The Kupyna hash function cryptanalysis with Merkle Trees Signature schemes
DOI:
https://doi.org/10.30837/rt.2018.4.195.03Keywords:
tree traversal problem, merkle tree schemes, kupyna, cryptanalisys, dsa, mssAbstract
The paper is devoted to the security analysis of the Kupyna (DSTU 7564:2014) hash function applied to Merkle tree signature schemes. The paper lists possible attacks on the hash, and their application for signature schemes. The results show expediency of using the Kypuna hash in Merkel schemes based on the performance, security levels and strength against known cryptanalytic attacksReferences
Metrology and Certification of the Commonwealth of Independence States. GOST 34.311-95. Information technology. Cryptographic Data Security. Hash function. Metrology and Certification of the Commonwealth of Independence States. Minsk, 1995. (In Rus).
Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov, Ruslan Mordvinov, Dmytro Kaidalov. A new encryption standard of Ukraine: The Kalyna block cipher. Cryptology ePrint Archive. Report 2015/650, 2015. http://eprint.iacr.org/2015/650.pdf
Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Artem Boiko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov. A New Standard of Ukraine: The Kupyna Hash Function. Cryptology ePrint Archive. Report 2015/885, 2015. https://eprint.iacr.org/2015/885.pdf
Christoph Dobraunig, Maria Eichlseder, and Florian Mendel. Analysis of the Kupyna-256 Hash Function, Graz University of Technology, Austria, Cryptology ePrint Archive. Report 2015/956, 2015. https://eprint.iacr.org/2015/956.pdf
Mendel F., Rechberger C., Schl affer M., Thomsen S.S.: Rebound attacks on the reduced Grøstl hash function. In: Pieprzyk, J. (ed.) Topics in Cryptology – CT-RSA 2010. LNCS. – Vol. 5985. – P. 350–365. Springer (2010)
Jean J., Naya-Plasencia M., Peyrin T. Improved rebound attack on the finalist Grøstl. In: Canteaut, A. (ed.) Fast Software Encryption – FSE 2012. LNCS. – Vol. 7549. – P. 110–126. Springer (2012)
Ralph Merkle. Secrecy, authentication and public key systems // A certified digital signature.Ph.D. dissertation, Dept. of Electrical Engineering, Stanford University, 1979.
Michael Szydlo. Merkle tree traversal in log space and time. Eurocrypt, 2004.
Klintsevich K., Okeya, Vuillaume C., Buchmann J., Dahmen E. Merkle signatures with virtually unlimited signature capacity. 5th International Conference on Applied Cryptography and Network Security. – ACNS07, 2007.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).