Differential Cryptanalysis of Reduced Rounds of GOST

  • Haruki Seki
  • Toshinobu Kaneko
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2012)

Abstract

The block cipher GOST was proposed in former Soviet Union in 1989. In this paper we present the first result of differential cryptanalysis of GOST with reduced number of rounds. By introducing the idea of using a set of differential characteristics, which is a partitioning type, we can reduce the influence of the key value upon the probability as well as get high differential probability. Using 251 chosen plaintexts the key of 13-round GOST can be obtained. Next this differential cryptanalysis is expanded with combining related-key attack. Using 256 chosen plaintexts the key of 21 rounds of GOST can be obtained.

References

  1. 1.
    GOST, Gosudarstvennyi Standard 28147-89, “Cryptographic Protection for Data Processing Systems”, Government Committee of the USSR for Standards, 1989.Google Scholar
  2. 2.
    L.R. Knudsen, “Truncated and higher order differentials”, FSE’94, Lecture Notes in Computer Science, pp.196–211, Springer-Verlag, 1994.Google Scholar
  3. 3.
    L.R. Knudsen, T.A. Berson, “Truncated Differentials of SAFER”, FSE’96, Lecture Notes in Computer Science, pp.15–26, Springer-Verlag, 1996.Google Scholar
  4. 4.
    J. Borst, L.R. Knudsen, V. Rijmen, “Two Attacks on Reduced IDEA”, Eurocrypt’97, Lecture Notes in Computer Science, pp.1–13, Springer-Verlag, 1997.Google Scholar
  5. 5.
    E. Biham, “New Types of Cryptanalytic Attacks Using Related Keys”, Eurocrypt’93, Lecture Notes in Computer Science, pp.398–409, Springer-Verlag, 1993.Google Scholar
  6. 6.
    J. Kelsey, B. Shneier, D. Wagner, “Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES”, CRYPTO’96 Proceedings, Spring-Verlag, 1996, pp.237–251.Google Scholar
  7. 7.
    B. Shneier, “Applied Cryptography”, John Wiley & Sons, pp. 331–334.Google Scholar
  8. 8.
    E. Biham, A. Shamir., “Differential Cryptanalysis of DES-like Cryptosystems,” Journal of Cryptology 1991.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Haruki Seki
    • 1
  • Toshinobu Kaneko
    • 2
  1. 1.TAO (Telecommunications Advancement Organization of Japan)Kanagawa-kuJapan
  2. 2.Science University of TokyoChibaJapan

Personalised recommendations