×

zbMATH — the first resource for mathematics

Linear and differential cryptanalysis of Russian GOST. (English) Zbl 0985.94035
Augot, Daniel (ed.) et al., WCC2001 international workshop on coding and cryptography. Paris, France, January 8-12, 2001. Amsterdam: Elsevier, Electron. Notes Discrete Math. 6, no pag., electronic only (2001).
Summary: The linear cryptanalysis and the differential cryptanalysis of the Russian GOST encryption algorithm are carried out. It is shown that GOST is secure against the linear cryptanalysis after five rounds and against the differential cryptanalysis after seven rounds. The differential analysis algorithm of the three round GOST is given. Also criteria for selection of the substitution boxes with provable security against linear cryptanalysis are given.
For the entire collection see [Zbl 0968.00023].

MSC:
94A60 Cryptography
PDF BibTeX XML Cite
References:
[1] GOST 28147–89, ”Cryptographic Protection for Data Processing Systems,” Government Committee of the USSR for Standards”, 1989
[2] GOST R 34.11–94, ”Information technology. Cryptographic Data Security. Hashing function.” Government Committee of the Russia for Standards, 1994
[3] A. Yu. Scherbakov ”An Introduction to Cryptographic Approach to Information Security Problem” (Class Notes, MIPT, 1998).
[4] Biham, E.; Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. Journal of cryptology, vol 4, No. no. 1, 3-72 (1991) · Zbl 0729.68017
[5] E. Biham and A. Shamir, ”Differential Cryptanalysis of FEAL and N-Hash”, Advances in Cryptology - EUROCRYPT’91, Proceedings, LNCS 547, pp. 1–16, Springer-Verlag, Berlin 1991 · Zbl 0777.94012
[6] E. Biham and A. Shamir, ”Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer”, Advances in Cryptology - CRYPTO’91, Proceedings, LNCS 576, pp. 156–171, Springer-Verlag, Berlin 1992
[7] E. Biham and A. Shamir, ”Differential Cryptanalysis of the full 16-round DES”, Preliminary manuscript, December 19, 1991 · Zbl 0809.94017
[8] M. Matsui, ”Linear Cryptanalysis Method for DES Cipher,” Advances in Cryptology—EUROCRYPT’93 Proceedings, Sprinter-Verlag, 1994, pp. 386–397. · Zbl 0951.94519
[9] M. Matsui, ”New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis”, (The 3rd) Fast Software Encryption, Cambridge Security Workshop, Feb. 1996 · Zbl 1373.94925
[10] Schneier, B.: Applied cryptography. (1996) · Zbl 0883.94001
[11] V.V. Shorin, V.V. Jelezniakov, E.M. Gabidulin ”Security of algorithm GOST 28147–89” (in Russian), XLIII MIPT Science Conference, December 8–9, 2000, Abstracts
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.