Научная статья на тему 'Analysis of public encryption standard Russian GOST 28147-89 with a view to its integration in information and communication patterns of the Bolivarian Republic of Venezuela'

Analysis of public encryption standard Russian GOST 28147-89 with a view to its integration in information and communication patterns of the Bolivarian Republic of Venezuela Текст научной статьи по специальности «Компьютерные и информационные науки»

CC BY
110
41
i Надоели баннеры? Вы всегда можете отключить рекламу.
Ключевые слова
CRYPTOGRAPHIC ALGORITHM FOR THE PROTECTION / INTERPRETATION / BLOCK CIPHERS / SYMMETRIC ENCRYPTION / GOST 28147-89

Аннотация научной статьи по компьютерным и информационным наукам, автор научной работы — Sanchez Rossel Jose Agustin

The article describes the cryptographic algorithm GOST 28147-89, currently in use in the Russian Federation, which regulates a number of actions encryption and built on related principles of the algorithm generate interpretation. Analyzed the possibility of its integration in information and communication patterns of the Bolivarian Republic of Venezuela.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Текст научной работы на тему «Analysis of public encryption standard Russian GOST 28147-89 with a view to its integration in information and communication patterns of the Bolivarian Republic of Venezuela»

Международный научно-исследовательский журнал ■ № 9(40) ■ Часть 2 ■ Октябрь

Санчес Россель Хосе Агустин

Аспирант,

Институт компьютерных технологий и информационной безопасности ФГАОУ ВПО «Южный федеральный университет»

АНАЛИЗ ГОСУДАРСТВЕННОГО СТАНДАРТА ШИФРОВАНИЯ РОССИИ ГОСТ 28147-89 С ЦЕЛЬЮ ЕГО ИНТЕГРАЦИИ В ИНФОКОММУНИКАЦИОННЫЕ СТРУКТУРЫ БОЛИВАРИАНСКОЙ

РЕСПУБЛИКИ ВЕНЕСУЭЛА

Аннотация

В статье рассмотрен алгоритм криптографических преобразований ГОСТ 28147-89, используемый в настоящий момент в Российской Федераци, который регламентирует ряд действий шифрования, а так же построенного на смежных принципах алгоритма выработки имитовставики. Проанализирована возможность его интеграции винфокоммуникационные структуры Боливарианской Республики Венесуэла.

Ключевые сова: алгоритм криптографической защиты, имитовставка, блочные шифры, симметричное шифрование, ГОСТ 28147-89.

Sanchez Rossel Jose Agustin

Postgaduate student,

FSBEI HPE «Southern Federal University»

ANALYSIS OF PUBLIC ENCRYPTION STANDARD RUSSIAN GOST 28147-89 WITH A VIEW TO ITS INTEGRATION IN INFORMATION AND COMMUNICATION PATTERNS OF THE BOLIVARIAN REPUBLIC OF VENEZUELA

Abstract

The article describes the cryptographic algorithm GOST 28147-89, currently in use in the Russian Federation, which regulates a number of actions encryption and built on related principles of the algorithm generate interpretation. Analyzed the possibility of its integration in information and communication patterns of the Bolivarian Republic of Venezuela.

Keywords: cryptographic algorithm for the protection, interpretation, block ciphers, symmetric encryption, GOST 28147-89.

Security of information and communication structures in the moment is one of the most important tasks of any state, along with the country's defense, health, economy and education.

Information security is organized with the help of cryptographic systems, i.e. using sets of cryptographic transformations or algorithms designed to operate in a single technological chain with the purpose of solving a specific task of protection of the information process. Their implementation uses cryptographic functions, which include: a key generators, encryption functions, pseudorandom generators, calculation and verification of the code values of the authenticity of the message and the digital signature, the value computation of the hash function and others. The present article is devoted to the analysis of cryptographic algorithms GOST 28147-89 (hereinafter simply GOST).

Description of the algorithm GOST

GOST refers to the standard symmetric encryption used in the Russian Federation since 1990 This standard describes a number of actions encryption and built on related principles of the algorithm generate interpretation (fig. 1) [1].

Authentication code is a segment of fixed length information obtained by a specific rule of open data and key and added to the encrypted data to ensure the protection of the encrypted communication system from imposing false data (prevention of false data entry).

The symmetric encryption has the following requirements:

• the lack of linearity (i.e. f(a)xor f(b)=f(a xor b), otherwise facilitates the application of differential cryptanalysis of the cipher);

• complete loss of all statistical laws of amerista original message (cipher must have the "avalanche effect").

The algorithm GOST is a data encryption 64-bit blocks using a key consisting of 256 bits. In the process of encryption takes place 32 round of transformation (Fig. 2):

1. One of the sub-blocks of data of 32-bit size is summed with the value of the 32-bit key encryption roundk) (by |232 |).

2. The result is broken into eight 4-bit parts, which at the same time pass through eight of substitution tables 51(. . .,S8.

3. Parts again after the substitutions are combined into a 32-bit subunit. Then the value of subunit cyclically shifted by 11

bits.

4. Next, after the operations described above, the subunit is superimposed on the raw by using the bitwise logical "exclusive or" (XOR).

5. Ultimately, the subunits are swapped.

86

Международный научно-исследовательский журнал ■ № 9(40) ■ Часть 2 ■ Октябрь

Fig. 1 - The algorithm of generation Fig. 2 - Round algorithm GOST 28147-89

interpretation for data array

Unlike most of the encryption algorithms GOST can use any variations of the blocks, as it has no fixed block replacement.

Classical block ciphers, including GOST, built on the principle of zero, that is, the secrecy of the key determines the secrecy of encrypted messages, so the resistance of such codes depends on the size of the used key. In the Guest uses 256-bit key and volume key space is 2Л256. Secret 256-bit encryption key is represented as a sequence of eight 32-bit words (K1, K2, K3, K4, K5, K6, K7, K8). One of these eight words in each round of encryption is used as roundabo changed. Round key is defined as follows: 1 through 24 rounds are used sequentially K1, K2, K3, K4, K5, K6, K7, K8, K1, K2, etc., and from 25 to 32 rounds: K8, K7, K6, K5, K4, K3, K2, K1.

As we can see from the description, the algorithm GOST is quite simple to implement. In addition to the advantages of GOST can be attributed:

• the futility of force exhaustive search attack;

• efficient implementation on modern computers;

• protection against the imposition of false data (generation of the authentication code) and the same encryption round in all four algorithms GOST.

The disadvantage of GOST is the incompleteness of the standard in question generate keys and replacement tables. A trivial way to prove the existence of weak keys and replacement tables, but the standard does not include information about selection criteria and screening "weak".

Cryptanalysis of the algorithm

Today, you can find only a small number of works devoted to the analysis of cryptographic strength of the algorithm GOST, unlike encryption standards DES and AES.

One of the first public works, which was the analysis of the algorithm [2], shows that ponoramnoy algorithm GOST 28147-89 can be opened using differential cryptanalysis, related, but only in the case of weak replacement tables. In studies L. K. Babenko and E. A. Ishukova is an algorithm of searching for weak units [3, 4]. Application of this algorithm makes it easy to detect a large number of weakened replacement blocks, which can significantly weaken the resistance of the used encryption algorithm. Thus, the use of strong replacement tables found this algorithm for doing such an attack completely impractical.

In [5] is performed cryptanalysis modifications of the algorithm GOST 28147-89 (GOST-H and GOSTA). The analysis shows that the algorithms GOST-H and GOSTA weaker than the classical algorithm GOST 28147-89, since both classes have weak keys.

Below is information about all the known results strictly described attacks on GOST 28147-89 (table 1).

Table

Attack name Complexity Memory The required material

Isobe 2234 T64 232

Dinur-Danckelmann-Shamir, FP, 2DMitM 2192 236 2^

Dinur-Danckelmann-Shamir, FP, low-memory 2™ 219 2^

Dinur-Danckelmann-Shamir, Reflection, 2DMitM 2234 236 232

Dinur-Danckelmann-Shamir, Reflection, 2DMitM 2236 219 232

Full search 2253 1 4

As can be seen from the data, while meeting current operational requirements, none of the proposed methods of

87

Международный научно-исследовательский журнал ■ № 9(40) ■ Часть 2 ■ Октябрь

cryptanalysis of GOST 28147-89 is not possible to determine the key with lesser complexity of exhaustive search.

The above mentioned studies and several other studies [6-7] allow to conclude that a sufficiently high strength of Russian algorithm cryptographic protection.

Conclusions

Analysis of public encryption standard, Russian GOST 28147-89 shows that, regardless of age (as the state standard it is registered in 1989), algorithms GOST easy to use, still have considerable cryptographic strength and high efficiency.

Thus, to improve the effectiveness of information security of the Bolivarian Republic of Venezuela, it seems appropriate to integrate the algorithms GOST in information and communication structures of the state.

References

1. GOST 28147-89 System of information processing. The cryptographic protection. Cryptographic transformation algorithm - М.: Gosstandart of the USSR, 1989.

2. Kelsey J., Schneier B., Wagner D. Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. // http://www.schneier.com - 1996.

3. Babenko L.K., Ishukova Е.А. The analysis of the algorithm GOST 28147-89: the search for weak units // News SFU. Technical science. Thematic issue on "Information security”. - Taganrog: Изд-во ТТИ ЮФУ. - 2014. - № 2(151) -С. 148-157.

4. Babenko L.K., Ishukova Е.А. Использование слабых блоков замены для линейного криптоанализа блочных шифров // News SFU. Technical science. Thematic issue on "Information security”. - Taganrog: Изд-во ТТИ ЮФУ. -2014. - № 2(151). - С. 136-147.

5. Oreku G.S., Li J., Pazynyuk T., Mtenzi F.J. Modified S-box to Archive Accelerated GOST. // http://paper.ijcsns.org -International Journal of Computer Science and Network Security, VOL. 7 No. 6, June 2007.

6. Schneier B. Applied cryptography. Protocols, algorithms, and source code in C language. - trans. fron eng.: М.: Publisher ТРИУМФ, 2002 - 816 с.

7. Rostovtsev, A. G., Makhovenko E. B., Phillipov A. C., A. Chechulin, A. On the strength of GOST 2814789. // http://www.ssl.stu.neva.ru- СПбГПУ.

8. Oreku G.S., Li J., Pazynyuk T., Mtenzi F.J. Modified S-box to Archive Accelerated GOST. // http://paper.ijcsns.org -International Journal of Computer Science and Network Security, VOL. 7 No. 6, June 2007

Сницарь М.А.* 1, Самедов А.М.2

1 Аспирант, 2доктор технических наук, профессор,

Национальный технический университет Украины «Киевский политехнический институт»

РАСЧЕТ БАЛКИ ПОДЗЕМНОГО СООРУЖЕНИЯ ТЕПЛОТРАССЫ ПРИ ИМПУЛЬСНО-СТАТИЧЕСКОЙ НАГРУЗКЕ В УПРУГОЙ СТАДИИ

Аннотация

Рассмотрено проблемы расчета балки подземного сооружения теплотрассы при совместном действии импульсных и статических нагрузок в упругой стадии работы. Составлены и решены дифференциальные уравнения движения (перемещения) балки при совместном действии динамических и статических нагрузок. Определены максимальные изгибающие моменты Mmax и прогибы Ymax при различных видах закрепления концов балки.

Ключевые слова: импульсно-статические нагрузки, упругая стадия работы, жесткость балки, коэффициент динамичности.

Snitsar M.A.1, Samedov A.M. 2 Postgraduate student, 2PhD in Engineering, professor,

National Technical University of Ukraine «Kiev Polytechnic Institute»

CALCULATION OF BEAMS UNDERGROUND INSTALLATIONS OF HEATING MAINS UNDER

PULSED-LOAD STATIC ELASTIC STAGE

Abstract

The problem of calculating the underground structure of a heating beam under the joint action of pulsed and static loads in the elastic stage of the work. We formulated and solved the differential equation of motion (movement) of the beam under the combined action of dynamic and static loads. Determine the maximum bending moments Mmax and deflections Ymax for different types offixing the ends of the beam.

Keywords: pulse-static load, the elastic stage of operation, the stiffness of the beam, the dynamic factor.

В инженерной практике часто применяются конструкции подземных сооружений в виде шарнирно -опертой балки нагруженной мгновенно-импульсной нагрузкой P(t), и равномерно распределенной статической нагрузкой q от веса вышележащего грунтового слоя, собственного веса самой балки, плиты перекрытия и конструкции автодорожного покрытия.

88

i Надоели баннеры? Вы всегда можете отключить рекламу.