GOST 28147-89: Encryption, Decryption, and Message Authentication Code (MAC) Algorithms
RFC 5830
|
Document |
Type |
|
RFC - Informational
(March 2010; Errata)
|
|
Last updated |
|
2015-10-14
|
|
Stream |
|
ISE
|
|
Formats |
|
plain text
pdf
html
bibtex
|
Stream |
ISE state
|
|
(None)
|
|
Consensus Boilerplate |
|
Unknown
|
|
Document shepherd |
|
No shepherd assigned
|
IESG |
IESG state |
|
RFC 5830 (Informational)
|
|
Telechat date |
|
|
|
Responsible AD |
|
Russ Housley
|
|
Send notices to |
|
igus@cryptocom.ru, irene@cryptocom.ru, kdb@cryptocom.ru, rfc-ise@rfc-editor.org
|
Independent Submission V. Dolmatov, Ed.
Request for Comments: 5830 Cryptocom, Ltd.
Category: Informational March 2010
ISSN: 2070-1721
GOST 28147-89: Encryption, Decryption,
and Message Authentication Code (MAC) Algorithms
Abstract
This document is intended to be a source of information about the
Russian Federal standard for electronic encryption, decryption, and
message authentication algorithms (GOST 28147-89), which is one of
the Russian cryptographic standard algorithms called GOST
algorithms). Recently, Russian cryptography is being used in
Internet applications, and this document has been created as
information for developers and users of GOST 28147-89 for encryption,
decryption, and message authentication.
Status of This Memo
This document is not an Internet Standards Track specification; it is
published for informational purposes.
This is a contribution to the RFC Series, independently of any other
RFC stream. The RFC Editor has chosen to publish this document at
its discretion and makes no statement about its value for
implementation or deployment. Documents approved for publication by
the RFC Editor are not a candidate for any level of Internet
Standard; see Section 2 of RFC 5741.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc5830.
Dolmatov Informational [Page 1]
RFC 5830 GOST 28147-89 March 2010
Copyright Notice
Copyright (c) 2010 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document.
This document may not be modified, and derivative works of it may not
be created, except to format it for publication as an RFC or to
translate it into languages other than English.
Table of Contents
1. Introduction ....................................................3
1.1. General Information ........................................3
2. Applicability ...................................................3
3. Definitions and Notations .......................................3
3.1. Definitions ................................................3
3.2. Notation ...................................................4
4. General Statements ..............................................4
5. The Electronic Codebook Mode ....................................6
5.1. Encryption of Plain Text in the Electronic Codebook Mode ...6
5.2. Decryption of the Ciphertext in the Electronic
Codebook Mode ..............................................9
6. The Counter Encryption Mode ....................................10
6.1. Encryption of Plain Text in the Counter Encryption Mode ...10
6.2. Decryption of Ciphertext in the Counter Encryption Mode ...13
7. The Cipher Feedback Mode .......................................13
7.1. Encryption of Plain Text in the Cipher Feedback Mode ......13
7.2. Decryption of Ciphertext in the Cipher Feedback Mode ......14
8. Message Authentication Code (MAC) Generation Mode ..............15
9. Security Considerations ........................................17
10. Normative References ..........................................17
Appendix A. Values of the Constants C1 and C2 .....................18
Appendix B. Contributors ..........................................19
Dolmatov Informational [Page 2]
RFC 5830 GOST 28147-89 March 2010
1. Introduction
1.1. General Information
[GOST28147-89] is the unified cryptographic transformation algorithm
for information processing systems of different purposes, defining
the encryption/decryption rules and the message authentication code
(MAC) generation rules.
This cryptographic transformation algorithm is intended for hardware
or software implementation and corresponds to the cryptographic
requirements. It puts no limitations on the encrypted information
secrecy level.
2. Applicability
GOST 28147-89 defines the encryption/decryption model and MAC
generation for a given message (document) that is meant for
transmission via insecure public telecommunication channels between
data processing systems of different purposes.
GOST 28147-89 is obligatory to use in the Russian Federation in all
Show full document text