Sept. 2, 2023, 7:12 a.m. |

IACR News www.iacr.org

ePrint Report: About “$k$-bit security” of MACs based on hash function Streebog

Vitaly Kiryukhin


Various message authentication codes (MACs), including HMAC-Streebog and Streebog-K, are based on the keyless hash function Streebog. Under the assumption that the compression function of Streebog is resistant to the related key attacks, the security proofs of these algorithms were recently presented at CTCrypt 2022.


We carefully detail the resources of the adversary in the related key settings, revisit the proof, and obtain tight security bounds. …

attacks authentication compression eprint report function hash hash function hmac key keyless macs message report security under

Technical Product Manager, Electronic Warfare - Active Clearance

@ Anduril | Costa Mesa, California, United States

Specialist Operations and Support/ Entry Professional - IT Security, Cyber Security & Governance

@ Norsk Hydro | Jaipur, IN

Embedded Software Engineer, Electronic Warfare

@ Anduril | Costa Mesa, California, United States

Cyber Security Analyst

@ Peraton | Chantilly, VA, United States

Principal Consultant, Proactive Security - Unit 42

@ Palo Alto Networks | Sydney, Australia

Penetration Tester Consultant

@ RSI Security | United States - Remote