The Kupyna hash function cryptanalysis with Merkle Trees Signature schemes

Authors

  • O. Kachko
  • D. Televnyi

DOI:

https://doi.org/10.30837/rt.2018.4.195.03

Keywords:

tree traversal problem, merkle tree schemes, kupyna, cryptanalisys, dsa, mss

Abstract

The paper is devoted to the security analysis of the Kupyna (DSTU 7564:2014) hash function applied to Merkle tree signature schemes. The paper lists possible attacks on the hash, and their application for signature schemes. The results show expediency of using the Kypuna hash in Merkel schemes based on the performance, security levels and strength against known cryptanalytic attacks

References

Metrology and Certification of the Commonwealth of Independence States. GOST 34.311-95. Information technology. Cryptographic Data Security. Hash function. Metrology and Certification of the Commonwealth of Independence States. Minsk, 1995. (In Rus).

Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov, Ruslan Mordvinov, Dmytro Kaidalov. A new encryption standard of Ukraine: The Kalyna block cipher. Cryptology ePrint Archive. Report 2015/650, 2015. http://eprint.iacr.org/2015/650.pdf

Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Artem Boiko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov. A New Standard of Ukraine: The Kupyna Hash Function. Cryptology ePrint Archive. Report 2015/885, 2015. https://eprint.iacr.org/2015/885.pdf

Christoph Dobraunig, Maria Eichlseder, and Florian Mendel. Analysis of the Kupyna-256 Hash Function, Graz University of Technology, Austria, Cryptology ePrint Archive. Report 2015/956, 2015. https://eprint.iacr.org/2015/956.pdf

Mendel F., Rechberger C., Schl affer M., Thomsen S.S.: Rebound attacks on the reduced Grøstl hash function. In: Pieprzyk, J. (ed.) Topics in Cryptology – CT-RSA 2010. LNCS. – Vol. 5985. – P. 350–365. Springer (2010)

Jean J., Naya-Plasencia M., Peyrin T. Improved rebound attack on the finalist Grøstl. In: Canteaut, A. (ed.) Fast Software Encryption – FSE 2012. LNCS. – Vol. 7549. – P. 110–126. Springer (2012)

Ralph Merkle. Secrecy, authentication and public key systems // A certified digital signature.Ph.D. dissertation, Dept. of Electrical Engineering, Stanford University, 1979.

Michael Szydlo. Merkle tree traversal in log space and time. Eurocrypt, 2004.

Klintsevich K., Okeya, Vuillaume C., Buchmann J., Dahmen E. Merkle signatures with virtually unlimited signature capacity. 5th International Conference on Applied Cryptography and Network Security. – ACNS07, 2007.

Downloads

Published

2018-12-28

How to Cite

Kachko, O., & Televnyi, D. (2018). The Kupyna hash function cryptanalysis with Merkle Trees Signature schemes. Radiotekhnika, 4(195), 27–31. https://doi.org/10.30837/rt.2018.4.195.03

Issue

Section

Articles