TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

GOST cryptography – Russian Federation’s cryptographic algorithms

84 pointsby stargraveover 8 years ago

10 comments

eternalbanover 8 years ago
I don&#x27;t get these crypto types that use plain http for the download page [1] and then make a show with &quot;You have to verify downloaded tarballs integrity and authenticity to be sure that you retrieved trusted and untampered software.&quot; And if you go to the &quot;alternate resources&quot; links[2][3], you get &quot;Error code: sec_error_cert_signature_algorithm_disabled.&quot;<p>[1]: <a href="http:&#x2F;&#x2F;www.cypherpunks.ru&#x2F;gogost&#x2F;Download.html#Download" rel="nofollow">http:&#x2F;&#x2F;www.cypherpunks.ru&#x2F;gogost&#x2F;Download.html#Download</a><p>[2]: <a href="https:&#x2F;&#x2F;lists.cypherpunks.ru&#x2F;mailman&#x2F;listinfo&#x2F;gost" rel="nofollow">https:&#x2F;&#x2F;lists.cypherpunks.ru&#x2F;mailman&#x2F;listinfo&#x2F;gost</a><p>[3]: <a href="https:&#x2F;&#x2F;git.cypherpunks.ru&#x2F;cgit.cgi&#x2F;gogost.git&#x2F;" rel="nofollow">https:&#x2F;&#x2F;git.cypherpunks.ru&#x2F;cgit.cgi&#x2F;gogost.git&#x2F;</a>
评论 #12768054 未加载
评论 #12767812 未加载
评论 #12767801 未加载
评论 #12768812 未加载
contingenciesover 8 years ago
Some projects, such as Gentoo, use multiple hashing algorithms in parallel to protect against potential collision attacks while verifying package sources. Adding Streebog for diversity may be a good idea.
评论 #12765744 未加载
ex3ndrover 8 years ago
We are using in Actor.im double encryption of all our traffic with AES+Kuznechik and SHA256+Streebog. We are modified Signal protocol to handle such encryption. While keeping curve25519-only for public key cryptography as russia doesn&#x27;t have any kind of standart for pki.<p>Main ussue is performance. AES and SHA256 usually have hardware optimizations in ARM and x64 processors, but Russian doesn&#x27;t have such thing.<p>Second thing is i think that this is not actually required as AES and Kuznechik have very similar ideas in them with just slightly different combination. Also AES is not cracked and it is not going to be in the nearest future.
评论 #12768091 未加载
tormehover 8 years ago
So, if you encrypted a file with a NIST algorithm and then encrypted the resulting file again with a GOST one, would that make it secure?
评论 #12767830 未加载
评论 #12767306 未加载
评论 #12766747 未加载
meshkoover 8 years ago
So if you encrypt your data with both only people who have access to backdoors from both sides will be able to decrypt it!
based2over 8 years ago
<a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;GOST_(block_cipher)" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;GOST_(block_cipher)</a>
avodonosovover 8 years ago
GPL licensed Belarusian crypto standards implementation: <a href="https:&#x2F;&#x2F;github.com&#x2F;bcrypto&#x2F;bee2" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;bcrypto&#x2F;bee2</a>
mataugover 8 years ago
Its nearly impossible to predict when someone would find vulnerabilities (or if they have already in secret, Bletchley Park anyone) in crypto primitives and the problem gets compounded we try to use untested crypto primitives such as those highlighted in this article.<p>AES has been around since 2001 and researchers haven&#x27;t gotten past 7 of the 10 rounds so that significantly improves my confidence in its ability to not crumble under the most simple cryptanalysis.<p>Here&#x27;s an interesting video by the author of one of the attacks on the inner round of SHA-3 explaining why public analysis is exceptionally important. <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=uT4hrWkbBxM" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=uT4hrWkbBxM</a><p>My point is that though gaining popularity may be good because more researchers may find vulnerabilities but until these primitives are proven its probably not a good idea to use then in any real world application.
matt_wulfeckover 8 years ago
&gt; &quot;Why those algorithms could be interesting and great worth alternative to foreign ones? Because they are obviously not worse, in some places are much better and have high serious security margin.&quot;<p>Is there a reason these algorithms aren&#x27;t formally introduced as NIST standards? Are they copyrighted? Couldn&#x27;t anyone submit them?
评论 #12765835 未加载
评论 #12765769 未加载
评论 #12765552 未加载
评论 #12765637 未加载
评论 #12766254 未加载
pps43over 8 years ago
&gt; they are obviously not worse, in some places are much better<p>Not sure why it is obvious, especially after Alex Biryukov et al reverse engineered S-Boxes of Streebog and Kuznyechik [1].<p>If you suspect Dual_EC_DRBG kind of weakness, why not use some algorithm without magic constants like Speck [2]?<p>[1] <a href="https:&#x2F;&#x2F;eprint.iacr.org&#x2F;2016&#x2F;071.pdf" rel="nofollow">https:&#x2F;&#x2F;eprint.iacr.org&#x2F;2016&#x2F;071.pdf</a><p>[2] <a href="http:&#x2F;&#x2F;eprint.iacr.org&#x2F;2013&#x2F;404.pdf" rel="nofollow">http:&#x2F;&#x2F;eprint.iacr.org&#x2F;2013&#x2F;404.pdf</a>