DEVELOPMENT OF PROCEDURES FOR MODIFYING THE CIPHER GOST 28147
Main Article Content
Abstract
The entry of mankind into the era of high technologies, the rapid growth of computer technology contributes to the expansion of the range of electronic services. To ensure the security of confidential information, personal data, cryptographic systems of traditional cryptography (symmetric cryptosystems) and public key cryptography (asymmetric cryptosystems) are used. As a rule, the former provides security services, the latter provide key distribution. However, in the conditions of totalitarian surveillance in society by the special services of developed countries, cryptographic tabs are embedded in cryptographic algorithms, which, on the one hand, provide “quick” access for special services to confidential information, and on the other hand, allow intruders to break into the cryptosystem and obtain user data. The article proposes a modification of the well-known GOST 28147-89 algorithm, which ensures the "elimination" of possible crypto-bookmarks and an increase in crypto-resistance in the post-quantum period (the emergence of a full-scale quantum computer that allows hacking modern symmetric and asymmetric cryptosystems based on Grover and Shor algorithms). It is proposed to use the procedures for modifying the block-symmetric encryption algorithm (BSEA) GOST 28147-89 (2009, 2015) in OFB mode, which will make it possible to form a pseudo-random sequence based on dynamic changes in the S-box, and provide the required level of security.
Article Details
References
Rybalsky, O.V., Khakhanovsky, V.G. and Kudinov, V.A. (2012), Fundamentals of information security and technical protection of information, National Academy of Internal Affairs, Kyiv, 104 p.
Shor, P.W. (1997), “Polynomial–Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer”, S IAM J. Comput., 26 (5), pp. 1484–1509.
Grover, L.K. (1996), “A fast quantum mechanics algorithm for database search”, Proceeding of the 28th ACM Symposium on Theory of Computation, ACM Press, New York, pp. 212–219
Gorbenko, Y.I. and Ganzya, R.S. (20140, “Analysis of the stability of popular cryptosystems against quantum cryptanalysis based on Grover's algorithm”, Information protection, Vol. 16, No. 2, pp. 106–112.
Evseev, S.P., Rzaev, H.N. and Cыganenko, A.S. (2016), “Analyz programnoj realyzacyy prjamogo y obratnogo preobrazova-nyja po metodu nedvoychnogo ravnovesnogo kodyrovanyja”, Bezpeka informacii, 22#2, pp. 196 - 203.
(2020), NIST announced start of post-quantum cryptography standardization, URL: https://habr.com/ru/post/512410/.
(1989), GOST 28147-89, URL: https://files.stroyinf.ru/Data2/1/4294826/4294826698931.pdf