On software implementation of Kuznyechik on Intel CPUs
Matematičeskie voprosy kriptografii, Tome 9 (2018) no. 2, pp. 117-127 Cet article a éte moissonné depuis la source Math-Net.Ru

Voir la notice de l'article

In this paper we investigate high speed software performance issues of the Kuznyechik block cipher on Intel CPUs. We consider general block cipher implementation methods, including byte slicing technique, available speedup possibilities on Intel architecture, and evaluate their efficiency when applied to Kuznyechik. The contributions of each element of the algorithm into its overall complexity are investigated in dependence on the optimization method used. Practical implementation results are given, and potential speed-ups are discussed.
@article{MVK_2018_9_2_a9,
     author = {A. S. Rybkin},
     title = {On software implementation of {Kuznyechik} on {Intel} {CPUs}},
     journal = {Matemati\v{c}eskie voprosy kriptografii},
     pages = {117--127},
     year = {2018},
     volume = {9},
     number = {2},
     language = {en},
     url = {http://geodesic.mathdoc.fr/item/MVK_2018_9_2_a9/}
}
TY  - JOUR
AU  - A. S. Rybkin
TI  - On software implementation of Kuznyechik on Intel CPUs
JO  - Matematičeskie voprosy kriptografii
PY  - 2018
SP  - 117
EP  - 127
VL  - 9
IS  - 2
UR  - http://geodesic.mathdoc.fr/item/MVK_2018_9_2_a9/
LA  - en
ID  - MVK_2018_9_2_a9
ER  - 
%0 Journal Article
%A A. S. Rybkin
%T On software implementation of Kuznyechik on Intel CPUs
%J Matematičeskie voprosy kriptografii
%D 2018
%P 117-127
%V 9
%N 2
%U http://geodesic.mathdoc.fr/item/MVK_2018_9_2_a9/
%G en
%F MVK_2018_9_2_a9
A. S. Rybkin. On software implementation of Kuznyechik on Intel CPUs. Matematičeskie voprosy kriptografii, Tome 9 (2018) no. 2, pp. 117-127. http://geodesic.mathdoc.fr/item/MVK_2018_9_2_a9/

[1] GOST R 34.12-2015 — National standard of the Russian Federation — Information technology — Cryptographic data security — Block ciphers, 2015, 21 pp.

[2] Borodin M. A., Rybkin A. S., “High-speed software implementation of the Kuznyechik block cipher”, Information Security Problems. Computer Systems, 3 (2014), 67–73

[3] Alekseev E. K., Popov V. O., Prokhorov A. S., Smyshlyaev S. V., Sonina L. A., “On the performance of one perspective LSX-based block cipher”, Mathematical Aspects of Cryptography, 6:2 (2015), 7–17 (In Russian) | MR

[4] Fomin D. B., “Implementation of an XSL block cipher with MDS-matrix linear transformation on NVIDIA CUDA”, Mathematical Aspects of Cryptography, 6:2 (2015), 99–108 (In Russian) | MR

[5] Ahmetzyanova L., Alekseev E., Oshkin I., Smyshlyaev S., Sonina L., “On the properties of the CTR encryption mode of the Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing”, Pre-proceedings of 5th Workshop on Current Trends in Cryptology, CTCrypt 2016 (June 6–8, 2016, Yaroslavl, Russia), 42–54 | MR

[6] Daemen J., Rijmen V., The Design of Rijndael, Springer-Verlag, Berlin–Heidelberg, 2002, xvii+238 pp. | MR | Zbl

[7] Kasper E., Schwabe P., “Faster and timing-attack resistant AES-GCM”, Lect. Notes Comput. Sci., 5747, 2009, 1–17 | DOI | Zbl

[8] Bernstein D. J., Cache-timing attacks on AES, , 2005 https://cr.yp.to/antiforgery/cachetiming20050414.pdf

[9] Biryukov A., Perrin L., Udovenko A., “Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1”, Lect. Notes Comput. Sci., 9665, 2016, 372–402 | DOI | MR | Zbl

[10] GOST R 34.13-2015 — National standard of the Russian Federation — Information technology — Cryptographic data security — Modes of operation for block ciphers, 2015, 38 pp.