A Single-Key Attack on the Full GOST Block Cipher

被引:16
|
作者
Isobe, Takanori [1 ]
机构
[1] Sony Corp, Minato Ku, Tokyo 1080075, Japan
关键词
Block cipher; GOST; Single-key attack; Reflection attack; Meet-in-the-middle attack; Equivalent keys; THE-MIDDLE ATTACKS; CRYPTANALYSIS;
D O I
10.1007/s00145-012-9118-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The GOST block cipher is the Russian encryption standard published in 1989. In spite of considerable cryptanalytic efforts over the past 20 years, a key recovery attack on the full GOST block cipher without any key conditions (e.g., weak keys and related keys) has not been published yet. In this paper, we show the first single-key attack, which works for all key classes, on the full GOST block cipher. To begin, we develop a new attack framework called Reflection-Meet-in-the-Middle Attack. This approach combines techniques of the reflection attack and the meet-in-the-middle (MITM) attack. Then we apply it to the GOST block cipher employing bijective S-boxes. In order to construct the full-round attack, we use additional novel techniques which are the effective MITM techniques using equivalent keys on a small number of rounds. As a result, a key can be recovered with a time complexity of 2(225) encryptions and 2(32) known plaintexts. Moreover, we show that our attack is applicable to the full GOST block cipher using any S-boxes, including non-bijective S-boxes.
引用
收藏
页码:172 / 189
页数:18
相关论文
共 50 条
  • [21] BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption
    Iwata, Tetsu
    Yasuda, Kan
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5867 : 313 - +
  • [22] Full-round impossible differential attack on shadow block cipher
    Yuting Liu
    Yongqiang Li
    Huiqin Chen
    Mingsheng Wang
    Cybersecurity, 6
  • [23] Full-round impossible differential attack on shadow block cipher
    Liu, Yuting
    Li, Yongqiang
    Chen, Huiqin
    Wang, Mingsheng
    CYBERSECURITY, 2023, 6 (01)
  • [24] Known-Key Attack on SM4 Block Cipher
    Kang, HyungChul
    Hong, Deukjo
    Sung, Jaechul
    Hong, Seokhie
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (12): : 2985 - 2990
  • [25] Meet-in-the-Middle Key Recovery Attacks on a Single-Key Two-Round Even-Mansour Cipher
    Isobe, Takanori
    Shibutani, Kyoji
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01): : 17 - 26
  • [26] Related-key rectangle attack on 36 rounds of the XTEA block cipher
    Lu, Jiqiang
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (01) : 1 - 11
  • [27] A simple power analysis attack against the key schedule of the Camellia block cipher
    Xiao, L
    Heys, HM
    INFORMATION PROCESSING LETTERS, 2005, 95 (03) : 409 - 412
  • [28] Related-key rectangle attack on 36 rounds of the XTEA block cipher
    Jiqiang Lu
    International Journal of Information Security, 2009, 8 : 1 - 11
  • [29] Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration
    Kosuge, Haruhisa
    Tanaka, Hidema
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2017, 2017, 10239 : 95 - 113
  • [30] Saturation Attack on the Block Cipher HIGHT
    Zhang, Peng
    Sun, Bing
    Li, Chao
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 76 - 86