Abstract
The trend of recent years has been the advent of 2D and 3D cryptographic transformations. Standards that have appeared in the 21st century, specify algorithms based on the use of 2D and 3D transformations (AES, Kuznechik, Keccak, Stribog). In the article a 3D version of cryptographic transformation specified by GOST 28147-89 is suggested. The 3D GOST algorithm is characterized by the high degree of parallelism at the level of elementary operations. Increasing bit depth of the processed data blocks from 64 to 512 bits al-lows 3D GOST to be used for the synthesis of hash algorithms. Algorithm improvement agenda may be similar to the DOZEN family of algorithms.
References
Daemen, J., Rijmen, V.: AES Proposal: Rijndael. http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=53629D362985331263F38DB3A1667573?doi=10.1.1.36.640&rep=rep1&type=pdf
GOST R 34.12-2015: Information Technology. Cryptographic Information Defense. Block Ciphers, Moscow, Standartinform (2015)
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak sponge function family. Main document. http://keccak.noekeon.org/Keccak-main-2.1.pdf
GOST R 34.11-2012: Information Technology. Cryptographic Information Defense. Hash function. Moscow, Standartinform (2012)
Yu, V.A.: GOST ne prost …, a ochen’ prost! Monitor, No 1, pp. 60–73 (1995)
Boreskov, A.V., Kharlamov, A.A.: Basics with CUDA Technology. DMK Press, Moscow (2011)
CUDA Zone: Electronic resource http://developer.nvidia.com/category/zone/cuda-zone
Ivanov, M.A., Spiridonov, A.A., Chugunkov, I.V., et. al.: Three-dimensional data stochastic transformation algorithms for hybrid supercomputer implementation. In: Proceedings of 17th IEEE Mediterranean Electrotechnical Conference (MELECON), Beirut, Lebanon, pp. 451–457 (2014)
Ivanov, M.A., Matveychikov, I.V., Skitev, A.A., Strelchenko, P.A.: Three new methods of stochastic data transformation. In: Proceedings of the Radio-Electronic Devices and Systems for the Infocommunication Technologies (REDS-2016), Moscow, Russia, pp. 300–302, 22–23 May 2016
A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publications 800-22. Revision 1.a., April 2010
Chugunkov, I.V., Kutepov, S.V., Shustova, L.I., et. al.: Reducing of memory usage in statistical research into pseudorandom number generators by validation tests. In: Proceedings of the Radio-Electronic Devices and Systems for the Infocommunication Technologies (REDS-2013), Moscow, Russia, pp. 148–152, 22–23 May 2013
Acknowledgments
The publication is prepared in accordance with the scientific research under the Agreement between the Federal State Autonomous Educational Institution of Higher Education “National Research Nuclear University MEPhI” and the Ministry of Education and Science № 14.578.21.0117 on 27.10.2015. The unique identifier for the applied scientific research (project) is RFMEFI57815X0117.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Ivanov, M.A., Starikovskiy, A.V. (2018). New Life of Old Standard: Transition from One-Dimensional Version to 3D. In: Samsonovich, A., Klimov, V. (eds) Biologically Inspired Cognitive Architectures (BICA) for Young Scientists. BICA 2017. Advances in Intelligent Systems and Computing, vol 636. Springer, Cham. https://doi.org/10.1007/978-3-319-63940-6_38
Download citation
DOI: https://doi.org/10.1007/978-3-319-63940-6_38
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-63939-0
Online ISBN: 978-3-319-63940-6
eBook Packages: EngineeringEngineering (R0)