2014
DOI: 10.1080/01611194.2014.915706
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of Two GOST Variants with 128-Bit Keys

Abstract: GOST is a well-known Russian encryption standard. Until 2010, no researcher found a single-key attack on GOST. In 2010, GOST was submitted to ISO 18033 to become a worldwide industrial encryption standard. Since 2011, many attacks on GOST faster than brute force have been found [3,4,5,10,12].By default, GOST has 256-bit keys. However, in many applications 128-bit keys are required. The authors should note that GOST is an exceptionally economical cipher in implementation: Even as a 128-bit cipher, GOST requires… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…This paper does NOT cover the whole spectrum of what differential properties can bring in terms interesting or/and efficient attacks on GOST. In this paper we do not consider multiple key attacks [17,19,26,20, 39] and we do not try to develop or at more advanced "combination" attacks which combine the complexity reduction approach based on high-level self-similarity of [26,19,9] with advanced differential properties with 2,3 and 4 points, [26,20]. This paper is essentially a technical paper on simple yet highly-optimized truncated differential attacks in a single key scenario.…”
Section: Introductionmentioning
confidence: 99%
“…This paper does NOT cover the whole spectrum of what differential properties can bring in terms interesting or/and efficient attacks on GOST. In this paper we do not consider multiple key attacks [17,19,26,20, 39] and we do not try to develop or at more advanced "combination" attacks which combine the complexity reduction approach based on high-level self-similarity of [26,19,9] with advanced differential properties with 2,3 and 4 points, [26,20]. This paper is essentially a technical paper on simple yet highly-optimized truncated differential attacks in a single key scenario.…”
Section: Introductionmentioning
confidence: 99%