2015
DOI: 10.1080/01611194.2014.988362
|View full text |Cite
|
Sign up to set email alerts
|

On Multiple Symmetric Fixed Points in GOST

Abstract: In this article the author revisits the oldest attack on GOST known, the Kara Reflection attack, and another totally unrelated truncated differential attack by Courtois and Misztal. It is hard to imagine that there could be any relationship between two so remote attacks which have nothing in common. However, there is one: Very surprisingly, both properties can be combined and lead the fastest attack on GOST ever found, which is nearly feasible to execute in practice.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
11
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 17 publications
0
11
0
Order By: Relevance
“…Basically the cost of computing the first 3+ and the last 3+ rounds of GOST can be neglected. More precisely it will be amortized in 2 20 sub-cases of the 2 96 cases, in which we just need to evaluate 4 S-boxes in round 3 and 4 S-boxes in round 30, which is roughly feasible to do in most an equivalent of 1 round of GOST. Therefore we estimate that we need only about 2 116+64 · 8 CPU clocks, which could be seen as an equivalent of roughly about 2 174 GOST encryptions.…”
Section: Attack Stage 1 -First 4 and Last 4 Roundsmentioning
confidence: 99%
See 4 more Smart Citations
“…Basically the cost of computing the first 3+ and the last 3+ rounds of GOST can be neglected. More precisely it will be amortized in 2 20 sub-cases of the 2 96 cases, in which we just need to evaluate 4 S-boxes in round 3 and 4 S-boxes in round 30, which is roughly feasible to do in most an equivalent of 1 round of GOST. Therefore we estimate that we need only about 2 116+64 · 8 CPU clocks, which could be seen as an equivalent of roughly about 2 174 GOST encryptions.…”
Section: Attack Stage 1 -First 4 and Last 4 Roundsmentioning
confidence: 99%
“…This paper does NOT cover the whole spectrum of what differential properties can bring in terms interesting or/and efficient attacks on GOST. In this paper we do not consider multiple key attacks [17,19,26,20, 39] and we do not try to develop or at more advanced "combination" attacks which combine the complexity reduction approach based on high-level self-similarity of [26,19,9] with advanced differential properties with 2,3 and 4 points, [26,20]. This paper is essentially a technical paper on simple yet highly-optimized truncated differential attacks in a single key scenario.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations