Skip to main content

An Improved Differential Attack on Full GOST

  • Chapter
  • First Online:
The New Codebreakers

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9100))

Abstract

GOST 28147-89 is a well-known block cipher. Its large key size of 256 bits and incredibly low implementation cost make it a plausible alternative for AES-256 and triple DES. Until 2010 “despite considerable cryptanalytic efforts spent in the past 20 years”, GOST was not broken see [30]. Accordingly, in 2010 GOST was submitted to ISO 18033 to become a worldwide industrial encryption standard.

In paper we focus on the question of how far one can go in a dedicated Depth-First-Search approach with several stages of progressive guessing and filtering with successive distinguishers. We want to design and optimized guess-then-truncated differential attack on full 32-bit GOST and make as efficient as we can.The main result of this paper is a single-key attack against full 32-round 256-bit GOST with time complexity of \(2^{179}\) which is substantially faster than any other known single key attack on GOST.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Albrecht, M., Leander, G.: An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers. eprint.iacr.org/2012/401/

  2. Biham, E., Shamir, A.: Differential cryptanalysis of the full 16-round DES. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 487–496. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  3. Courtois, N.: Security evaluation of GOST 28147–89 in view of international standardisation. Cryptologia 36(1), 2–13 (2012)

    Article  MathSciNet  Google Scholar 

  4. Courtois, N.T., Misztal, M.: First differential attack on full 32-round GOST. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) ICICS 2011. LNCS, vol. 7043, pp. 216–227. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  5. Courtois, N., Misztal, M.: Differential Cryptanalysis of GOST, 14 June 2011. http://eprint.iacr.org/2011/312

  6. Courtois, N., Misztal, M.: Aggregated differentials and cryptanalysis of PP-1 and GOST. Periodica Mathematica Hungarica 65(2), 177–192 (2012). CECC 2011, 11th Central European Conference on Cryptology

    Article  MathSciNet  MATH  Google Scholar 

  7. Courtois, N.: An Improved Differential Attack on Full GOST, March 2012. http://eprint.iacr.org/2012/138. Accessed 17 December 2015

  8. Courtois, N.T., Mourouzis, T., Misztal, M., Quisquater, J.-J., Song, G.: Can GOST be made secure against differential cryptanalysis? Cryptologia 39(2), 145–156 (2015)

    Article  Google Scholar 

  9. Courtois, N.: Cryptanalysis of two GOST variants with 128-bit keys. Cryptologia 38(4), 348–361 (2014). http://www.tandfonline.com/doi/full/10.1080/01611194.2014.915706

    Article  Google Scholar 

  10. Courtois, N., Gawinecki, J.A., Song, G.: Contradiction immunity and guess-then-determine attacks on GOST. Tatra Mountains Math. Publ. 53(3), 65–79 (2012)

    MathSciNet  MATH  Google Scholar 

  11. Courtois, N.T.: Cryptanalysis of GOST in the multiple key scenario. Tatra Mountains Mathematical Publications 57(4), 45–63 (2013). Post-proceedings of CECC 2013. http://www.sav.sk/journals/uploads/0124133006Courto.pdf

    MathSciNet  MATH  Google Scholar 

  12. Courtois, N.T.: Low-complexity key recovery attacks on GOST block cipher. Cryptologia 37(1), 1–10 (2013)

    Article  Google Scholar 

  13. Courtois, N.T., Mourouzis, T.: Enhanced truncated differential cryptanalysis of GOST. In: SECRYPT 2013, Reykjavik, July 2013 (2013). http://www.nicolascourtois.com/papers/sec13.pdf

  14. Courtois, N.T., Mourouzis, T.: Propagation of truncated differentials in GOST. In: Proceedings of SECURWARE 2013 (2013). http://www.thinkmind.org/download.php?articleid=securware_2013_7_20_30119

  15. Courtois, N., Mourouzis, T., Grocholewska-Czurylo, A., Quisquater, J.-J.: On optimal size in truncated differential attacks. In: Post-proceeding of CECC 2014 Conference. Stud. Scient. Math, Hungarica (2015)

    Google Scholar 

  16. Courtois, N.: Algebraic Complexity Reduction and Cryptanalysis of GOST, Preprint, 2010–2014. http://eprint.iacr.org/2011/626

  17. Courtois, N.: On multiple symmetric fixed points in GOST. Cryptologia 39(4), 322–334 (2015). http://www.tandfonline.com/doi/full/10.1080/01611194.2014.988362

    Article  MathSciNet  Google Scholar 

  18. Coppersmith, D.: The development of DES, Invited Talk, Crypto’2000, vol. 8 (2000)

    Google Scholar 

  19. Dinur, I., Dunkelman, O., Shamir, A.: Improved attacks on full GOST. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol. 7549, pp. 9–28. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  20. Shorin, V.V., Jelezniakov, V.V., Gabidulin, E.M.: Linear and Differential Cryptanalysis of Russian GOST, submitted Elsevier preprint, 4 April 2001

    Google Scholar 

  21. Shorin, V.V., Jelezniakov, V.V., Gabidulin, E.M.: Security of algorithm GOST 28147–89 (in Russian). In: Abstracts XLIII MIPT Science Conference, 8–9 December 2000 (2000)

    Google Scholar 

  22. Zabotin, I.A., Glazkov, G.P., Isaeva, V.B.: Cryptographic Protection for Information Processing Systems. Government Standard of the USSR, GOST 28147–89, Government Committee of the USSR for Standards (1989)

    Google Scholar 

  23. Isobe, T.: A single-key attack on the full GOST block cipher. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 290–305. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  24. Kara, O., Karakoç, F.: Fixed points of special type and cryptanalysis of full GOST. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 86–97. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  25. Kovalchuk, L.V.: Generalized Markov ciphers: evaluation of practical security against differential cryptanalysis. In: Proceedings of the 5th All-Russian Science Conference “Mathematics and Safety of Information Technologies” (MaBIT 2006), MGU, Moscow, 25–27 October 2006, pp. 595–599 (2006). (in Russian)

    Google Scholar 

  26. Alekseychuk, A.N., Kovalchuk, L.V.: Towards a Theory of Security Evaluation for GOST-like Ciphers against Differential and Linear Cryptanalysis. Preprint 9 September 2011. http://eprint.iacr.org/2011/489

  27. Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 196–211. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  28. Leander, G., Poschmann, A.: On the classification of 4 bit S-boxes. In: Carlet, C., Sunar, B. (eds.) WAIFI 2007. LNCS, vol. 4547, pp. 159–176. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  29. Mourozis, T.: Optimizations in Algebraic and Differential Cryptanalysis, Ph.D. thesis, under superivsion of Dr. Nicolas T. Courtois, University College London, January 2015. http://discovery.ucl.ac.uk/1462141/2/PhD_Thesis_Theodosis_Mourouzis.pdf

  30. Poschmann, A., Ling, S., Wang, H.: 256 Bit standardized crypto for 650 GE – GOST revisited. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 219–233. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  31. Rudskoy, V., Chmora, A.: Working draft for ISO/IEC 1st WD of Amd1/18033-3: Russian Block Cipher GOST, ISO/IEC JTC 1/SC 27 N9423, MD5=feb236fe6d3a79a02ad666edfe7039aa, 14 January 2011

    Google Scholar 

  32. Rudskoy, V., Dmukh, A.: Algebraic and differential cryptanalysis of GOST: fact or fiction. In: CTCryppt 2012, Workshop on Current Trends in Cryptology, Nizhny Novgorod, 2 July 2012 (2012). An extended abstract is available at: https://www.tc26.ru/invite/spisokdoc/CTCrypt_rudskoy.pdf slides are available at: https://www.tc26.ru/documentaryslides/CTCrypt_rudskoy_slides_final.pdf

  33. Seki, H., Kaneko, T.: Differential cryptanalysis of reduced rounds of GOST. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol. 2012, pp. 315–323. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  34. Schneier, B.: Section 14.1 GOST, in Applied Cryptography, 2nd edition. John Wiley and Sons (1996). ISBN 0-471-11709-9

    Google Scholar 

  35. Standard Deviation - wikipedia article, 13 June 2011. http://en.wikipedia.org/wiki/Standard_deviation

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nicolas T. Courtois .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Courtois, N.T. (2016). An Improved Differential Attack on Full GOST. In: Ryan, P., Naccache, D., Quisquater, JJ. (eds) The New Codebreakers. Lecture Notes in Computer Science(), vol 9100. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49301-4_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-49301-4_18

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-49300-7

  • Online ISBN: 978-3-662-49301-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics