DEVELOPMENT OF PROCEDURES FOR MODIFYING THE CIPHER GOST 28147

Main Article Content

Сергій Євсєєв
Роман Корольов
Андрій Ткачов
Анастасія Німченко

Abstract

The entry of mankind into the era of high technologies, the rapid growth of computer technology contributes to the expansion of the range of electronic services. To ensure the security of confidential information, personal data, cryptographic systems of traditional cryptography (symmetric cryptosystems) and public key cryptography (asymmetric cryptosystems) are used. As a rule, the former provides security services, the latter provide key distribution. However, in the conditions of totalitarian surveillance in society by the special services of developed countries, cryptographic tabs are embedded in cryptographic algorithms, which, on the one hand, provide “quick” access for special services to confidential information, and on the other hand, allow intruders to break into the cryptosystem and obtain user data. The article proposes a modification of the well-known GOST 28147-89 algorithm, which ensures the "elimination" of possible crypto-bookmarks and an increase in crypto-resistance in the post-quantum period (the emergence of a full-scale quantum computer that allows hacking modern symmetric and asymmetric cryptosystems based on Grover and Shor algorithms). It is proposed to use the procedures for modifying the block-symmetric encryption algorithm (BSEA) GOST 28147-89 (2009, 2015) in OFB mode, which will make it possible to form a pseudo-random sequence based on dynamic changes in the S-box, and provide the required level of security.

Article Details

How to Cite
Євсєєв, С., Корольов, Р., Ткачов, А., & Німченко, А. (2021). DEVELOPMENT OF PROCEDURES FOR MODIFYING THE CIPHER GOST 28147. Advanced Information Systems, 5(2), 131–135. https://doi.org/10.20998/2522-9052.2021.2.19
Section
Methods of information systems protection
Author Biographies

Сергій Євсєєв, Simon Kuznets Kharkiv National University of Economics, Kharkiv

Doctor of Technical Sciences, Professor, Head of the Department of Cybersecurity and Information Technology

Роман Корольов, Simon Kuznets Kharkiv National University of Economics, Kharkiv

Candidate of Technical Sciences, Associate Professor of the Department of Cybersecurity and Information Technology

Андрій Ткачов, Simon Kuznets Kharkiv National University of Economics, Kharkiv

Candidate of Technical Sciences, Associate Professor of the Department of Cybersecurity and Information Technology

Анастасія Німченко, Simon Kuznets Kharkiv National University of Economics, Kharkiv

student of the Department of Cybersecurity and Information Technology

References

Rybalsky, O.V., Khakhanovsky, V.G. and Kudinov, V.A. (2012), Fundamentals of information security and technical protection of information, National Academy of Internal Affairs, Kyiv, 104 p.

Shor, P.W. (1997), “Polynomial–Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer”, S IAM J. Comput., 26 (5), pp. 1484–1509.

Grover, L.K. (1996), “A fast quantum mechanics algorithm for database search”, Proceeding of the 28th ACM Symposium on Theory of Computation, ACM Press, New York, pp. 212–219

Gorbenko, Y.I. and Ganzya, R.S. (20140, “Analysis of the stability of popular cryptosystems against quantum cryptanalysis based on Grover's algorithm”, Information protection, Vol. 16, No. 2, pp. 106–112.

Evseev, S.P., Rzaev, H.N. and Cыganenko, A.S. (2016), “Analyz programnoj realyzacyy prjamogo y obratnogo preobrazova-nyja po metodu nedvoychnogo ravnovesnogo kodyrovanyja”, Bezpeka informacii, 22#2, pp. 196 - 203.

(2020), NIST announced start of post-quantum cryptography standardization, URL: https://habr.com/ru/post/512410/.

(1989), GOST 28147-89, URL: https://files.stroyinf.ru/Data2/1/4294826/4294826698931.pdf