Publicado 12 números por año
ISSN Imprimir: 0040-2508
ISSN En Línea: 1943-6009
Indexed in
THE KUPYNA HASH FUNCTION CRYPTANALYSIS WITH THE MERKLE TREES SIGNATURE SCHEMES
SINOPSIS
The paper is devoted to the security analysis of the Kupyna (DSTU 7564:2014) hash function applied to Merkle tree signature schemes. The paper lists possible attacks on the hash, and their application for signature schemes. The results show expediency of using the Kypuna hash in Merkel schemes based on the performance, security levels and strength against known cryptanalytic attacks.
-
Metrology and Certification of the Commonwealth of Independence States, GOST 34.311-95. Information technology, Cryptographic Data Security, Hash function, Metrology and Certification of the Commonwealth of Independence States, Minsk, Belarus, 1995.
-
Oliynykov, R., Gorbenko, I., Kazymyrov, O., Ruzhentsev, V. et al., (2015) , A new encryption standard of Ukraine: The Kalyna block cipher, Cryptology ePrint Archive, Report 2015/650, http://eprint.iacr.org/2015/650.pdf.
-
Oliynykov, R., Gorbenko, I., Kazymyrov, O., Ruzhentsev, V. et al., (2015) , A New Standard of Ukraine: The Kupyna Hash Function, Cryptology ePrint Archive, Report 2015/885, https://eprint.iacr.org/2015/885.pdf.
-
Dobraunig, Ch., Eichlseder, M., and Mendel, F., (2015) , Analysis of the Kupyna-256 Hash Function, Graz University of Technology, Austria, Cryptology ePrint Archive, Report 2015/956, https://eprint.iacr.org/2015/956.pdf.
-
Mendel, F., Rechberger, C., Schlaffer, M., and Thomsen, S.S., (2010) , Rebound attacks on the reduced Grøstl hash function, Topics in Cryptology – CT-RSA 2010. LNCS, 5985, pp. 350-365, Springer.
-
Jean, J., Naya-Plasencia, M., and Peyrin, T., (2012) , Improved rebound attack on the finalist Grøstl, Fast Software Encryption – FSE 2012. LNCS, 7549, pp. 110-126, Springer.
-
Merkle, R., (1979) , Secrecy, authentication and public key systems, A certified digital signature, Ph.D. dissertation, Dept. of Electrical Engineering, Stanford University.
-
Szydlo, M., (2004) , Merkle tree traversal in log space and time, Eurocrypt.
-
Klintsevich, K., Okeya, V.C., Buchmann J., and Merkle, D.E., (2007) , Signatures with virtually unlimited signature capacity, 5th International Conference on Applied Cryptography and Network Security. – ACNS07.