An Improved Differential Attack on Full GOST

نویسنده

  • Nicolas Courtois
چکیده

GOST 28147-89 is a well-known block cipher and the official encryption standard of the Russian Federation. A 256-bit block cipher considered as an alternative for AES-256 and triple DES, having an amazingly low implementation cost and is becoming increasingly popular [?,15]. Until 2010 researchers unanimously agreed that: “despite considerable cryptanalytic efforts spent in the past 20 years, GOST is still not broken”, see [26] and in 2010 it was submitted to ISO 18033 to become a worldwide industrial encryption standard. In 2011 it was suddenly discovered that GOST can be broken and is insecure on more than one account. There is a substantial variety of recent attacks on GOST [5, 10, 16, 8, 6, 7, 11]. We have reflection attacks [16, 10], attacks with double reflection [10], self-similarity guess then determine attacks which do not use any reflections [10, 5] and advanced differential attacks [28, 8, 6, 7]. The final key recovery step in various attacks is in many cases a software algebraic attack [10, 5], frequently also a Meet-In-The-Middle attack [16, 10, 11] and in differential attacks key bits are guessed and confirmed by the differential properties [28, 8, 6, 7]. In this paper we consider some recent differential attacks on GOST [28, 8, 6, 7] and show how to further improve them. We present a new singlekey attack against full 32-round 256-bit GOST with time complexity of 2 which is substantially faster than any previous single key attack on GOST.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST

In this paper, we present a related key truncated differential attack on 27 rounds of XTEA which is the best known attack so far. With an expected success rate of 96.9%, we can attack 27 rounds of XTEA using 2 chosen plaintexts and with a complexity of 2 27round XTEA encryptions. We also propose several attacks on GOST. First, we present a distinguishing attack on full-round GOST, which can dis...

متن کامل

First Differential Attack on Full 32-Round GOST

GOST 28147-89 is a well-known block cipher and the official encryption standard of the Russian Federation. A 256-bit block cipher considered as an alternative for AES-256 and triple DES, having an amazingly low implementation cost and thus increasingly popular and used [12,15,13,20]. Until 2010 researchers have written that: “despite considerable cryptanalytic efforts spent in the past 20 years...

متن کامل

Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function

The GOST hash function family has served as the new Russian national hash standard (GOST R 34.11-2012) since January 1, 2013, and it has two members, i.e., GOST256 and GOST-512 which correspond to two different output lengths. Most of the previous analyses of GOST emphasize on the compression function rather than the hash function. In this paper, we focus on security properties of GOST under th...

متن کامل

Improved Attacks on Full GOST

GOST is a well known block cipher which was developed in the Soviet Union during the 1970’s as an alternative to the US-developed DES. In spite of considerable cryptanalytic effort, until very recently there were no published single key attacks against its full 32-round version which were faster than the 2 time complexity of exhaustive search. In February 2011, Isobe used in a novel way the pre...

متن کامل

Differential Cryptanalysis of GOST

GOST 28147-89 is a well-known block cipher and the official encryption standard of the Russian Federation. A 256-bit block cipher considered as an alternative for AES-256 and triple DES, having an amazingly low implementation cost and thus increasingly popular and used [22, 23, 30, 24, 41]. Until 2010 researchers unanimously agreed that: “despite considerable cryptanalytic efforts spent in the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012