Skip to main content

Fixed Points of Special Type and Cryptanalysis of Full GOST

  • Conference paper
Cryptology and Network Security (CANS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7712))

Included in the following conference series:

Abstract

GOST, the Russian encryption standard, is a block cipher of 64-bit block and 256-bit key size and consists of 32 rounds. In this work, we show that the probability that the GOST permutations produced through random keys have at least one fixed point and exactly two fixed points of special type are twice and five times more than those of random permutations respectively. We utilize this property of GOST to mount a new reflection attack on full GOST.

The reflection property on GOST was defined and exploited to mount an attack on the full cipher by Kara [7] which was successful only for one out of 232 keys. This property has been further studied by Courtois [1], Dinur et al. [5] and Isobe [6]. Isobe mounted an attack that works for any key with a time complexity of 2225 [6]. Isobe’s attack was improved by Dinur et al. reducing the time complexity to 2192 using the whole codebook [5]. They introduce a new version of the meet-in-the-middle technique which they call ”2-dimensional meet in the middle (2DMITM)” attack. Their attack is based on applying 2DMITM attack on 8-round GOST 264 times. In this work, we mount an attack with time complexity of 2129 using 232 chosen plaintexts instead of the whole codebook utilizing the 2DMITM attack. The main advantages of our attack is that we mount the 2DMITM attack on 8-round GOST only twice. On the other hand, our attack works only for the weak key set of 2192 keys, which indicates that the security level of full GOST is equivalent to 129 bits for these keys. In addition, we have computed the success rates of Kara attack in [7] and our attack. We have verified our calculations experimentally.

We would like to thank Nicolas Courtois for proposing this title to us.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Courtois, N.T.: Algebraic Complexity Reduction and Cryptanalysis of GOST. IACR Cryptology ePrint Archive, 2011:626 (2011)

    Google Scholar 

  2. Courtois, N.T., Misztal, M.: Differential Cryptanalysis of GOST. IACR Cryptology ePrint Archive, 2011:312 (2011)

    Google Scholar 

  3. Courtois, N.T.: A Differential Attack on Full GOST. IACR Cryptology ePrint Archive, 2012:138 (2012)

    Google Scholar 

  4. Courtois, N.T.: Security Evaluation of GOST 28147-89 in View of International Standardisation. Cryptologia 36(1), 2–13 (2012)

    Article  MathSciNet  Google Scholar 

  5. Dinur, I., Dunkelman, O., Shamir, A.: Improved Attacks on Full GOST. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol. 7549, pp. 9–28. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  6. Isobe, T.: A Single-Key Attack on the Full GOST Block Cipher. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 290–305. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  7. Kara, O.: Reflection Cryptanalysis of Some Ciphers. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 294–307. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  8. Zabotin, I.A., Glazkov, G.P., Isaeva, V.B.: Cryptographic Protection for Information Processing Systems. Cryptographic Transformation Algorithm. Government Standard of the USSR, GOST 28147-89 (1989)

    Google Scholar 

  9. Zhu, B., Gong, G.: Multidimensional Meet-in-the-Middle Attack and Its Applications to GOST, KTANTAN and Hummingbird-2. Cryptology ePrint Archive, Report 2011/619 (2011), http://eprint.iacr.org/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kara, O., Karakoç, F. (2012). Fixed Points of Special Type and Cryptanalysis of Full GOST. In: Pieprzyk, J., Sadeghi, AR., Manulis, M. (eds) Cryptology and Network Security. CANS 2012. Lecture Notes in Computer Science, vol 7712. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35404-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35404-5_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35403-8

  • Online ISBN: 978-3-642-35404-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics