July 30, 2022, 2:12 p.m. |

IACR News www.iacr.org

ePrint Report: Keyed Streebog is a secure PRF and MAC

Vitaly Kiryukhin


One of the most popular ways to turn a keyless hash function into a keyed one is the HMAC algorithm. This approach is too expensive in some cases due to double hashing. Excessive overhead can sometimes be avoided by using certain features of the hash function itself. The paper presents a simple and safe way to create a keyed cryptoalgorithm (conventionally called "Streebog-K") from hash function Streebog $\mathsf{H}(M)$. …

eprint report mac

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cyber Threat Analyst

@ Peraton | Morrisville, NC, United States

Kyndryl Offensive Security Professional - Threat-Led Penetration Testing (TLPT) and Red Teaming

@ Kyndryl | Sao Paulo (KBR51645) WeWork Office

Consultant en Cyber Sécurité - Spécialiste PKI H/F

@ Devoteam | Levallois-Perret, France

Cloud Security Architect - Advisor (Remote)

@ Fannie Mae | Reston, VA, United States

OT Cybersecurity Engineer

@ SBM Offshore | Bengaluru, IN, 560071