Article

Article title DIFFERENTIAL CRYPTANALYSIS OF GOST ENCRYPTION ALGORITHM
Authors L.K. Babenko, E.A. Ischukova
Section SECTION IV. METHODS AND MEANS OF CRYPTOGRAPHY AND STEGANOGRAPHY
Month, Year 12, 2011 @en
Index UDC 681.03.245
DOI
Abstract In this article we explore the resistance of the GOST 28147-89 algorithm to the attack based on differential cryptanalysis. As the result of our research, we have found out that there is a number of S-boxes with weak properties with respect to differential cryptanalysis. The use of such elements in GOST allows obtaining features that have a fairly high probability that can be used to carry out attacks. So, if we use the same weak block replacement, the probability characteristics for the 32 rounds of GOST can reach 2 -25, which makes it relatively easy to get the right pair of texts for analysis.

Download PDF

Keywords GOST; differential cryptanalysis; input difference; output difference; characteristic; secret key.
References 1. Biham E., Shamir A. Differential Cryptanalysis of the Full 16-round DES, Crypto'92, Springer-Velgar, 1998. – Р. 487.
2. Biham E., Shamir A. Differential Cryptanalysis of DES-like Cryptosystems, Extended Abstract, Crypto'90, Springer-Velgar, 1998. – Р. 2
3. Kelsey J., Schnier B., Wagner D., Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SARER, and Triple-DES // http://www.schnier.com – 1996.
4. Бабенко Л.К., Ищукова Е.А. Применение рекурсивного алгоритма поиска в Б-деревьях для дифференциального криптоанализа алгоритма шифрования ГОСТ 28147-89 // Материалы IХ Международной научно-практической конференции «Информационная безопасность». Ч. 2. – Таганрог: Изд-во: ТТИ ЮФУ, 2007 – С. 92-97.
5. Saarien M.-J. A Chosen Key Attack Against the Secret S-boxes of GOST // http://www.m.-js.com – Helsinki University of Technology, Finland.
6. Панасенко С.П. Алгоритмы шифрования. Специальный справочник. – СПб.: БХВ-Петербург, 2009. – 576 с.

Comments are closed.