SlideShare a Scribd company logo
Russian cryptography: block ciphers
and modes of operation for them
Borodin Mikhail
Yekaterinburg, 2016
Contents
• Block cipher
• History of block ciphers
• GOST 28147-89
• КузНечиК, Kuznyechik
• Modes of operation for block ciphers
Block ciphers
basic block cipher: a cipher that implements a
reversible mapping of the set of plaintext blocks of the
fixed length to the set of chiphertext blocks of the same
length for any fixed key.
The NIST competition
• provide a high level of security
• be completely specified and easy to understand
• be economically implementable in electronic devices
• be available to all users
• be efficient to use
• be exportable
The security of the algorithm must reside in the key;
the security should not depend on the secrecy of the
algorithm.
The algorithm must:
The NIST competition, IBM «Lucifer»
IBM
Lucifer NIST
NSA
DES
What is
better?
DES
32-bit32-bit
Li-1 Ri-1
Li Ri
F+Ki
48-bit
The NIST competition, AES
Main requirements:
• block size of 128 bits
• three key lengths: 128, 192 and 256 bits
• free distribution
Additional requirements:
• easy hardware and software implementation of
used operations
• focus on 32-bit processors
• simple cipher structure for cryptanalysis
possibility.
AES, Rijndael
Input 128-bit
AddRoundKey
SubBytes
ShiftRows
MixColumns
AddRoundKey
SubBytes
ShiftRows
AddRoundKey
Output 128-bit
Nr-1
Input 128-bit
AddRoundKey
InvSubBytes
InvShiftRows
InvMixColumns
AddRoundKey
InvShiftRows
InvSubBytes
AddRoundKey
Output 128-bit
Nr-1
Encryption Decryption
GOST 28147-89
Main characteristics:
• block size of 64 bits
• key length of 256 bits
• based on Feistel network
• unfixed 4-to-4-bit S-boxes
• 32 rounds
GOST 28147-89
32-bit32-bit
Li-1 Ri-1
Li Ri
+ <<<11 S-box
F
Ki
32-bit
GOST 28147-89
GOST 28147-89
Disadvantages:
• small block length
• there are theoretical
attacks
Advantages:
• high-speed software and
hardware implementations
• there are compact
implementation
• the lack of practical attacks
Features:
• unfixed S-boxes
• simple key schedule
GOST R 34.12-2015
Main characteristics:
• block size of 128 bits
• key length of 256 bits
• based on SP-network
• 8-to-8-bit S-box
• recursive MDS-code
«КузНечиК», Kuznyechik
Kuznyechik
Input 128-bit
X
S
L
X
Output 128-bit
9
Encryption Decryption
Input 128-bit
X
Inv L
Inv S
X
Output 128-bit
9
Kuznyechik, implementations
Platform: i7-2600 @ 3.4GHz, Win7, Compiler
VS2008 x64:
• Encryption - 138 MB/sec (24 c/byte)
• Decryption - 120 MB/sec (27 c/byte)
NVIDIA GeForce GTX TITAN, CUDA-cores -2688,
GPU memory – 6 GB, Intel Core i7-4770K:
• Encryption - 5518 MB/sec
Modes of operation
• Electronic Codebook, ECB
• Counter, CTR
• Output Feedback, OFB
• Cipher Block Chaining, CBC
• Cipher Feedback, CFB
• Message Authentication Code algorithm
Padding
Let 𝐫 = 𝑷 𝐦𝐨𝐝 𝐧.
1. 𝑃 =
𝑃, if 𝑟 = 0
𝑃||0 𝑛−𝑟
, else
2. 𝑃||1||0 𝑛−𝑟−1
3. 𝑃 =
𝑃, if 𝑟 = 0
𝑃||1||0 𝑛−𝑟−1
, else
n-bit r-bitn-bit (n-r)-bit
Electronic Codebook, ECB
Российская криптография: блочные шифры и их режимы шифрования (Russian cryptography: block ciphers and modes of operation for them)
Counter, CTR
Output Feedback, OFB
Output Feedback, OFB
Российская криптография: блочные шифры и их режимы шифрования (Russian cryptography: block ciphers and modes of operation for them)
Российская криптография: блочные шифры и их режимы шифрования (Russian cryptography: block ciphers and modes of operation for them)
Российская криптография: блочные шифры и их режимы шифрования (Russian cryptography: block ciphers and modes of operation for them)
Российская криптография: блочные шифры и их режимы шифрования (Russian cryptography: block ciphers and modes of operation for them)
Российская криптография: блочные шифры и их режимы шифрования (Russian cryptography: block ciphers and modes of operation for them)
Cipher Block Chaining, CBC
Cipher Block Chaining, CBC
Cipher Feedback, CFB
Cipher Feedback, CFB
Message Authentication Code algorithm
Thank you
for your attention!
• ГОСТ Р 34.12–2015 "Информационная технология. Криптографическая защита информации.
Блочные шифры"
• ГОСТ Р 34.13–2015 "Информационная технология. Криптографическая защита информации. Режимы
работы блочных шифров"
• FIPS PUB 46-3", Data Encryption Standard (DES)”, January 15, 1977, 1999
• ISO/IEC 18033-3:2010 Information technology – Security techniques – Encryption algorithms – Part 3:
Block ciphers
• Schneier B. Applied cryptography: protocols, algorithms, and source code in C. – john wiley & sons, 2007
• Бондаренко А., Маршалко Г., Шишкин В. ГОСТ Р 34.12–2015: чего ожидать от нового стандарта? //
Information Security/ – 2015. – № 4. – С. 48–50
• http://competitions.cr.yp.to/aes.html
• https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation
• A. Poschmann, S. Ling, H. Wang, 256 bit standardized crypto for 650 GE – GOST revisited, CHES 2010,
LNCS 6225, pp. 219-233, 2010
• С. Смышляев. Вопросы применимости российских криптоалгоритмов,
events.yandex.ru/events/meetings/24-july-2015/
• T. Isobe. A Single-Key Attack on the Full GOST Block Cipher, LNCS v. 6733, p. 290–305. Springer, 2011
• М. А. Бородин, А. С. Рыбкин «Высокоскоростные программные реализации блочного шифра
"Кузнечик"» Проблемы информационной безопасности. Компьютерные системы. - 2014. - № 3. - С.
67-73
• I. Dinur, O. Dunkelman, A. Shamir. Improved Attacks on Full GOST, eprint.iacr.org
• D. Fomin, Implementation of an XSL block cipher with MDS-matrix liner transformation on NVIDIA CUDA.
In 3rd Workshop on Current Trends in Cryptology (CTCrypt 2014)
• D. Fomin, A timing attack on CUDA implementations of an AES-type block cipher, CTCrypr 2015
Preproceedings, Kazan, 2015.

More Related Content

PDF
Weaponization of IoT
Jose L. Quiñones-Borrero
 
PDF
Cisco iou installation
eduardocaceresdelpino
 
PDF
Rafa Sánchez & Fran Gomez - IoCker - When IPv6 met malware [rooted2019]
RootedCON
 
PDF
Aes jul-upload
Setia Juli Irzal Ismail
 
PDF
Raúl Siles - IOT: INTERNET OF T... [rooted2018]
RootedCON
 
PPTX
Типовые сценарии атак на современные клиент-серверные приложения
Advanced monitoring
 
PPTX
Кто и как атаковал российские организации в 2016-ом. Статистика и тенденции.
Advanced monitoring
 
PPTX
Анализ защиты мобильных приложений Facebook, Instagram, LinkedIn, Вконтакте и...
Advanced monitoring
 
Weaponization of IoT
Jose L. Quiñones-Borrero
 
Cisco iou installation
eduardocaceresdelpino
 
Rafa Sánchez & Fran Gomez - IoCker - When IPv6 met malware [rooted2019]
RootedCON
 
Aes jul-upload
Setia Juli Irzal Ismail
 
Raúl Siles - IOT: INTERNET OF T... [rooted2018]
RootedCON
 
Типовые сценарии атак на современные клиент-серверные приложения
Advanced monitoring
 
Кто и как атаковал российские организации в 2016-ом. Статистика и тенденции.
Advanced monitoring
 
Анализ защиты мобильных приложений Facebook, Instagram, LinkedIn, Вконтакте и...
Advanced monitoring
 

Viewers also liked (16)

PPTX
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Advanced monitoring
 
PPTX
Игнорируем уязвимости сегодня? Расплачиваемся завтра!
Advanced monitoring
 
PPTX
Vulnerability Prevention. Управляем уязвимостями – предупреждаем атаки
Advanced monitoring
 
PPTX
Расследование инцидентов ИБ с помощью открытых интернет-источников
Advanced monitoring
 
PPTX
Threat Intelligence вам поможет, если его правильно приготовить…
Advanced monitoring
 
PPTX
Практический опыт мониторинга и анализа компьютерных атак
Advanced monitoring
 
PPTX
Анализ защищенности ПО и инфраструктур – подходы и результаты
Advanced monitoring
 
PDF
Crypto regulations in Russia
Aleksey Lukatskiy
 
PDF
Encryption Boot Camp on the JVM
Matthew McCullough
 
PDF
New in russia electronic (digital) signatures, electronic vat invoices, elect...
Awara Direct Search
 
PDF
Huawei smart grid rus
Nick Turunov
 
PDF
Cybercrime in Russia: Trends and Issues
Alex Matrosov
 
PDF
Вебинар по криптомаршрутизаторам, 14.12.2016
S-Terra CSP
 
PPTX
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
Brent Muir
 
PPTX
How to encrypt everything that moves and keep it usable
Denis Gundarev
 
PDF
OpenPGP and Russian Cryptography
Dmitry Baryshkov
 
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Advanced monitoring
 
Игнорируем уязвимости сегодня? Расплачиваемся завтра!
Advanced monitoring
 
Vulnerability Prevention. Управляем уязвимостями – предупреждаем атаки
Advanced monitoring
 
Расследование инцидентов ИБ с помощью открытых интернет-источников
Advanced monitoring
 
Threat Intelligence вам поможет, если его правильно приготовить…
Advanced monitoring
 
Практический опыт мониторинга и анализа компьютерных атак
Advanced monitoring
 
Анализ защищенности ПО и инфраструктур – подходы и результаты
Advanced monitoring
 
Crypto regulations in Russia
Aleksey Lukatskiy
 
Encryption Boot Camp on the JVM
Matthew McCullough
 
New in russia electronic (digital) signatures, electronic vat invoices, elect...
Awara Direct Search
 
Huawei smart grid rus
Nick Turunov
 
Cybercrime in Russia: Trends and Issues
Alex Matrosov
 
Вебинар по криптомаршрутизаторам, 14.12.2016
S-Terra CSP
 
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
Brent Muir
 
How to encrypt everything that moves and keep it usable
Denis Gundarev
 
OpenPGP and Russian Cryptography
Dmitry Baryshkov
 
Ad

Similar to Российская криптография: блочные шифры и их режимы шифрования (Russian cryptography: block ciphers and modes of operation for them) (20)

PPT
Introduction to Block cipher Technology -unit 1
ramamoorthi24
 
PPT
Fault Detection Scheme for AES Using Composite Field
AJAL A J
 
PPT
Twofish-Encryption-Algorithm-by-Horatiu-Paul-Stancu (1).ppt
BasantTiwari5
 
PPTX
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Seddiq Q. Abd Al-Rahman
 
PDF
IoT Protocols by Nagasai Panchakarla | CuTech Talks
Cumulations Technologies
 
PPTX
CapTech Talks Webinar Feb 2023 Rick Hansen.pptx
CapitolTechU
 
PPTX
Symmetric encryption
DR RICHMOND ADEBIAYE
 
PDF
Emily Stamm - Post-Quantum Cryptography
CSNP
 
PPTX
Advanced encryption standard (aes)
farazvirk554
 
PPT
System On Chip (SOC)
Shivam Gupta
 
PPT
block ciphers
Asad Ali
 
PPTX
1-Introduction of Network Security CS 703.pptx
SumitSrivastava631987
 
PPTX
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
BlueHat Security Conference
 
PPTX
Information and network security 29 international data encryption algorithm
Vaibhav Khanna
 
PPTX
Swarm of temperature monitoring sensors - Ixia Connect #2
IxiaRomania
 
PPT
Ipsec
Rupesh Mishra
 
PDF
CNIT 141: 4. Block Ciphers
Sam Bowne
 
PDF
DEF CON 23 - vivek ramachadran - chellam
Felipe Prado
 
PPTX
Overview on Cryptography and Network Security
Dr. Rupa Ch
 
Introduction to Block cipher Technology -unit 1
ramamoorthi24
 
Fault Detection Scheme for AES Using Composite Field
AJAL A J
 
Twofish-Encryption-Algorithm-by-Horatiu-Paul-Stancu (1).ppt
BasantTiwari5
 
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Seddiq Q. Abd Al-Rahman
 
IoT Protocols by Nagasai Panchakarla | CuTech Talks
Cumulations Technologies
 
CapTech Talks Webinar Feb 2023 Rick Hansen.pptx
CapitolTechU
 
Symmetric encryption
DR RICHMOND ADEBIAYE
 
Emily Stamm - Post-Quantum Cryptography
CSNP
 
Advanced encryption standard (aes)
farazvirk554
 
System On Chip (SOC)
Shivam Gupta
 
block ciphers
Asad Ali
 
1-Introduction of Network Security CS 703.pptx
SumitSrivastava631987
 
BlueHat v17 || Extracting Secrets from Silicon – A New Generation of Bug Hunt...
BlueHat Security Conference
 
Information and network security 29 international data encryption algorithm
Vaibhav Khanna
 
Swarm of temperature monitoring sensors - Ixia Connect #2
IxiaRomania
 
CNIT 141: 4. Block Ciphers
Sam Bowne
 
DEF CON 23 - vivek ramachadran - chellam
Felipe Prado
 
Overview on Cryptography and Network Security
Dr. Rupa Ch
 
Ad

Recently uploaded (20)

PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 

Российская криптография: блочные шифры и их режимы шифрования (Russian cryptography: block ciphers and modes of operation for them)

  • 1. Russian cryptography: block ciphers and modes of operation for them Borodin Mikhail Yekaterinburg, 2016
  • 2. Contents • Block cipher • History of block ciphers • GOST 28147-89 • КузНечиК, Kuznyechik • Modes of operation for block ciphers
  • 3. Block ciphers basic block cipher: a cipher that implements a reversible mapping of the set of plaintext blocks of the fixed length to the set of chiphertext blocks of the same length for any fixed key.
  • 4. The NIST competition • provide a high level of security • be completely specified and easy to understand • be economically implementable in electronic devices • be available to all users • be efficient to use • be exportable The security of the algorithm must reside in the key; the security should not depend on the secrecy of the algorithm. The algorithm must:
  • 5. The NIST competition, IBM «Lucifer» IBM Lucifer NIST NSA DES What is better?
  • 7. The NIST competition, AES Main requirements: • block size of 128 bits • three key lengths: 128, 192 and 256 bits • free distribution Additional requirements: • easy hardware and software implementation of used operations • focus on 32-bit processors • simple cipher structure for cryptanalysis possibility.
  • 8. AES, Rijndael Input 128-bit AddRoundKey SubBytes ShiftRows MixColumns AddRoundKey SubBytes ShiftRows AddRoundKey Output 128-bit Nr-1 Input 128-bit AddRoundKey InvSubBytes InvShiftRows InvMixColumns AddRoundKey InvShiftRows InvSubBytes AddRoundKey Output 128-bit Nr-1 Encryption Decryption
  • 9. GOST 28147-89 Main characteristics: • block size of 64 bits • key length of 256 bits • based on Feistel network • unfixed 4-to-4-bit S-boxes • 32 rounds
  • 10. GOST 28147-89 32-bit32-bit Li-1 Ri-1 Li Ri + <<<11 S-box F Ki 32-bit
  • 12. GOST 28147-89 Disadvantages: • small block length • there are theoretical attacks Advantages: • high-speed software and hardware implementations • there are compact implementation • the lack of practical attacks Features: • unfixed S-boxes • simple key schedule
  • 13. GOST R 34.12-2015 Main characteristics: • block size of 128 bits • key length of 256 bits • based on SP-network • 8-to-8-bit S-box • recursive MDS-code «КузНечиК», Kuznyechik
  • 14. Kuznyechik Input 128-bit X S L X Output 128-bit 9 Encryption Decryption Input 128-bit X Inv L Inv S X Output 128-bit 9
  • 15. Kuznyechik, implementations Platform: i7-2600 @ 3.4GHz, Win7, Compiler VS2008 x64: • Encryption - 138 MB/sec (24 c/byte) • Decryption - 120 MB/sec (27 c/byte) NVIDIA GeForce GTX TITAN, CUDA-cores -2688, GPU memory – 6 GB, Intel Core i7-4770K: • Encryption - 5518 MB/sec
  • 16. Modes of operation • Electronic Codebook, ECB • Counter, CTR • Output Feedback, OFB • Cipher Block Chaining, CBC • Cipher Feedback, CFB • Message Authentication Code algorithm
  • 17. Padding Let 𝐫 = 𝑷 𝐦𝐨𝐝 𝐧. 1. 𝑃 = 𝑃, if 𝑟 = 0 𝑃||0 𝑛−𝑟 , else 2. 𝑃||1||0 𝑛−𝑟−1 3. 𝑃 = 𝑃, if 𝑟 = 0 𝑃||1||0 𝑛−𝑟−1 , else n-bit r-bitn-bit (n-r)-bit
  • 33. Thank you for your attention!
  • 34. • ГОСТ Р 34.12–2015 "Информационная технология. Криптографическая защита информации. Блочные шифры" • ГОСТ Р 34.13–2015 "Информационная технология. Криптографическая защита информации. Режимы работы блочных шифров" • FIPS PUB 46-3", Data Encryption Standard (DES)”, January 15, 1977, 1999 • ISO/IEC 18033-3:2010 Information technology – Security techniques – Encryption algorithms – Part 3: Block ciphers • Schneier B. Applied cryptography: protocols, algorithms, and source code in C. – john wiley & sons, 2007 • Бондаренко А., Маршалко Г., Шишкин В. ГОСТ Р 34.12–2015: чего ожидать от нового стандарта? // Information Security/ – 2015. – № 4. – С. 48–50 • http://competitions.cr.yp.to/aes.html • https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation • A. Poschmann, S. Ling, H. Wang, 256 bit standardized crypto for 650 GE – GOST revisited, CHES 2010, LNCS 6225, pp. 219-233, 2010 • С. Смышляев. Вопросы применимости российских криптоалгоритмов, events.yandex.ru/events/meetings/24-july-2015/ • T. Isobe. A Single-Key Attack on the Full GOST Block Cipher, LNCS v. 6733, p. 290–305. Springer, 2011 • М. А. Бородин, А. С. Рыбкин «Высокоскоростные программные реализации блочного шифра "Кузнечик"» Проблемы информационной безопасности. Компьютерные системы. - 2014. - № 3. - С. 67-73 • I. Dinur, O. Dunkelman, A. Shamir. Improved Attacks on Full GOST, eprint.iacr.org • D. Fomin, Implementation of an XSL block cipher with MDS-matrix liner transformation on NVIDIA CUDA. In 3rd Workshop on Current Trends in Cryptology (CTCrypt 2014) • D. Fomin, A timing attack on CUDA implementations of an AES-type block cipher, CTCrypr 2015 Preproceedings, Kazan, 2015.