|Article title||USING OF WEAK BLOCKS OF REPLACEMENT FOR LINEAR CRYPTOANALYSIS OF BLOCK CIPHERS|
|Authors||L.K. Babenko, E.A. Ischukova|
|Section||SECTION IV. METHODS AND MEANS OF CRYPTOGRAPHY AND STEGANOGRAPHY|
|Month, Year||02, 2014 @en|
|Abstract||This work is further work on research of influence of used weak S-blocks on possibility of carrying out attack by means of a method of linear cryptoanalysis for algorithm of enciphering of GOST 28147-89. Earlier authors of article developed universal algorithm of search of replacement blocks weakened in relation to a method of linear cryptoanalysis. In the given work the main approaches which allow to receive the most effective linear analogs for algorithm of enciphering of GOST 28147-89 are considered. It is shown that, creation of analogs is carried out rather simply and can have various options of construction. Further research in this field will be directed on a solution of the problem of fast construction of linear analog using various sets of S-blocks. And also on a complex assessment of strength of GOST enciphering algorithm and other block codes low-studied in relation to a method of linear cryptoanalysis.|
|Keywords||GOST; S-Box; secret key; linear cryptanalysis; probability.|
|References||1. Matsui M., Linear Cryptanalysis Method for DES Cipher, Advances in Cryptology – EUROCRYPT’93, Springer-Verlag, 1998. – 386 p.
2. Бабенко Л.К., Ищукова Е.А. Анализ алгоритма ГОСТ 28147089: поиск слабых блоков // Известия ЮФУ. Технические науки. – 2014. – № 2 (151). – С. 129-138.
3. Babenko L.K., Ishchukova E.A., Maro E.A. Theory and Practice of Cryptography Solutions for Secure Information Sysmems. GOST Encryption Algorithm and Approaches to its Analysis. IGI Global book series Advances in Information Security, Privacy, and Ethics (AISPE) Book Series, USA, 2013. – Р. 34-62.
4. Babenko L.K., Ishchukova E.A., Maro E.A. Research about Strength of GOST 28147-89 Encryption Algorithm. – Proceedings of the 5th international conference on Security of information and networks (SIN 2012). – ACM, New York, NY, USA, 2012. – Р. 138-142.
5. Babenko L.K., Ishchukova E.A. Differential Analysis of GOST Encryption Algorithm. – Proceedings of the 3rd International Conference of Security of Information and Networks (SIN 2010). – ACM, New York, NY, USA,2010. – P. 149-157.