We managed to reverse-engineer this S-Box and describe its unpublished structure. Our decomposition allows a much more efficient hardware implementation but the choice of the components used is puzzling from a cryptographic perspective.
This extended abstract does not explain \emph{how} we found this decomposition. We will describe our process in an extended version of this paper.
Category / Keywords: secret-key cryptography / Streebog, S-Box, Kuznyechik, Reverse-Engineering Date: received 14 Aug 2015, last revised 31 Aug 2015 Contact author: leo perrin at uni lu Available format(s): PDF | BibTeX Citation Note: Made it clear that only STRIBOBr1 was using the S-Box we reverse-engineered, unlike STRIBOBr2. Version: 20150831:124216 (All versions of this report) Short URL: ia.cr/2015/812 Discussion forum: Show discussion | Start new discussion