Example of internal function for Sponge scheme built on the basis of the generalized AES design methodology
https://doi.org/10.35596/1729-7648-2021-19-3-89-95
Abstract
The purpose of this article is to construct an internal function underlying the “Sponge” scheme for constructing cryptographic hash functions. An internal function in the “Sponge” scheme is a fixed-length transformation or permutation that operates on a fixed number of bits that make up the internal state of the function. There are various constructive approaches to functiondesign. The most common approach is to use a permutation based on a symmetric block encryption algorithm with constants as the key. This article builds an internal function using the generalized AES design methodology. This methodology makes it easy to design block ciphers to encrypt large blocks of plaintext with small components, representing the processed data as multidimensional arrays. The internal function is a block cipher that processes 2048 bits, represented as a 9-dimensional array of 512 4-bit elements with size 2 × 2 × 2 × 2 × 2 × 2 × 2 × 2 × 2. Each round of encryption consists of three transformations (S-blocks, linear transformation, and permutation), similar to the three round transformations of AES SubBytes, MixColumns, and ShiftRows. The constructed function can be used as an internal function in the modified “Sponge” schemefor constructing cryptographic hash functions.
Keywords
About the Authors
R. M. OspanovKazakhstan
Researcher
010000, , Nur-Sultan
tel.: +7-7172-70-95-00
Ye. N. Seitkulov
Kazakhstan
Seitkulov Yerzhan Nurakhanovich, PhD, Professor, Director
010000, , Nur-Sultan
tel.: +7-7172-70-95-00
B. B. Yergaliyeva
Kazakhstan
Junior Researcher
010000, , Nur-Sultan
tel.: +7-7172-70-95-00
N. M. Sisenov
Kazakhstan
Junior Researcher
010000, , Nur-Sultan
tel.: +7-7172-70-95-00
References
1. Bertoni G., Daemen J., Peeters M., Van Assche G. Sponge Functions. Ecrypt Hash Workshop, 2007.
2. Ospanov R.M., Seitkulov Ye.N., Arapov N.K., Yergalieva B.B. [Modification of the scheme for constructing cryptographic hash functions SPONGE]. Bulletin of KazNTU. 2020;5(141):520-525. (In Russ.)
3. Ospanov R.M., Seitkulov Ye.N. [Cybershield: On various implementations of the “Sponge” cryptographic hash function construction scheme]. Materials of the International Scientific and Practical WebConference “Military-technical support of the armed forces: world experience and development trends”. Nur-Sultan: From NUD; 2020: 305-308. (In Russ.)
4. Ospanov R.M., Seitkulov Ye.N. [On the ways of designing an internal function for the scheme for constructing cryptographic hash functions SPONGE]. Bulletin of KazNRTU. 2020;5(141):645-650 (In Russ.)
5. Ospanov R.M. [Cybershield: On the internal function in the scheme for constructing cryptographic hash functions “Sponge”]. Materials of the International Scientific and Practical Web-conference “Militarytechnical support of the activities of the armed forces: world experience and development trends”,NurSultan: From NUD. 2020: 351-353. (In Russ.)
Review
For citations:
Ospanov R.M., Seitkulov Ye.N., Yergaliyeva B.B., Sisenov N.M. Example of internal function for Sponge scheme built on the basis of the generalized AES design methodology. Doklady BGUIR. 2021;19(3):89-95. (In Russ.) https://doi.org/10.35596/1729-7648-2021-19-3-89-95