Huawei smart grid rus
 
Cybercrime in Russia: Trends and Issues
Cybercrime in Russia: Trends and IssuesCybercrime in Russia: Trends and Issues
Cybercrime in Russia: Trends and Issues
 
Вебинар по криптомаршрутизаторам, 14.12.2016
Вебинар по криптомаршрутизаторам, 14.12.2016Вебинар по криптомаршрутизаторам, 14.12.2016
Вебинар по криптомаршрутизаторам, 14.12.2016
 
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB FlashingSanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
 
How to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usableHow to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usable
 
OpenPGP and Russian Cryptography
OpenPGP and Russian CryptographyOpenPGP and Russian Cryptography
OpenPGP and Russian Cryptography
 

Similar to Российская криптография: блочные шифры и их режимы шифрования (Russian cryptography: block ciphers and modes of operation for them)

Fault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite FieldFault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite Field AJAL A J
 
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of ThingsProposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of ThingsSeddiq Q. Abd Al-Rahman
 
IoT Protocols by Nagasai Panchakarla | CuTech Talks
IoT Protocols by Nagasai Panchakarla | CuTech TalksIoT Protocols by Nagasai Panchakarla | CuTech Talks
IoT Protocols by Nagasai Panchakarla | CuTech TalksCumulations Technologies
 
CapTech Talks Webinar Feb 2023 Rick Hansen.pptx
CapTech Talks Webinar Feb 2023 Rick Hansen.pptxCapTech Talks Webinar Feb 2023 Rick Hansen.pptx
CapTech Talks Webinar Feb 2023 Rick Hansen.pptxCapitolTechU
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyCSNP
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)farazvirk554
 
System On Chip (SOC)
System On Chip (SOC)System On Chip (SOC)
System On Chip (SOC)Shivam Gupta
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...BlueHat Security Conference
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmVaibhav Khanna
 
Swarm of temperature monitoring sensors - Ixia Connect #2
Swarm of temperature monitoring sensors - Ixia Connect #2Swarm of temperature monitoring sensors - Ixia Connect #2
Swarm of temperature monitoring sensors - Ixia Connect #2IxiaRomania
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersSam Bowne
 
DEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellamDEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellamFelipe Prado
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network SecurityDr. Rupa Ch
 
4. Block Ciphers
4. Block Ciphers 4. Block Ciphers
4. Block Ciphers Sam Bowne
 
Decipher openseminar (1)
Decipher openseminar (1)Decipher openseminar (1)
Decipher openseminar (1)Jae-Yun Kim
 
EFFICIENT VLSI IMPLEMENTATION OF THE BLOCK CIPHER RIJNDAEL ALGORITHM
EFFICIENT VLSI IMPLEMENTATION OF THE BLOCK CIPHER RIJNDAEL ALGORITHMEFFICIENT VLSI IMPLEMENTATION OF THE BLOCK CIPHER RIJNDAEL ALGORITHM
EFFICIENT VLSI IMPLEMENTATION OF THE BLOCK CIPHER RIJNDAEL ALGORITHMAJAL A J
 

Similar to Российская криптография: блочные шифры и их режимы шифрования (Russian cryptography: block ciphers and modes of operation for them) (20)

Fault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite FieldFault Detection Scheme for AES Using Composite Field
Fault Detection Scheme for AES Using Composite Field
 
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of ThingsProposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
 
IoT Protocols by Nagasai Panchakarla | CuTech Talks
IoT Protocols by Nagasai Panchakarla | CuTech TalksIoT Protocols by Nagasai Panchakarla | CuTech Talks
IoT Protocols by Nagasai Panchakarla | CuTech Talks
 
Des
DesDes
Des
 
CapTech Talks Webinar Feb 2023 Rick Hansen.pptx
CapTech Talks Webinar Feb 2023 Rick Hansen.pptxCapTech Talks Webinar Feb 2023 Rick Hansen.pptx
CapTech Talks Webinar Feb 2023 Rick Hansen.pptx
 
Symmetric encryption
Symmetric encryptionSymmetric encryption
Symmetric encryption
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum Cryptography
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)
 
System On Chip (SOC)
System On Chip (SOC)System On Chip (SOC)
System On Chip (SOC)
 
block ciphers
block ciphersblock ciphers
block ciphers
 
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
Swarm of temperature monitoring sensors - Ixia Connect #2
Swarm of temperature monitoring sensors - Ixia Connect #2Swarm of temperature monitoring sensors - Ixia Connect #2
Swarm of temperature monitoring sensors - Ixia Connect #2
 
Ipsec
IpsecIpsec
Ipsec
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
 
DEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellamDEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellam
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
 
4. Block Ciphers
4. Block Ciphers 4. Block Ciphers
4. Block Ciphers
 
Decipher openseminar (1)
Decipher openseminar (1)Decipher openseminar (1)
Decipher openseminar (1)
 
EFFICIENT VLSI IMPLEMENTATION OF THE BLOCK CIPHER RIJNDAEL ALGORITHM
EFFICIENT VLSI IMPLEMENTATION OF THE BLOCK CIPHER RIJNDAEL ALGORITHMEFFICIENT VLSI IMPLEMENTATION OF THE BLOCK CIPHER RIJNDAEL ALGORITHM
EFFICIENT VLSI IMPLEMENTATION OF THE BLOCK CIPHER RIJNDAEL ALGORITHM
 

Recently uploaded

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Российская криптография: блочные шифры и их режимы шифрования (Russian cryptography: block ciphers and modes of operation for them)

  • 1. Russian cryptography: block ciphers and modes of operation for them Borodin Mikhail Yekaterinburg, 2016
  • 2. Contents • Block cipher • History of block ciphers • GOST 28147-89 • КузНечиК, Kuznyechik • Modes of operation for block ciphers
  • 3. Block ciphers basic block cipher: a cipher that implements a reversible mapping of the set of plaintext blocks of the fixed length to the set of chiphertext blocks of the same length for any fixed key.
  • 4. The NIST competition • provide a high level of security • be completely specified and easy to understand • be economically implementable in electronic devices • be available to all users • be efficient to use • be exportable The security of the algorithm must reside in the key; the security should not depend on the secrecy of the algorithm. The algorithm must:
  • 5. The NIST competition, IBM «Lucifer» IBM Lucifer NIST NSA DES What is better?
  • 7. The NIST competition, AES Main requirements: • block size of 128 bits • three key lengths: 128, 192 and 256 bits • free distribution Additional requirements: • easy hardware and software implementation of used operations • focus on 32-bit processors • simple cipher structure for cryptanalysis possibility.
  • 8. AES, Rijndael Input 128-bit AddRoundKey SubBytes ShiftRows MixColumns AddRoundKey SubBytes ShiftRows AddRoundKey Output 128-bit Nr-1 Input 128-bit AddRoundKey InvSubBytes InvShiftRows InvMixColumns AddRoundKey InvShiftRows InvSubBytes AddRoundKey Output 128-bit Nr-1 Encryption Decryption
  • 9. GOST 28147-89 Main characteristics: • block size of 64 bits • key length of 256 bits • based on Feistel network • unfixed 4-to-4-bit S-boxes • 32 rounds
  • 10. GOST 28147-89 32-bit32-bit Li-1 Ri-1 Li Ri + <<<11 S-box F Ki 32-bit
  • 12. GOST 28147-89 Disadvantages: • small block length • there are theoretical attacks Advantages: • high-speed software and hardware implementations • there are compact implementation • the lack of practical attacks Features: • unfixed S-boxes • simple key schedule
  • 13. GOST R 34.12-2015 Main characteristics: • block size of 128 bits • key length of 256 bits • based on SP-network • 8-to-8-bit S-box • recursive MDS-code «КузНечиК», Kuznyechik
  • 14. Kuznyechik Input 128-bit X S L X Output 128-bit 9 Encryption Decryption Input 128-bit X Inv L Inv S X Output 128-bit 9
  • 15. Kuznyechik, implementations Platform: i7-2600 @ 3.4GHz, Win7, Compiler VS2008 x64: • Encryption - 138 MB/sec (24 c/byte) • Decryption - 120 MB/sec (27 c/byte) NVIDIA GeForce GTX TITAN, CUDA-cores -2688, GPU memory – 6 GB, Intel Core i7-4770K: • Encryption - 5518 MB/sec
  • 16. Modes of operation • Electronic Codebook, ECB • Counter, CTR • Output Feedback, OFB • Cipher Block Chaining, CBC • Cipher Feedback, CFB • Message Authentication Code algorithm
  • 17. Padding Let 𝐫 = 𝑷 𝐦𝐨𝐝 𝐧. 1. 𝑃 = 𝑃, if 𝑟 = 0 𝑃||0 𝑛−𝑟 , else 2. 𝑃||1||0 𝑛−𝑟−1 3. 𝑃 = 𝑃, if 𝑟 = 0 𝑃||1||0 𝑛−𝑟−1 , else n-bit r-bitn-bit (n-r)-bit
  • 19.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 33. Thank you for your attention!
  • 34. • ГОСТ Р 34.12–2015 "Информационная технология. Криптографическая защита информации. Блочные шифры" • ГОСТ Р 34.13–2015 "Информационная технология. Криптографическая защита информации. Режимы работы блочных шифров" • FIPS PUB 46-3", Data Encryption Standard (DES)”, January 15, 1977, 1999 • ISO/IEC 18033-3:2010 Information technology – Security techniques – Encryption algorithms – Part 3: Block ciphers • Schneier B. Applied cryptography: protocols, algorithms, and source code in C. – john wiley & sons, 2007 • Бондаренко А., Маршалко Г., Шишкин В. ГОСТ Р 34.12–2015: чего ожидать от нового стандарта? // Information Security/ – 2015. – № 4. – С. 48–50 • http://competitions.cr.yp.to/aes.html • https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation • A. Poschmann, S. Ling, H. Wang, 256 bit standardized crypto for 650 GE – GOST revisited, CHES 2010, LNCS 6225, pp. 219-233, 2010 • С. Смышляев. Вопросы применимости российских криптоалгоритмов, events.yandex.ru/events/meetings/24-july-2015/ • T. Isobe. A Single-Key Attack on the Full GOST Block Cipher, LNCS v. 6733, p. 290–305. Springer, 2011 • М. А. Бородин, А. С. Рыбкин «Высокоскоростные программные реализации блочного шифра "Кузнечик"» Проблемы информационной безопасности. Компьютерные системы. - 2014. - № 3. - С. 67-73 • I. Dinur, O. Dunkelman, A. Shamir. Improved Attacks on Full GOST, eprint.iacr.org • D. Fomin, Implementation of an XSL block cipher with MDS-matrix liner transformation on NVIDIA CUDA. In 3rd Workshop on Current Trends in Cryptology (CTCrypt 2014) • D. Fomin, A timing attack on CUDA implementations of an AES-type block cipher, CTCrypr 2015 Preproceedings, Kazan, 2015.