Jump to content

Kuznyechik

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Orenburg1 (talk | contribs) at 16:41, 24 April 2018 (→‎Source code). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Kuznyechik
General
DesignersInfoTeCS JSC[1]
First published2015
CertificationGOST, and FSS
Cipher detail
Key sizes256 bits Feistel network
Block sizes128 bits
StructureSubstitution-permutation network
Rounds10
Best public cryptanalysis
A meet-in-the-middle attack on 5 rounds.[2]

Kuznyechik (Russian: Кузнечик) is a symmetric block cipher. It has a block size of 128 bits and key length of 256 bits. It is defined in the National Standard of the Russian Federation GOST R 34.12-2015[3] and also in RFC 7801.

The name of the cipher can be translated from Russian as grasshopper, however, the standard explicitly says that the English name for the cipher is Kuznyechik (/kʊznˈɛɪk/). The designers claim that by naming the cipher Kuznyechik they follow the trend of difficult to pronounce algorithm names set up by Rijndael and Keccak.[4]

The standard GOST R 34.12-2015 defines the new cipher in addition to the old GOST block cipher (now called Magma) one and does not declare the old cipher obsolete.[5]

Kuznyechik is based on a substitution-permutation network, though the key schedule employs a Feistel network. The first block cipher with a mixed structure.[citation needed]

Designations

Finite field .

()

.

.

Description

For encryption, decryption and key generation, the following functions:

, where , are binary strings of the form ( is string concatenation).

is a reversed transformation of .

— reversed transformation of ,

, where — composition of transformations and etc.

The nonlinear transformation

Non-linear transformation is given by substituting S = Bin8 S' Bin8−1.

Values of the substitution S' are given as array S' = (S'(0), S'(1), …, S'(255)):

Linear transformation

:

operations of addition and multiplication are carried out in the field .

Key generation

key generation algorithm uses iterative constant , i=1,2,…32. Sets the shared key .

Iterated keys

Encryption algorithm

where a — 128-bit string.

Decryption algorithm

Cryptanalysis

Riham AlTawy and Amr M. Youssef describe a meet-in-the-middle attack on the 5-round reduced Kuznyechik which allows to recover the key with time complexity of 2140, memory complexity of 2153, and data complexity of 2113.[2]

Alex Biryukov, Leo Perrin, and Aleksei Udovenko published a paper in which they show that the S-Boxes of Kuznyechik and Streebog were not created pseudo-randomly but using a hidden algorithm which they were able to reverse engineer.[6]

Later Leo Perrin and Aleksei Udovenko published two alternative decompositions of the S-Box and proved its connection to the S-Box of Belarusian cipher BelT.[7]. The authors of the paper note that while the reason of using such a structure remains unclear, generating S-Boxes by a hidden algorithm contradicts the concept of nothing up my sleeve numbers which could prove that no weaknesses were intentionally introduced in their design.

Riham AlTawy, Onur Duman, and Amr M. Youssef published two fault attacks on Kuznyechik which show the importance of protecting the implementations of the cipher.[8]

Adoption

VeraCrypt (a fork of TrueCrypt) included Kuznyechik as one of its supported encryption algorithms.[9]

Source code

http://tc26.ru/standard/draft/PR_GOSTR-bch_v4.zip https://fossies.org/windows/misc/VeraCrypt_1.22_Source.zip/src/Crypto/kuznyechik.c (Alternative link for the case in which the first link is not working)

References

  1. ^ http://tc26.ru/standard/draft/PR_GOSTR-bch_v4.zip
  2. ^ a b "A Meet in the Middle Attack on Reduced Round Kuznyechik" (PDF). 2015-04-17. {{cite journal}}: Cite journal requires |journal= (help); Cite uses deprecated parameter |authors= (help)
  3. ^ http://tc26.ru/en/standard/gost/GOST_R_34_12_2015_ENG.pdf National Standard of the Russian Federation GOST R 34.12–2015 (English Version)
  4. ^ https://mjos.fi/doc/rus/gh_ctcrypt.pdf Low-Weight and Hi-End: Draft Russian Encryption Standard
  5. ^ http://www.itsec.ru/articles2/crypto/gost-r-chego-ozhidat-ot-novogo-standarta GOST R 34.12–2015: what to expect from a new standard? (Russian only)
  6. ^ "Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1 (Full Version)" (PDF). 2016-02-18. {{cite journal}}: Cite journal requires |journal= (help); Cite uses deprecated parameter |authors= (help)
  7. ^ Léo Perrin, Aleksei Udovenko (2017). "Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog" (PDF).
  8. ^ "Fault Analysis of Kuznyechik" (PDF). 2015-04-17. {{cite journal}}: Cite journal requires |journal= (help); Cite uses deprecated parameter |authors= (help)
  9. ^ "Kuznyechik". VeraCrypt Documentation. IDRIX. Retrieved 2018-02-03.