Abstract
GOST block cipher, defined in the GOST 28147-89 standard, is a well-known 256-bit symmetric cipher that operates on 64-bit blocks. The 256-bit level security can be even more increased by keeping the specifications of the S-boxes secret. GOST is implemented in many standard libraries such as OpenSSL and it has extremely low implementation cost and as a result of this it could be considered as a plausible alternative for AES-256 and 3-DES. Furthermore, nothing seemed to threaten its high 256-bit security [CHES 2010] and in 2010 it was submitted to ISO 18033-3 to become a worldwide industrial standard. During the period of submission many new attacks of different types were presented by the cryptographic communities against full 32-rounds of GOST. We have algebraic complexity reduction attacks, advanced differential attacks, attacks using reflection property, and many others. However, all of these attacks were against the version of GOST which uses the standard set of S-boxes. In this paper, we study the security of many variants of GOST against advanced forms of differential attacks which are based on truncated differentials techniques. In particular we present an attack against full GOST for the variant of GOST which is supposed to be the strongest one and uses the set of S-boxes proposed in ISO 18033-3. Our attack is of Depth-First key search style constructed by solving several underlying optimization problems and has time complexity 2245. 4 and 264 memory and data complexity. It is very interesting to note that this attack is unoptimized with respect to several aspects and can be immediately improved by discovering more efficient ad-hoc heuristics which could eventually lead to the discovery of better truncated differential properties.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Biham, E., Shamir, A.: Differential cryptanalysis of the full 16-round des. In: Brickel, E.F. (ed.) CRYPTO 1992. Lecture Notes in Computer Science, vol. 740, pp. 487–496. Springer, Heidelberg (1992)
Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard. Springer, Heidelberg (1993). ISBN: 0-387-97930-1, 3-540-97930-1
Boyar, J., Find, M., Peralta, R.: Four measures of nonlinearity. In: Algorithms and Complexity, pp. 61–72. Springer, Berlin Heidelberg (2013)
Coppersmith, D.: The data encryption standard (des) and its strength against attacks. IBM J. Res. Dev. 38(3), 243 (1994). doi:10.1147/rd.383.0243
Courtois, N.: Algebraic Complexity Reduction and Cryptanalysis of GOST. IACR Cryptology ePrint Archive (2011)
Courtois, N.: Security evaluation of GOST 28147-89. In: View Of International Standardisation. IACR Cryptology ePrint Archive (2011)
Courtois, N.: An Improved Differential Attack on full GOST. IACR Cryptology ePrint Archive (2012)
Courtois, N.: Low complexity key recovery attacks on GOST block cipher. Cryptologia 37(1), 1–10 (2013)
Courtois, N., Misztal, M.: First Differential cryptanalysis of full round 32- round GOST. In: ICICS’11, Beijing. LNCS, vol. 7043, pp. 216–227. Springer, Heidelberg (2011)
Courtois, N., Misztal, M.: Aggregated Differentials and Cryptanalysis of PP-1 and GOST. Period. Math. Hung. 65(2), 177–192 (2012)
Mourouzis,T: Optimizations in Algebraic and Differential Cryptanalysis. PhD Thesis, UCL (2015)
Courtois, N., Mourouzis, T.: Enhanced truncated differential cryptanalysis of GOST. In: SECRYPT 2013, 10th International Conference on Security and Cryptography, Reykjavik, 29–31 July 2013
Courtois, N., Mourouzis, T., Grocholewska-Czurylo, A., Quisquater, J.: On Optimal Size in Truncated Differential Attacks, Budapest, 21–23 May 2014
Dolmatov, V.: GOST 28147-89: Encryption, Decryption, and Message Authentication Code (MAC) Algorithms. IETF, Anaheim (2010). ISSN: 2070-1721
Dinur, I., Dunkelman, O., Shamir, A.: Improved attacks on full GOST. In: Fast Software Encryption, pp. 9–28. Springer, Berlin Heidelberg (2011)
Dolmatov, V.: RFC 5830: GOST 28147-89 Encryption, Decryption and MAC algorithms (2010)
Furuya, S.: Slide attacks with a known-plaintext cryptanalysis. In Information Security and Cryptology—ICISC 2001, pp. 214–225. Springer, Berlin Heidelberg (2002)
Isobe,T.: A single-key attack on the full GOST block cipher. In: Fast Software Encryption, pp. 290–305. Springer, Berlin Heidelberg (2011)
Khovratovich, D., Ivica Nikolic, I.: Rotational cryptanalysis of ARX. In: Fast Software Encryption, pp. 333–346. Springer, Berlin Heidelberg (2013)
Knudsen, L.: Truncated and higher order differentials. In: 2nd International Workshop on Fast Software Encryption, pp. 196–211. Springer, Heidelberg (1994)
Knudsen, L.: Truncated and higher order differentials. In: Fast Software Encryption, pp. 196–211. Springer, Berlin Heidelberg (1995)
Knudsen, L., Robshaw, M.: The Block Cipher Companion. Springer, Berlin Heidelberg (2011)
Lai, X., Massey, J.: Markov ciphers and differential cryptanalysis. In: Davies, D.W. (ed.) Advances in Cryptology. Springer, Heidelberg (1991)
Malchik, A.: An English Translation of GOST Standard by Aleksandr Malchik with an English Preface Co-written with Whitfield Diffie (1994)
Mantin, I., Shamir, A.: A practical attack on broadcast RC4. In: Fast Software Encryption, pp. 152–164. Springer, Heidelberg (2001)
Meier, W., Kunzli, S.: Distinguishing Attack on MAG. ENCRYPT Stream Cipher Project. eSTREAM (2013)
Popov, K., Leontiev, S.: Additional Cryptographic Algorithms for Use with GOST 28147-89, GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94 Algorithms (2006)
Poschmann, A., Ling, S., Wang, H.: 256 bit standardized crypto for 650 GE GOST revisited. In: CHES 2010, LNCS, vol. 6225, pp. 219–233. Springer, Heidelberg (2010)
Rudskoy, V., Chmora, A.: Working draft for ISO/IEC 1st WD of AMD1/18033-3. In: Russian Block Cipher GOST, ISO/IEC JTC 1/SC 27 N9423, 2011-01-14 (2011)
Saarinen, M.: A Chosen Key Attack Against the Secret S-Boxes of GOST (1998)
Schneier, B.: Applied Cryptography, 2nd edn. Wiley, New York (1996)
Seki, H., Kaneko, T.: Differential cryptanalysis of reduced rounds of GOST. In: Selected Areas in Cryptography, pp. 315–323. Springer, Berlin Heidelberg (2001)
Shorin, V., Jelezniakov, V., Gabidulin, E.: Linear and differential cryptanalysis of Russian GOST. Electron. Notes Discret Math. 6, 538–547 (2001)
Shorin, V., Jelezniakov, V., Gabidulin, E.: Security of algorithm GOST 28147-89. In: Abstracts of XLIII MIPT Science Conference (2000)
Zabotin. I., Glazkov, G., Isaeva, V.: Cryptographic Protection for Information Processing Systems, Government Standard of the USSR, GOST 28147-89. Government Committee of the USSR for Standards (1989)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Mourouzis, T., Courtois, N. (2015). Advanced Truncated Differential Attacks Against GOST Block Cipher and Its Variants. In: Daras, N., Rassias, M. (eds) Computation, Cryptography, and Network Security. Springer, Cham. https://doi.org/10.1007/978-3-319-18275-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-18275-9_15
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18274-2
Online ISBN: 978-3-319-18275-9
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)