Advertisement

New Life of Old Standard: Transition from One-Dimensional Version to 3D

  • Mikhail A. Ivanov
  • Andrey V. Starikovskiy
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 636)

Abstract

The trend of recent years has been the advent of 2D and 3D cryptographic transformations. Standards that have appeared in the 21st century, specify algorithms based on the use of 2D and 3D transformations (AES, Kuznechik, Keccak, Stribog). In the article a 3D version of cryptographic transformation specified by GOST 28147-89 is suggested. The 3D GOST algorithm is characterized by the high degree of parallelism at the level of elementary operations. Increasing bit depth of the processed data blocks from 64 to 512 bits al-lows 3D GOST to be used for the synthesis of hash algorithms. Algorithm improvement agenda may be similar to the DOZEN family of algorithms.

Keywords

Block cipher 2D transformation 3D transformation GOST DOZEN 

Notes

Acknowledgments

The publication is prepared in accordance with the scientific research under the Agreement between the Federal State Autonomous Educational Institution of Higher Education “National Research Nuclear University MEPhI” and the Ministry of Education and Science № 14.578.21.0117 on 27.10.2015. The unique identifier for the applied scientific research (project) is RFMEFI57815X0117.

References

  1. 1.
  2. 2.
    GOST R 34.12-2015: Information Technology. Cryptographic Information Defense. Block Ciphers, Moscow, Standartinform (2015)Google Scholar
  3. 3.
    Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak sponge function family. Main document. http://keccak.noekeon.org/Keccak-main-2.1.pdf
  4. 4.
    GOST R 34.11-2012: Information Technology. Cryptographic Information Defense. Hash function. Moscow, Standartinform (2012)Google Scholar
  5. 5.
    Yu, V.A.: GOST ne prost …, a ochen’ prost! Monitor, No 1, pp. 60–73 (1995)Google Scholar
  6. 6.
    Boreskov, A.V., Kharlamov, A.A.: Basics with CUDA Technology. DMK Press, Moscow (2011)Google Scholar
  7. 7.
  8. 8.
    Ivanov, M.A., Spiridonov, A.A., Chugunkov, I.V., et. al.: Three-dimensional data stochastic transformation algorithms for hybrid supercomputer implementation. In: Proceedings of 17th IEEE Mediterranean Electrotechnical Conference (MELECON), Beirut, Lebanon, pp. 451–457 (2014)Google Scholar
  9. 9.
    Ivanov, M.A., Matveychikov, I.V., Skitev, A.A., Strelchenko, P.A.: Three new methods of stochastic data transformation. In: Proceedings of the Radio-Electronic Devices and Systems for the Infocommunication Technologies (REDS-2016), Moscow, Russia, pp. 300–302, 22–23 May 2016Google Scholar
  10. 10.
    A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publications 800-22. Revision 1.a., April 2010Google Scholar
  11. 11.
    Chugunkov, I.V., Kutepov, S.V., Shustova, L.I., et. al.: Reducing of memory usage in statistical research into pseudorandom number generators by validation tests. In: Proceedings of the Radio-Electronic Devices and Systems for the Infocommunication Technologies (REDS-2013), Moscow, Russia, pp. 148–152, 22–23 May 2013Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.National Research Nuclear University, MEPhI (Moscow Engineering Physics Institute)MoscowRussia

Personalised recommendations