2015
DOI: 10.1080/01611194.2014.915266
|View full text |Cite
|
Sign up to set email alerts
|

Can GOST Be Made Secure Against Differential Cryptanalysis?

Abstract: GOST is a well-known Russian government standard block cipher which was submitted to ISO in 2010 to become an international standard. A number of advanced differential attacks on GOST have been proposed including the best known single-key attack on GOST to date in 2 179 [14]. This attack, however, was designed for the oldest known set of GOST S-boxes hoping that similar attacks should exist for other versions of GOST. This claim was bitterly disputed by Russian researchers as recently as July 2012, who stated … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
21
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2

Relationship

4
1

Authors

Journals

citations
Cited by 11 publications
(21 citation statements)
references
References 21 publications
0
21
0
Order By: Relevance
“…A lot of research about Boolean functions and optimal resistance against DC have been done, in a totally unrealistic settings where small components of ciphers are studied in isolation regardless of how they are connected inside a cipher. This research leads to highly misleading results about types of strong or "optimal" S-boxes which [47,[50][51][52]13] are expected to protect ciphers against DC. In contrast in this paper we are going to make a rather very surprising claim that the security of a cipher such as GOST against DC does not depend that much on the S-boxes, but rather on the connections of the cipher, see Section 4 and [53,13,14,49,22,15,23,24].…”
Section: Background: Differential Cryptanalysismentioning
confidence: 99%
See 4 more Smart Citations
“…A lot of research about Boolean functions and optimal resistance against DC have been done, in a totally unrealistic settings where small components of ciphers are studied in isolation regardless of how they are connected inside a cipher. This research leads to highly misleading results about types of strong or "optimal" S-boxes which [47,[50][51][52]13] are expected to protect ciphers against DC. In contrast in this paper we are going to make a rather very surprising claim that the security of a cipher such as GOST against DC does not depend that much on the S-boxes, but rather on the connections of the cipher, see Section 4 and [53,13,14,49,22,15,23,24].…”
Section: Background: Differential Cryptanalysismentioning
confidence: 99%
“…Reportedly, Don Coppersmith has explained that defending against DC had been a design goal when DES was designed in 1970s and after discussions with NSA it was decided this technique should be kept confidential, in the context of the "competitive advantage" the United States enjoyed (compared to other countries) in the field of cryptography, cf. [28,13].…”
Section: Background: Differential Cryptanalysismentioning
confidence: 99%
See 3 more Smart Citations