DocumentCode
3608090
Title
Watch your constants: malicious Streebog
Author
AlTawy, Riham ; Youssef, Amr M.
Author_Institution
Concordia Inst. for Inf. Syst. Eng., Concordia Univ., Montréal, QC, Canada
Volume
9
Issue
6
fYear
2015
Firstpage
328
Lastpage
333
Abstract
In August 2012, the Streebog hash function was selected as the new Russian cryptographic hash standard (GOST R 34.11-2012). In this study, the authors investigate the new standard in the context of malicious hashing and present a practical collision for a malicious version of the full hash function. In particular, they apply the rebound attack to find three solutions for three different differential paths for four rounds. Then, using the freedom of the round constants they connect them to obtain a collision for the 12 rounds of the compression function. Additionally, and because of the simple processing of the counter, they bypass the barrier of the checksum finalisation step and transfer the compression function collision to the hash function output with no additional cost. The presented attack has a practical complexity and is verified by an example. Although the results of this study may not have a direct impact on the security of the current Streebog hash function, it presents an urge for the designers to publish the origin of the used parameters and the rational behind their choices in order for this function to gain enough confidence and widespread adoption by the security community.
Keywords
cryptography; Russian cryptographic hash standard; Streebog hash function; checksum finalisation step; compression function; full hash function; malicious hashing; rebound attack; security community; used parameters;
fLanguage
English
Journal_Title
Information Security, IET
Publisher
iet
ISSN
1751-8709
Type
jour
DOI
10.1049/iet-ifs.2014.0540
Filename
7295679
Link To Document