The document summarizes Russian cryptography techniques, including block ciphers and modes of operation. It discusses the history of block ciphers and competitions like NIST AES. It specifically covers the Russian standards GOST 28147-89 and GOST R 34.12-2015 named Kuznyechik. It also reviews modes of operation like ECB, CBC, CTR, and padding techniques. Implementation results for Kuznyechik show encryption speeds of over 5GB/s on GPU. References are provided for further reading.
2. Contents
• Block cipher
• History of block ciphers
• GOST 28147-89
• КузНечиК, Kuznyechik
• Modes of operation for block ciphers
3. Block ciphers
basic block cipher: a cipher that implements a
reversible mapping of the set of plaintext blocks of the
fixed length to the set of chiphertext blocks of the same
length for any fixed key.
4. The NIST competition
• provide a high level of security
• be completely specified and easy to understand
• be economically implementable in electronic devices
• be available to all users
• be efficient to use
• be exportable
The security of the algorithm must reside in the key;
the security should not depend on the secrecy of the
algorithm.
The algorithm must:
7. The NIST competition, AES
Main requirements:
• block size of 128 bits
• three key lengths: 128, 192 and 256 bits
• free distribution
Additional requirements:
• easy hardware and software implementation of
used operations
• focus on 32-bit processors
• simple cipher structure for cryptanalysis
possibility.
12. GOST 28147-89
Disadvantages:
• small block length
• there are theoretical
attacks
Advantages:
• high-speed software and
hardware implementations
• there are compact
implementation
• the lack of practical attacks
Features:
• unfixed S-boxes
• simple key schedule
13. GOST R 34.12-2015
Main characteristics:
• block size of 128 bits
• key length of 256 bits
• based on SP-network
• 8-to-8-bit S-box
• recursive MDS-code
«КузНечиК», Kuznyechik
34. • ГОСТ Р 34.12–2015 "Информационная технология. Криптографическая защита информации.
Блочные шифры"
• ГОСТ Р 34.13–2015 "Информационная технология. Криптографическая защита информации. Режимы
работы блочных шифров"
• FIPS PUB 46-3", Data Encryption Standard (DES)”, January 15, 1977, 1999
• ISO/IEC 18033-3:2010 Information technology – Security techniques – Encryption algorithms – Part 3:
Block ciphers
• Schneier B. Applied cryptography: protocols, algorithms, and source code in C. – john wiley & sons, 2007
• Бондаренко А., Маршалко Г., Шишкин В. ГОСТ Р 34.12–2015: чего ожидать от нового стандарта? //
Information Security/ – 2015. – № 4. – С. 48–50
• http://competitions.cr.yp.to/aes.html
• https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation
• A. Poschmann, S. Ling, H. Wang, 256 bit standardized crypto for 650 GE – GOST revisited, CHES 2010,
LNCS 6225, pp. 219-233, 2010
• С. Смышляев. Вопросы применимости российских криптоалгоритмов,
events.yandex.ru/events/meetings/24-july-2015/
• T. Isobe. A Single-Key Attack on the Full GOST Block Cipher, LNCS v. 6733, p. 290–305. Springer, 2011
• М. А. Бородин, А. С. Рыбкин «Высокоскоростные программные реализации блочного шифра
"Кузнечик"» Проблемы информационной безопасности. Компьютерные системы. - 2014. - № 3. - С.
67-73
• I. Dinur, O. Dunkelman, A. Shamir. Improved Attacks on Full GOST, eprint.iacr.org
• D. Fomin, Implementation of an XSL block cipher with MDS-matrix liner transformation on NVIDIA CUDA.
In 3rd Workshop on Current Trends in Cryptology (CTCrypt 2014)
• D. Fomin, A timing attack on CUDA implementations of an AES-type block cipher, CTCrypr 2015
Preproceedings, Kazan, 2015.