Abstract
GOST 28147-89 is a well-known block cipher. Its large key size of 256 bits and incredibly low implementation cost make it a plausible alternative for AES-256 and triple DES. Until 2010 “despite considerable cryptanalytic efforts spent in the past 20 years”, GOST was not broken see [30]. Accordingly, in 2010 GOST was submitted to ISO 18033 to become a worldwide industrial encryption standard.
In paper we focus on the question of how far one can go in a dedicated Depth-First-Search approach with several stages of progressive guessing and filtering with successive distinguishers. We want to design and optimized guess-then-truncated differential attack on full 32-bit GOST and make as efficient as we can.The main result of this paper is a single-key attack against full 32-round 256-bit GOST with time complexity of \(2^{179}\) which is substantially faster than any other known single key attack on GOST.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Albrecht, M., Leander, G.: An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers. eprint.iacr.org/2012/401/
Biham, E., Shamir, A.: Differential cryptanalysis of the full 16-round DES. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 487–496. Springer, Heidelberg (1993)
Courtois, N.: Security evaluation of GOST 28147–89 in view of international standardisation. Cryptologia 36(1), 2–13 (2012)
Courtois, N.T., Misztal, M.: First differential attack on full 32-round GOST. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) ICICS 2011. LNCS, vol. 7043, pp. 216–227. Springer, Heidelberg (2011)
Courtois, N., Misztal, M.: Differential Cryptanalysis of GOST, 14 June 2011. http://eprint.iacr.org/2011/312
Courtois, N., Misztal, M.: Aggregated differentials and cryptanalysis of PP-1 and GOST. Periodica Mathematica Hungarica 65(2), 177–192 (2012). CECC 2011, 11th Central European Conference on Cryptology
Courtois, N.: An Improved Differential Attack on Full GOST, March 2012. http://eprint.iacr.org/2012/138. Accessed 17 December 2015
Courtois, N.T., Mourouzis, T., Misztal, M., Quisquater, J.-J., Song, G.: Can GOST be made secure against differential cryptanalysis? Cryptologia 39(2), 145–156 (2015)
Courtois, N.: Cryptanalysis of two GOST variants with 128-bit keys. Cryptologia 38(4), 348–361 (2014). http://www.tandfonline.com/doi/full/10.1080/01611194.2014.915706
Courtois, N., Gawinecki, J.A., Song, G.: Contradiction immunity and guess-then-determine attacks on GOST. Tatra Mountains Math. Publ. 53(3), 65–79 (2012)
Courtois, N.T.: Cryptanalysis of GOST in the multiple key scenario. Tatra Mountains Mathematical Publications 57(4), 45–63 (2013). Post-proceedings of CECC 2013. http://www.sav.sk/journals/uploads/0124133006Courto.pdf
Courtois, N.T.: Low-complexity key recovery attacks on GOST block cipher. Cryptologia 37(1), 1–10 (2013)
Courtois, N.T., Mourouzis, T.: Enhanced truncated differential cryptanalysis of GOST. In: SECRYPT 2013, Reykjavik, July 2013 (2013). http://www.nicolascourtois.com/papers/sec13.pdf
Courtois, N.T., Mourouzis, T.: Propagation of truncated differentials in GOST. In: Proceedings of SECURWARE 2013 (2013). http://www.thinkmind.org/download.php?articleid=securware_2013_7_20_30119
Courtois, N., Mourouzis, T., Grocholewska-Czurylo, A., Quisquater, J.-J.: On optimal size in truncated differential attacks. In: Post-proceeding of CECC 2014 Conference. Stud. Scient. Math, Hungarica (2015)
Courtois, N.: Algebraic Complexity Reduction and Cryptanalysis of GOST, Preprint, 2010–2014. http://eprint.iacr.org/2011/626
Courtois, N.: On multiple symmetric fixed points in GOST. Cryptologia 39(4), 322–334 (2015). http://www.tandfonline.com/doi/full/10.1080/01611194.2014.988362
Coppersmith, D.: The development of DES, Invited Talk, Crypto’2000, vol. 8 (2000)
Dinur, I., Dunkelman, O., Shamir, A.: Improved attacks on full GOST. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol. 7549, pp. 9–28. Springer, Heidelberg (2012)
Shorin, V.V., Jelezniakov, V.V., Gabidulin, E.M.: Linear and Differential Cryptanalysis of Russian GOST, submitted Elsevier preprint, 4 April 2001
Shorin, V.V., Jelezniakov, V.V., Gabidulin, E.M.: Security of algorithm GOST 28147–89 (in Russian). In: Abstracts XLIII MIPT Science Conference, 8–9 December 2000 (2000)
Zabotin, I.A., Glazkov, G.P., Isaeva, V.B.: Cryptographic Protection for Information Processing Systems. Government Standard of the USSR, GOST 28147–89, Government Committee of the USSR for Standards (1989)
Isobe, T.: A single-key attack on the full GOST block cipher. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 290–305. Springer, Heidelberg (2011)
Kara, O., Karakoç, F.: Fixed points of special type and cryptanalysis of full GOST. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 86–97. Springer, Heidelberg (2012)
Kovalchuk, L.V.: Generalized Markov ciphers: evaluation of practical security against differential cryptanalysis. In: Proceedings of the 5th All-Russian Science Conference “Mathematics and Safety of Information Technologies” (MaBIT 2006), MGU, Moscow, 25–27 October 2006, pp. 595–599 (2006). (in Russian)
Alekseychuk, A.N., Kovalchuk, L.V.: Towards a Theory of Security Evaluation for GOST-like Ciphers against Differential and Linear Cryptanalysis. Preprint 9 September 2011. http://eprint.iacr.org/2011/489
Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 196–211. Springer, Heidelberg (1995)
Leander, G., Poschmann, A.: On the classification of 4 bit S-boxes. In: Carlet, C., Sunar, B. (eds.) WAIFI 2007. LNCS, vol. 4547, pp. 159–176. Springer, Heidelberg (2007)
Mourozis, T.: Optimizations in Algebraic and Differential Cryptanalysis, Ph.D. thesis, under superivsion of Dr. Nicolas T. Courtois, University College London, January 2015. http://discovery.ucl.ac.uk/1462141/2/PhD_Thesis_Theodosis_Mourouzis.pdf
Poschmann, A., Ling, S., Wang, H.: 256 Bit standardized crypto for 650 GE – GOST revisited. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 219–233. Springer, Heidelberg (2010)
Rudskoy, V., Chmora, A.: Working draft for ISO/IEC 1st WD of Amd1/18033-3: Russian Block Cipher GOST, ISO/IEC JTC 1/SC 27 N9423, MD5=feb236fe6d3a79a02ad666edfe7039aa, 14 January 2011
Rudskoy, V., Dmukh, A.: Algebraic and differential cryptanalysis of GOST: fact or fiction. In: CTCryppt 2012, Workshop on Current Trends in Cryptology, Nizhny Novgorod, 2 July 2012 (2012). An extended abstract is available at: https://www.tc26.ru/invite/spisokdoc/CTCrypt_rudskoy.pdf slides are available at: https://www.tc26.ru/documentaryslides/CTCrypt_rudskoy_slides_final.pdf
Seki, H., Kaneko, T.: Differential cryptanalysis of reduced rounds of GOST. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol. 2012, pp. 315–323. Springer, Heidelberg (2001)
Schneier, B.: Section 14.1 GOST, in Applied Cryptography, 2nd edition. John Wiley and Sons (1996). ISBN 0-471-11709-9
Standard Deviation - wikipedia article, 13 June 2011. http://en.wikipedia.org/wiki/Standard_deviation
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Courtois, N.T. (2016). An Improved Differential Attack on Full GOST. In: Ryan, P., Naccache, D., Quisquater, JJ. (eds) The New Codebreakers. Lecture Notes in Computer Science(), vol 9100. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-49301-4_18
Download citation
DOI: https://doi.org/10.1007/978-3-662-49301-4_18
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-49300-7
Online ISBN: 978-3-662-49301-4
eBook Packages: Computer ScienceComputer Science (R0)