[Resource Topic] 2022/970: Related-key attacks on the compression function of Streebog

Welcome to the resource topic for 2022/970

Title:
Related-key attacks on the compression function of Streebog

Authors: Vitaly Kiryukhin

Abstract:

Related-key attacks against block ciphers are often considered unrealistic. In practice, as far as possible, the existence of a known “relation” between the secret encryption keys is avoided. Despite this, related keys arise directly in some widely used keyed hash functions. This is especially true for HMAC-Streebog, where known constants and manipulated parameters are added to the secret key. The relation is determined by addition modulo 2 and 2^{n}. The security of HMAC reduces to the properties of the underlying compression function. Therefore, as an initial analysis we propose key-recovery methods for 10 and 11 rounds (out of 12) of Streebog compression function in the related-key setting. The result shows that Streebog successfully resists attacks even in the model with such powerful adversaries.

ePrint: https://eprint.iacr.org/2022/970

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .