Advertisement

Side Channel Cryptanalysis of Streebog

  • Gautham Sekar
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9497)

Abstract

Streebog is the cryptographic hash function standard of the Russian Federation. It comprises two hash functions corresponding to two digest sizes, 256 bits and 512 bits. This paper presents a side channel attack that uses processor flag information to speed up message recovery by a factor of 2. Success is nearly guaranteed if the flag is set; the probability is 0.668 otherwise.

Keywords

Cryptographic hash function Streebog Side channel cryptanalysis Carry flag Message recovery HMAC 

References

  1. 1.
    AlTawy, R., Kircanski, A., Youssef, A.M.: Rebound attacks on Stribog. In: Lee, H.-S., Han, D.-G. (eds.) ICISC 2013. LNCS, vol. 8565, pp. 175–188. Springer, Heidelberg (2014) Google Scholar
  2. 2.
    AlTawy, R., Youssef, A.M.: Integral distinguishers for reduced-round Stribog. Inf. Process. Lett. 114(8), 426–431 (2014)CrossRefzbMATHGoogle Scholar
  3. 3.
    AlTawy, R., Youssef, A.M.: Preimage attacks on reduced-round Stribog. In: Pointcheval, D., Vergnaud, D. (eds.) AFRICACRYPT 2014. LNCS, vol. 8469, pp. 109–125. Springer, Heidelberg (2014) CrossRefGoogle Scholar
  4. 4.
    Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996) Google Scholar
  5. 5.
    Federal Agency on Technical Regulation and Metrology, “NATIONAL STAN-DARD OF THE RUSSIAN FEDERATION GOST R 34.11-2012” (English Version), 1 January 2013Google Scholar
  6. 6.
    Guo, J., Jean, J., Leurent, G., Peyrin, T., Wang, L.: The usage of counter revisited: second-preimage attack on new Russian standardized hash function. In: Joux, A., Youssef, A. (eds.) SAC 2014. LNCS, vol. 8781, pp. 195–211. Springer, Heidelberg (2014) CrossRefGoogle Scholar
  7. 7.
    Intel, “IA-32 Intel Architecture Software Developer’s Manual”, vol. 1 (Basic Architecture), p. 426 (2003). http://flint.cs.yale.edu/cs422/doc/24547012.pdf
  8. 8.
    Kelsey, J., Schneier, B., Wagner, D., Hall, C.: Side channel cryptanalysis of product ciphers. J. Comput. Secur. 8, 141–158 (2000)CrossRefGoogle Scholar
  9. 9.
    Preneel, B.: Analysis and Design of Cryptographic Hash Functions, PhD thesis, Katholieke Universiteit Leuven (1993)Google Scholar
  10. 10.
    Wang, Z., Yu, H., Wang, X.: Cryptanalysis of GOST R hash function. Inf. Process. Lett. 114(12), 655–662 (2014)CrossRefzbMATHGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Indian Statistical Institute, Chennai CentreChennaiIndia

Personalised recommendations