2012
DOI: 10.1007/978-3-642-34047-5_2
|View full text |Cite
|
Sign up to set email alerts
|

Improved Attacks on Full GOST

Abstract: Abstract. GOST is a well known block cipher which was developed in the Soviet Union during the 1970's as an alternative to the US-developed DES. In spite of considerable cryptanalytic effort, until very recently there were no published single key attacks against its full 32-round version which were faster than the 2 256 time complexity of exhaustive search. In February 2011, Isobe used in a novel way the previously discovered reflection property in order to develop the first such attack, which requires 2 32 da… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
59
0
2

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 54 publications
(61 citation statements)
references
References 11 publications
0
59
0
2
Order By: Relevance
“…We note that the mentioned below complementation properties have been known and exploited in attacks on GOST [7,4]. However, to the best of our knowledge, all the attacks on GOST that recover the full key, are impractical.…”
Section: The Case Of Gostmentioning
confidence: 94%
See 2 more Smart Citations
“…We note that the mentioned below complementation properties have been known and exploited in attacks on GOST [7,4]. However, to the best of our knowledge, all the attacks on GOST that recover the full key, are impractical.…”
Section: The Case Of Gostmentioning
confidence: 94%
“…Hence, in the case of former one has to try around 2 P different pairs of keys and encrypt one pair of plaintexts, while in the case of modular Feistels, for each of the 2 P pairs of related-key has to encrypt 2 Q pairs of plaintexts (2 −P , 2 −Q are the probabilities of the differential in the key schedule and in the state). 4 One of our anonymous reviewers has informed us that a similar idea was used against DESX in Kelsey et al [6]. 5 When r is odd, there are r 2 round keys with difference ∆1, and r 2 − 1 round keys with ∆2.…”
Section: Remarkmentioning
confidence: 99%
See 1 more Smart Citation
“…Между тем LWC от-нюдь не является «простой». Аксель Пошманн, из-вестный специалист по Lightweight Cryptography, характеризует ее словами «As light as a feather, and as hard as dragon-scales» -«Легка, как пух и прочна как чешуя дракона» 7 .…”
Section: методы и средства кодирования информацииunclassified
“…Вопросы кибербезопасности №1 (9) 64 пар открытый текст-шифртекст, что делает предложенную ата-ку неосуществимой на практике [7]. Основным характеристиками реализации криптографического алгоритма являются слож-ность реализации и скорость работы.…”
Section: легковесная криптографияunclassified