GOST R 34.11-94: Hash Function Algorithm
RFC 5831

 
Document Type RFC - Informational (March 2010; Errata)
Updated by RFC 6986
Last updated 2013-03-02
Stream ISE
Formats plain text pdf html
Stream ISE state (None)
Document shepherd No shepherd assigned
IESG IESG state RFC 5831 (Informational)
Telechat date
Responsible AD Russ Housley
Send notices to igus@cryptocom.ru, dol@cryptocom.ru, kdb@cryptocom.ru, svysh@pn.sinp.msu.ru, draft-dolmatov-cryptocom-gost341194@ietf.org, rfc-ise@rfc-editor.org
Independent Submission                                  V. Dolmatov, Ed.
Request for Comments: 5831                               Cryptocom, Ltd.
Category: Informational                                       March 2010
ISSN: 2070-1721

                GOST R 34.11-94: Hash Function Algorithm

Abstract

   This document is intended to be a source of information about the
   Russian Federal standard hash function (GOST R 34.11-94), which is
   one of the Russian cryptographic standard algorithms (called GOST
   algorithms).  Recently, Russian cryptography is being used in
   Internet applications, and this document has been created as
   information for developers and users of GOST R 34.11-94 for hash
   computation.

Status of This Memo

   This document is not an Internet Standards Track specification; it is
   published for informational purposes.

   This is a contribution to the RFC Series, independently of any other
   RFC stream.  The RFC Editor has chosen to publish this document at
   its discretion and makes no statement about its value for
   implementation or deployment.  Documents approved for publication by
   the RFC Editor are not a candidate for any level of Internet
   Standard; see Section 2 of RFC 5741.

   Information about the current status of this document, any errata,
   and how to provide feedback on it may be obtained at
   http://www.rfc-editor.org/info/rfc5831.

Dolmatov                      Informational                     [Page 1]
RFC 5831                     GOST R 34.11-94                  March 2010

Copyright Notice

   Copyright (c) 2010 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.

   This document may not be modified, and derivative works of it may not
   be created, except to format it for publication as an RFC or to
   translate it into languages other than English.

Table of Contents

   1. Introduction ....................................................3
      1.1. General Information ........................................3
      1.2. The Purpose of GOST R 34.11-94 .............................3
   2. Applicability ...................................................3
   3. Conventions Used in This Document ...............................4
   4. General Statements ..............................................5
   5. Step-by-Step Hash Function ......................................5
      5.1. Key Generation .............................................5
      5.2. Encryption Transformation ..................................7
      5.3. Mixing Transformation ......................................7
   6. The Calculation Procedure for a Hash Function ...................8
   7. Test Examples (Informative) .....................................9
      7.1. Usage of the Algorithm GOST 28147-89 ......................10
      7.2. Representation of Vectors .................................11
      7.3. Examples of the Hash Value Calculation ....................11
           7.3.1. Hash Calculation for the Sample Message M ..........11
           7.3.2. Hash Calculation for the Sample Message M ..........14
   8. Security Considerations ........................................16
   9. Normative References ...........................................16
   10. Contributors ..................................................17

Dolmatov                      Informational                     [Page 2]
RFC 5831                     GOST R 34.11-94                  March 2010

1.  Introduction

1.1.  General Information

   1. GOST R 34.11-94  [GOST3411] was developed by the Federal Agency
      for Government Communication and Information and by the All-Russia
      Scientific and Research Institute of Standardization.

   2. GOST R 34.11-94 was accepted and activated by Act 154 of
      23.05.1994 issued by the Russian Federal committee for standards.

1.2.  The Purpose of GOST R 34.11-94

   Expanding the application of information technologies when creating,
   processing, and storing documents requires, in some cases,
   confidentiality of their contents, maintenance of completeness, and
   authenticity.

   Cryptography (cryptographic security) is one of the effective
   approaches for data security.  It is widely applied in different
   areas of government and commercial activity.

   Cryptographic data security methods are under serious scientific
Show full document text