Preview

Doklady BGUIR

Advanced search

Example of internal function for Sponge scheme built on the basis of the generalized AES design methodology

https://doi.org/10.35596/1729-7648-2021-19-3-89-95

Abstract

The purpose of this article is to construct an internal function underlying the “Sponge” scheme for constructing  cryptographic  hash  functions.  An  internal  function in  the  “Sponge”  scheme  is  a  fixed-length transformation  or  permutation  that  operates  on  a  fixed  number  of  bits  that  make  up  the  internal  state  of  the function. There are various constructive approaches to functiondesign. The most common approach is to use a permutation based on a symmetric block encryption algorithm with constants as the key. This article builds an internal  function  using  the  generalized  AES  design  methodology. This  methodology  makes  it  easy  to  design block  ciphers  to  encrypt  large  blocks  of  plaintext  with  small  components,  representing  the  processed  data as  multidimensional  arrays.  The  internal  function  is  a  block  cipher  that  processes  2048  bits,  represented as  a  9-dimensional  array  of  512  4-bit  elements  with  size  2 × 2 × 2 × 2 × 2 × 2 × 2 × 2 × 2.  Each  round of encryption  consists  of  three  transformations  (S-blocks,  linear  transformation,  and  permutation),  similar  to the three round transformations of AES SubBytes, MixColumns, and ShiftRows. The constructed function can be used as an internal function in the modified “Sponge” schemefor constructing cryptographic hash functions.

About the Authors

R. M. Ospanov
Gumilyov Eurasian National University, Research Institute of Information Securityand Cryptology
Kazakhstan

Researcher 

010000, , Nur-Sultan

tel.: +7-7172-70-95-00



Ye. N. Seitkulov
Gumilyov Eurasian National University, Research Institute of Information Securityand Cryptology
Kazakhstan

Seitkulov Yerzhan Nurakhanovich, PhD,  Professor,  Director

010000, , Nur-Sultan

tel.: +7-7172-70-95-00



B. B. Yergaliyeva
Gumilyov Eurasian National University, Research Institute of Information Securityand Cryptology
Kazakhstan

Junior  Researcher

010000, , Nur-Sultan

tel.: +7-7172-70-95-00



N. M. Sisenov
Gumilyov Eurasian National University, Research Institute of Information Securityand Cryptology
Kazakhstan

Junior  Researcher

010000, , Nur-Sultan

tel.: +7-7172-70-95-00



References

1. Bertoni G., Daemen J., Peeters M., Van Assche G. Sponge Functions. Ecrypt Hash Workshop, 2007.

2. Ospanov R.M., Seitkulov Ye.N., Arapov N.K., Yergalieva B.B. [Modification of the scheme for constructing cryptographic hash functions SPONGE]. Bulletin of KazNTU. 2020;5(141):520-525. (In Russ.)

3. Ospanov R.M., Seitkulov Ye.N. [Cybershield: On various implementations of the “Sponge” cryptographic hash function construction scheme]. Materials of the International Scientific and Practical WebConference “Military-technical support of the armed forces: world experience and development trends”. Nur-Sultan: From NUD; 2020: 305-308. (In Russ.)

4. Ospanov R.M., Seitkulov Ye.N. [On the ways of designing an internal function for the scheme for constructing cryptographic hash functions SPONGE]. Bulletin of KazNRTU. 2020;5(141):645-650 (In Russ.)

5. Ospanov R.M. [Cybershield: On the internal function in the scheme for constructing cryptographic hash functions “Sponge”]. Materials of the International Scientific and Practical Web-conference “Militarytechnical support of the activities of the armed forces: world experience and development trends”,NurSultan: From NUD. 2020: 351-353. (In Russ.)


Review

For citations:


Ospanov R.M., Seitkulov Ye.N., Yergaliyeva B.B., Sisenov N.M. Example of internal function for Sponge scheme built on the basis of the generalized AES design methodology. Doklady BGUIR. 2021;19(3):89-95. (In Russ.) https://doi.org/10.35596/1729-7648-2021-19-3-89-95

Views: 529


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1729-7648 (Print)
ISSN 2708-0382 (Online)