An approach to construct a keyed PRF from the ``MAGMA'' block cipher
Prikladnaya Diskretnaya Matematika. Supplement, no. 16 (2023), pp. 105-110.

Voir la notice de l'article provenant de la source Math-Net.Ru

On the basis of recently proposed results for AES, we present new construction, MAGMA-PRF, based on Russian standardized block cipher “MAGMA”. We show that MAGMA-PRF is secure against known attacks, which are applicable to plain “MAGMA”. We also show that MAGMA-PRF is secure in CTR, CTR-ACPKM, and GCM modes of operations, which, instantiated with PRF instead of PRP, are proven to have better cryptographic properties.
Keywords: block cipher, encryption modes, MAGMA-PRF, provable security.
Mots-clés : MAGMA
@article{PDMA_2023_16_a26,
     author = {A. A. Shcherbachenko},
     title = {An approach to construct a keyed {PRF} from the {``MAGMA''} block cipher},
     journal = {Prikladnaya Diskretnaya Matematika. Supplement},
     pages = {105--110},
     publisher = {mathdoc},
     number = {16},
     year = {2023},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDMA_2023_16_a26/}
}
TY  - JOUR
AU  - A. A. Shcherbachenko
TI  - An approach to construct a keyed PRF from the ``MAGMA'' block cipher
JO  - Prikladnaya Diskretnaya Matematika. Supplement
PY  - 2023
SP  - 105
EP  - 110
IS  - 16
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDMA_2023_16_a26/
LA  - ru
ID  - PDMA_2023_16_a26
ER  - 
%0 Journal Article
%A A. A. Shcherbachenko
%T An approach to construct a keyed PRF from the ``MAGMA'' block cipher
%J Prikladnaya Diskretnaya Matematika. Supplement
%D 2023
%P 105-110
%N 16
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDMA_2023_16_a26/
%G ru
%F PDMA_2023_16_a26
A. A. Shcherbachenko. An approach to construct a keyed PRF from the ``MAGMA'' block cipher. Prikladnaya Diskretnaya Matematika. Supplement, no. 16 (2023), pp. 105-110. http://geodesic.mathdoc.fr/item/PDMA_2023_16_a26/

[1] Mennink B. and Neves S., “Optimal PRFs from blockcipher designs”, IACR Trans. Symmetric Cryptology, 2017, no. 3, 228–252 | DOI

[2] GOST 34.12-2018. Informatsionnaya tekhnologiya. Kriptograficheskaya zaschita informatsii. Blochnye shifry, Standartinform, M., 2018

[3] Bellare M. and Rogaway P., Introduction to Modern Cryptography, University of California at Davis, 2005, 283 pp. | MR

[4] Isobe T., “A single-key attack on the full GOST block cipher”, J. Cryptol., 26:1 (2013), 172–189 | DOI | MR | Zbl

[5] Dinur I., Dunkelman O., and Shamir A., “Improved attacks on full GOST”, LNCS, 7549, 2012, 9–28 | Zbl

[6] Derbez P., Iwata T., Sun L., et al., “Cryptanalysis of AES-PRF and its dual”, IACR Trans. Symmetric Cryptology, 2018, no. 2, 161–191 | DOI

[7] GOST 34.13-2018. Informatsionnaya tekhnologiya. Kriptograficheskaya zaschita informatsii. Rezhimy raboty blochnykh shifrov, Standartinform, M., 2018

[8] R 1323565.1.017-2018. Informatsionnaya tekhnologiya. Kriptograficheskaya zaschita informatsii. Kriptograficheskie algoritmy, soputstvuyuschie primeneniyu algoritmov blochnogo shifrovaniya, Standartinform, M., 2018

[9] Ahmetzyanova L. R., Alekseev E. K., Sedov G. K., et al., “Practical significance of security bounds for standardized internally re-keyed block cipher modes”, Matematicheskie voprosy kriptografii, 10:2 (2019), 31–46 | DOI | MR | Zbl

[10] Dworkin M., NIST SP 800-38D. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC, Technical Report, Gaithersburg, MD, United States, 2007