COURTOIS, N; (2012) Security Evaluation of GOST 28147-89 In View Of International Standardisation. Cryptologia , 36 (Issue 1) 2 - 13. 10.1080/01611194.2011.632807.
Full text not available from this repository.
GOST 28147-89 is the Russian equivalent of 3DES and AES. In 2010 GOST was submitted to ISO 18033, to also become a worldwide indus- trial encryption standard. Until 2011 researchers agreed that: "despite considerable cryptanalytic e®orts spent in the past 20 years, GOST is still not broken". Then in 2011 an attack was found. In this short paper we describe another attack, to illustrate the fact that there are now attacks on GOST, which require much less memory, and doesn't even require the re°ection property to hold. More generally, our ambition is to do more than just to point out that a major encryption standard is °awed. We would like to present and suggest a new general paradigm for e®ective symmetric cryptanalysis of so called "Black-box Algebraic Complexity Reduction". This new paradigm builds on many already known attacks on symmetric ciphers, such as ¯xed point, slide, involution, cycling and other self-similarity attacks but the exact attacks we obtain, could never be developed previously, because only in the recent 5 years it became possible to show the existence of an appropriate last step for many such attacks, which is a low data complexity software algebraic attack.
|Title:||Security Evaluation of GOST 28147-89 In View Of International Standardisation|
|Keywords:||Block ciphers, Feistel schemes, key scheduling, self-similarity, reflection attacks, single-key attacks, algebraic attacks, algebraic complexity reduction, black-box reductions|
|UCL classification:||UCL > School of BEAMS > Faculty of Engineering Science > Computer Science|
Archive Staff Only: edit this record