Enhanced Truncated Differential Cryptanalysis of GOST

Nicolas T. Courtois, Theodosis Mourouzis, Michal Misztal

2013

Abstract

.

References

  1. A. Poschmann, S. L. and Wang, H. (2010). 256 bit standardized crypto for 650 ge gost revisited. In In CHES 2010, LNCS 6225, pp. 219-233.
  2. Biham, E. and Shamir, A. (1990). Differential cryptanalysis of des-like cryptosystems. In Extended Abstract. In: Crypto'90,Springer-Verlag, 2.
  3. Biham, E. and Shamir, A. (1992). Differential cryptanalysis of the full 16-round des. In In: Crypto'92, SpringerVerlag, 487.
  4. Courtois, N. (2011a). Algebraic complexity reduction and cryptanalysis of gost. In Cryptology ePrint Archive, Report 2011/626.
  5. Courtois, N. (2011b). Security evaluation of gost 28147- 89 in view of international standardisation. In In Cryptologia, Volume 36, Issue 1, pp. 2-13, 2012. http://www.tandfonline.com/toc/ucry20/36/1 An earlier version which was ocially sub-mitted to ISO in May 2011 can be found at http://eprint. iacr.org/2011/211/.
  6. Courtois, N. (2012). An improved differential attack on full gost. In In Cryptology ePrint Archive, Report 2012/138. 15 March 2012, http://eprint. iacr.org/2012/.
  7. Courtois, N. and Misztal, M. (2011). First differential attack on full 32-round gost. In in ICICS'11, pp. 216-227, Springer LNCS 7043.
  8. Courtois, N. and Misztal, M. (2012). Aggregated differentials and cryptanalysis of pp-1 and gost. In CECC 2011, 11th Central European Conference on Cryptology. In Periodica Mathematica Hungarica Vol. 65(2), pp. 1126, DOI:10.1007/s10998-012-2983-8, Springer.
  9. Dolmatov, V. (2010). Rfc 5830: Gost 28147-89 encryption, decryption and mac algorithms. In IETF. ISSN: 2070- 1721.
  10. GOST (2005). A russian reference implementation of gost implementing russian algorithms as an extension of tls v1.0. is available as a part of openssl library. the file gost89.c contains eight different sets of s-boxes and is found in openssl 0.9.8 and later: http://www.openssl.org/source/.
  11. I.A. Zabotin, G. G. and Isaeva, V. (1989). Cryptographic protection for information processing systems, government standard of the ussr,gost 28147-89. In Government Committee of the USSR for Standards.
  12. Isobe, T. (2011). A single-key attack on the full gost block cipher. In In FSE 2011, pp. 290-305, Springer LNCS 6733.
  13. Itai Dinur, O. D. and Shamir, A. Improved attacks on full gost. In FSE 2012, LNCS 7549, pp. 9-28.
  14. Knudsen, L. (1994). Truncated and higher order differentials. In In FSE 1994, pp.196-211, LNCS 1008, Springer.
  15. Malchik, A. and Diffie, W. (1994). English translation: Cryptographic protection for information processing systems, government standard of the ussr,gost 28147-89. In http://www.autochthonous.org/ crypto/gosthash.tar.gz.
  16. , Saarinen, M. (1998). A chosen key attack against the secret s-boxes of gost. In Unpublished manuscript.
  17. Schneier, B. (1996). Section 14.1 gost, in applied cryptography, second edition. In John Wiley and Sons.
  18. Seki, H. and T.Kaneko (2000). Differential cryptanalysis of reduced rounds of gost. In In SAC 2000, LNCS 2012, pp. 315-323, Springer.
  19. V. Popov, I. K. and Leontie, S. (2006). Rfc 4357: Additional cryptographic algorithms for use with gost 28147-89, gost r 34.10-94,gost r 34.10-2001, and gost r 34.11-94 algorithms. In http://tools.ietf.org/html/rfc4357.
Download


Paper Citation


in Harvard Style

T. Courtois N., Mourouzis T. and Misztal M. (2013). Enhanced Truncated Differential Cryptanalysis of GOST . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 411-418. DOI: 10.5220/0004532504110418


in Bibtex Style

@conference{secrypt13,
author={Nicolas T. Courtois and Theodosis Mourouzis and Michal Misztal},
title={Enhanced Truncated Differential Cryptanalysis of GOST},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={411-418},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004532504110418},
isbn={978-989-8565-73-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - Enhanced Truncated Differential Cryptanalysis of GOST
SN - 978-989-8565-73-0
AU - T. Courtois N.
AU - Mourouzis T.
AU - Misztal M.
PY - 2013
SP - 411
EP - 418
DO - 10.5220/0004532504110418