Browse > Article
http://dx.doi.org/10.13089/JKIISC.2004.14.3.75

Related Key Differential Attacks on 32-Round GOST  

이태건 (고려대학교 정보보호기술연구센터)
고영대 (고려대학교 정보보호기술연구센)
홍석희 (고려대학교 정보보호기술연구센)
이상진 (고려대학교 정보보호대학원)
Abstract
In this paper, we present a related key differential attack on Full-round GOST Firstly, we present a distinguishing attack on full rounds of GOST, which can distinguish it from random oracle with probability 1- 64$2^{64}$ using a related key differential characteristic. We will also show that H. Seki et al.'s idea can be applied to attack on 31 rounds of GOST combining our related key differential characteristic. Lastly, we propose a related key differential attack on full rounds of GOST. In this attack we can recover 12 bits of the master key with $2^{35}$ chosen plaintexts and $2^{36}$ encryption times for the 91.7% expectation of success rate.
Keywords
Related bey differential attack; Distinguishing attack; GOST; Diffential Characteristic;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Truncated and Higher Order Differenctial /
[ L.Knudsen ] / Fast Software Encryption Second International Workshop Proceedings(FSE'94) of Lecture Notes of Computer Science
2 On Probability of Success in Linear and Differential Cryptanalysis /
[ A.Selcuk;A.Bicak ] / Third International Conference SCN 2002 of Lecture Notes of Computer Science
3 Key Schedule Cryptanalysis of IDEA, G-DES, GOST. SAFER and Triple-DES /
[ J.Kelsey;B.Schneier;D.Wagner ] / Advances in Cryptology CRYPTO'96 of Lecture Notes of Computer Science   DOI
4 New Types of Cryptanalytic Attacks Using Related Keys /
[ E.Biham ] / Advances in Cryptology-EUROCRYPT'93
5 /
[ National Bureau of Standards ] / Data Encryption Standard
6 Differential Cryptanalysis of Reduced Rounds of GOST /
[ H.Seki;T.Kaneko ] / Seventh Annual Workshop on Selected Areas in Cryptography(SAC'00) of Lecture Notes of Computer Science   DOI
7 Linear and Differential Cryptanalysis of Russian GOST /
[ Vitaly,V.Shorin;Vadim,V.Jelezniakov;Ernst,M.Gabidulin ] / Electronics Notes in Discrete Mathematics
8 /
[ B.Schneier ] / Applied Cryptography
9 /
[ E.Biham;A.Shamir ] / Differential Cryptanalysis of the Data Encryption Standard
10 Cryptographic Protection for Data Processing Systems /
[ GOST ] / Gosudarstvennyi Standard 2814789, Government Committee of the USSR for Standards