Additional Cryptographic Algorithms for Use with GOST 28147-89, GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94 Algorithms
RFC 4357
Document | Type |
RFC - Informational
(January 2006; Errata)
Was draft-popov-cryptopro-cpalgs (individual in sec area)
|
|
---|---|---|---|
Authors | Vladimir Popov , Serguei Leontiev , Igor Kurepkin | ||
Last updated | 2020-01-21 | ||
Stream | IETF | ||
Formats | plain text html pdf htmlized with errata bibtex | ||
Stream | WG state | (None) | |
Document shepherd | No shepherd assigned | ||
IESG | IESG state | RFC 4357 (Informational) | |
Consensus Boilerplate | Unknown | ||
Telechat date | |||
Responsible AD | Russ Housley | ||
Send notices to | chudov@cryptopro.ru |
Network Working Group V. Popov Request for Comments: 4357 I. Kurepkin Category: Informational S. Leontiev CRYPTO-PRO January 2006 Additional Cryptographic Algorithms for Use with GOST 28147-89, GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94 Algorithms Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2006). Abstract This document describes the cryptographic algorithms and parameters supplementary to the original GOST specifications, GOST 28147-89, GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94, for use in Internet applications. Table of Contents 1. Introduction ....................................................2 1.1. Terminology ................................................2 2. Cipher Modes and Parameters .....................................3 2.1. GOST 28147-89 CBC Mode .....................................4 2.2. GOST 28147-89 Padding Modes ................................4 2.3. Key Meshing Algorithms .....................................4 2.3.1. Null Key Meshing ....................................5 2.3.2. CryptoPro Key Meshing ...............................5 3. HMAC_GOSTR3411 ..................................................6 4. PRF_GOSTR3411 ...................................................6 5. Key Derivation Algorithms .......................................6 5.1. VKO GOST R 34.10-94 ........................................6 5.2. VKO GOST R 34.10-2001 ......................................7 6. Key Wrap Algorithms .............................................7 6.1. GOST 28147-89 Key Wrap .....................................7 6.2. GOST 28147-89 Key Unwrap ...................................8 6.3. CryptoPro Key Wrap .........................................8 6.4. CryptoPro Key Unwrap .......................................9 6.5. CryptoPro KEK Diversification Algorithm ....................9 Popov, et al. Informational [Page 1] RFC 4357 Crypto-Pro Cryptographic Algorithms January 2006 7. Secret Key Diversification .....................................10 8. Algorithm Parameters ...........................................10 8.1. Encryption Algorithm Parameters ...........................10 8.2. Digest Algorithm Parameters ...............................11 8.3. GOST R 34.10-94 Public Key Algorithm Parameters ...........12 8.4. GOST R 34.10-2001 Public Key Algorithm Parameters .........13 9. Security Considerations ........................................14 10. Appendix ASN.1 Modules ........................................15 10.1. Cryptographic-Gost-Useful-Definitions ....................15 10.2. Gost28147-89-EncryptionSyntax ............................17 10.3. Gost28147-89-ParamSetSyntax ..............................19 10.4. GostR3411-94-DigestSyntax ................................21 10.5. GostR3411-94-ParamSetSyntax ..............................22 10.6. GostR3410-94-PKISyntax ...................................23 10.7. GostR3410-94-ParamSetSyntax ..............................25 10.8. GostR3410-2001-PKISyntax .................................27 10.9. GostR3410-2001-ParamSetSyntax ............................29 11. Appendix Parameters ...........................................30 11.1. Encryption Algorithm Parameters ..........................30 11.2. Digest Algorithm Parameters ..............................33 11.3. GOST R 34.10-94 Public Key Algorithm Parameters ..........34 11.4. GOST R 34.10-2001 Public Key Algorithm Parameters ........42 12. Acknowledgements ..............................................46 13. References ....................................................47 13.1. Normative References .....................................47 13.2. Informative References ...................................47 1. Introduction Russian cryptographic standards that define the algorithms GOST 28147-89 [GOST28147], GOST R 34.10-94 [GOSTR341094], GOST R 34.10-2001 [GOSTR341001], and GOST R34.11-94 [GOSTR341194] provide basic information about how the algorithms work, but supplemental specifications are needed to effectively use the algorithms (a brief English technical description of these algorithms can be found in [Schneier95]). This document is a proposal put forward by the CRYPTO-PRO Company to provide supplemental information and specifications needed by theShow full document text