[oss-gost-crypto] Fwd: Re: Should we consider removing Streebog from the Linux Kernel?

Vitaly Chikunov vt at altlinux.org
Mon Apr 1 01:56:00 MSK 2019


FYI

----- Forwarded message from Eric Biggers <ebiggers at kernel.org> -----

Date: Sun, 31 Mar 2019 15:43:30 -0700
From: Eric Biggers <ebiggers at kernel.org>
To: Vitaly Chikunov <vt at altlinux.org>
Cc: Theodore Ts'o <tytso at mit.edu>, "Jason A. Donenfeld" <Jason at zx2c4.com>, herbert at gondor.apana.org.au, linux-crypto at vger.kernel.org
Subject: Re: Should we consider removing Streebog from the Linux Kernel?
User-Agent: Mutt/1.11.4 (2019-03-13)

Hi Vitaly,

On Mon, Mar 25, 2019 at 09:00:41AM +0300, Vitaly Chikunov wrote:
> Theodore,
> 
> On Mon, Mar 25, 2019 at 12:45:50AM -0400, Theodore Ts'o wrote:
> > Given the precedent that has been established for removing the SPECK
> 
> As far as I know Speck is removed because:
> 
> | commit 578bdaabd015b9b164842c3e8ace9802f38e7ecc
> | Author: Jason A. Donenfeld <Jason at zx2c4.com>
> | Date:   Tue Aug 7 08:22:25 2018 +0200
> |
> |   crypto: speck - remove Speck
> |
> |   These are unused, undesired, and have never actually been used by
> |   anybody. The original authors of this code have changed their mind about
> |   its inclusion. While originally proposed for disk encryption on low-end
> |   devices, the idea was discarded [1] in favor of something else before
> |   that could really get going. Therefore, this patch removes Speck.
> |
> |   [1] https://marc.info/?l=linux-crypto-vger&m=153359499015659
> 
> None of these arguments apply to Streebog.
> 
> Thanks,
> 
> 
> > cipher from the kernel, I wonder if we should be removing Streebog on
> > the same basis, in light of the following work:
> > 
> > 	https://who.paris.inria.fr/Leo.Perrin/pi.html
> > 	https://tosc.iacr.org/index.php/ToSC/article/view/7405
> > 
> > Regards,
> > 
> > 						- Ted
> > 
> > -----------
> > 
> > >From the Cryptography mailing list on metzdowd.com:
> > 
> > From: "perrin.leo at gmail.com" <perrin.leo at gmail.com>
> > Subject: [Cryptography] New Results on the Russian S-box
> > 
> > Hello everyone,
> > 
> > I have recently sent an e-mail to the CFRG mailing list about my results
> > on the S-box shared by both of the latest Russian standards in symmetric
> > crypto and I have been told that it might interest the subscribers of
> > this mailing list.
> > 
> > In a paper that I am about to present at the Fast Software Encryption
> > conference, I describe what I claim to be the structure used by the
> > S-box of the hash function Streebog and the block cipher Kuznyechik.
> > Their authors never disclosed their design process---and in fact claimed
> > that it was generated randomly. I established that it is not the case.
> > More worryingly, the structure they used has a very strong algebraic
> > structure which, in my opinion, demands a renewed security analysis in
> > its light. Overall, I would not recommend using these algorithms until
> > their designers have provided satisfactory explanations about their
> > S-box choice.

Can you elaborate on why you want to use Streebog?  When we added Speck, we
explained in great detail why it was useful from a technical perspective (before
Adiantum was ready).  I don't see any such explanation for Streebog.

- Eric

----- End forwarded message -----


More information about the oss-gost-crypto mailing list