GOST R 34.12-2015: Block Cipher "Kuznyechik"
RFC 7801

Document Type RFC - Informational (March 2016; Errata)
Was draft-dolmatov-kuznyechik (individual)
Last updated 2016-04-08
Stream ISE
Formats plain text pdf html bibtex
IETF conflict review conflict-review-dolmatov-kuznyechik
Stream ISE state Published RFC
Consensus Boilerplate Unknown
Document shepherd Nevil Brownlee
Shepherd write-up Show (last changed 2016-01-21)
IESG IESG state RFC 7801 (Informational)
Telechat date
Responsible AD (None)
Send notices to "Nevil Brownlee" <rfc-ise@rfc-editor.org>
IANA IANA review state IANA OK - No Actions Needed
IANA action state No IC
Independent Submission                                  V. Dolmatov, Ed.
Request for Comments: 7801                  Research Computer Center MSU
Category: Informational                                       March 2016
ISSN: 2070-1721

              GOST R 34.12-2015: Block Cipher "Kuznyechik"

Abstract

   This document is intended to be a source of information about the
   Russian Federal standard GOST R 34.12-2015 describing the block
   cipher with a block length of n=128 bits and a key length of k=256
   bits, which is also referred to as "Kuznyechik".  This algorithm is
   one of the set of Russian cryptographic standard algorithms (called
   GOST algorithms).

Status of This Memo

   This document is not an Internet Standards Track specification; it is
   published for informational purposes.

   This is a contribution to the RFC Series, independently of any other
   RFC stream.  The RFC Editor has chosen to publish this document at
   its discretion and makes no statement about its value for
   implementation or deployment.  Documents approved for publication by
   the RFC Editor are not a candidate for any level of Internet
   Standard; see Section 2 of RFC 5741.

   Information about the current status of this document, any errata,
   and how to provide feedback on it may be obtained at
   http://www.rfc-editor.org/info/rfc7801.

Copyright Notice

   Copyright (c) 2016 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.

Dolmatov                      Informational                     [Page 1]
RFC 7801                    GOST R 34.12-2015                 March 2016

Table of Contents

   1.  Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  General Information . . . . . . . . . . . . . . . . . . . . .   3
   3.  Definitions and Notations . . . . . . . . . . . . . . . . . .   3
     3.1.  Definitions . . . . . . . . . . . . . . . . . . . . . . .   3
     3.2.  Notations . . . . . . . . . . . . . . . . . . . . . . . .   4
   4.  Parameter Values  . . . . . . . . . . . . . . . . . . . . . .   6
     4.1.  Nonlinear Bijection . . . . . . . . . . . . . . . . . . .   6
     4.2.  Linear Transformation . . . . . . . . . . . . . . . . . .   7
     4.3.  Transformations . . . . . . . . . . . . . . . . . . . . .   8
     4.4.  Key Schedule  . . . . . . . . . . . . . . . . . . . . . .   9
     4.5.  Basic Encryption Algorithm  . . . . . . . . . . . . . . .   9
       4.5.1.  Encryption  . . . . . . . . . . . . . . . . . . . . .   9
       4.5.2.  Decryption  . . . . . . . . . . . . . . . . . . . . .   9
   5.  Examples (Informative)  . . . . . . . . . . . . . . . . . . .  10
     5.1.  Transformation S  . . . . . . . . . . . . . . . . . . . .  10
     5.2.  Transformation R  . . . . . . . . . . . . . . . . . . . .  10
     5.3.  Transformation L  . . . . . . . . . . . . . . . . . . . .  10
     5.4.  Key Schedule  . . . . . . . . . . . . . . . . . . . . . .  11
     5.5.  Test Encryption . . . . . . . . . . . . . . . . . . . . .  12
     5.6.  Test Decryption . . . . . . . . . . . . . . . . . . . . .  13
   6.  Security Considerations . . . . . . . . . . . . . . . . . . .  13
   7.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  14
     7.1.  Normative References  . . . . . . . . . . . . . . . . . .  14
     7.2.  Informative References  . . . . . . . . . . . . . . . . .  14
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .  14

1.  Scope

   The Russian Federal standard [GOST3412-2015] specifies basic block
   ciphers used as cryptographic techniques for information processing
   and information protection including the provision of
   confidentiality, authenticity, and integrity of information during
   information transmission, processing, and storage in computer-aided
   systems.

   The cryptographic algorithms specified in this standard are designed
   both for hardware and software implementation.  They comply with
   modern cryptographic requirements and put no restrictions on the
   confidentiality level of the protected information.

   The standard applies to development, operation, and modernization of
   the information systems of various purposes.

Dolmatov                      Informational                     [Page 2]
RFC 7801                    GOST R 34.12-2015                 March 2016

2.  General Information
Show full document text