2008
DOI: 10.1007/978-3-540-89754-5_23
|View full text |Cite
|
Sign up to set email alerts
|

Reflection Cryptanalysis of Some Ciphers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0
1

Year Published

2010
2010
2019
2019

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(33 citation statements)
references
References 31 publications
0
32
0
1
Order By: Relevance
“…It is therefore very important to notice that in addition to the very long bit keys GOST has a much lower implementation cost than AES or any other comparable encryption algorithm. For example in hardware GOST 256 bits requires less than 800 GE, while AES-128 requires 3100 GE, see [22]. Thus it is not surprising that GOST became an Internet standard, it is part of many crypto libraries such as OpenSSL [20], and is increasingly popular also outside its country of origin [23].…”
Section: Gost and Iso Standardisationmentioning
confidence: 99%
“…It is therefore very important to notice that in addition to the very long bit keys GOST has a much lower implementation cost than AES or any other comparable encryption algorithm. For example in hardware GOST 256 bits requires less than 800 GE, while AES-128 requires 3100 GE, see [22]. Thus it is not surprising that GOST became an Internet standard, it is part of many crypto libraries such as OpenSSL [20], and is increasingly popular also outside its country of origin [23].…”
Section: Gost and Iso Standardisationmentioning
confidence: 99%
“…The reflection property which was first described in [7], where it was used to attack 30 rounds of GOST (and 2 224 weak keys of the full GOST). This property was later exploited in [6] to attack the full GOST for all keys.…”
Section: Overview Of Our New Attacks On the Full Gostmentioning
confidence: 99%
“…As a result, DES was broken theoretically (by using differential and linear techniques) and practically (by using special purpose hardware) about 20 years ago, whereas all the single key attacks [1,7,13] published before 2011 were only applicable to reduced-round versions of the cipher. 1 The first single key attack on the full 32-round version of GOST was published by Takanori Isobe at FSE'11 [6].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Так в работах [1] - [3] приведены сдвиговые атаки, основанные на слабостях алгоритма развертывания ключа и раундовой функции. В работах [4] и [5] предложены атаки на основе метода отражений, а в работах [6] - [9] -атаки на основе алгебраического и разностного ме-тодов. К шифрсистеме ГОСТ 28147-89 применялась также атака на основе метода встречи посередине [10].…”
Section: Introductionunclassified