A Single-Key Attack on the Full GOST Block Cipher

被引:16
|
作者
Isobe, Takanori [1 ]
机构
[1] Sony Corp, Minato Ku, Tokyo 1080075, Japan
关键词
Block cipher; GOST; Single-key attack; Reflection attack; Meet-in-the-middle attack; Equivalent keys; THE-MIDDLE ATTACKS; CRYPTANALYSIS;
D O I
10.1007/s00145-012-9118-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The GOST block cipher is the Russian encryption standard published in 1989. In spite of considerable cryptanalytic efforts over the past 20 years, a key recovery attack on the full GOST block cipher without any key conditions (e.g., weak keys and related keys) has not been published yet. In this paper, we show the first single-key attack, which works for all key classes, on the full GOST block cipher. To begin, we develop a new attack framework called Reflection-Meet-in-the-Middle Attack. This approach combines techniques of the reflection attack and the meet-in-the-middle (MITM) attack. Then we apply it to the GOST block cipher employing bijective S-boxes. In order to construct the full-round attack, we use additional novel techniques which are the effective MITM techniques using equivalent keys on a small number of rounds. As a result, a key can be recovered with a time complexity of 2(225) encryptions and 2(32) known plaintexts. Moreover, we show that our attack is applicable to the full GOST block cipher using any S-boxes, including non-bijective S-boxes.
引用
收藏
页码:172 / 189
页数:18
相关论文
共 50 条
  • [31] Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting
    Abdelkhalek, Ahmed
    Tolba, Mohamed
    Youssef, Amr M.
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 139 - 150
  • [32] Slide Attack on Full-Round ULC Lightweight Block Cipher Designed for IoT
    Zhang, Kai
    Lai, Xuejia
    Wang, Lei
    Guan, Jie
    Hu, Bin
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [33] The (related-key) impossible boomerang attack and its application to the AES block cipher
    Jiqiang Lu
    Designs, Codes and Cryptography, 2011, 60 : 123 - 143
  • [34] The (related-key) impossible boomerang attack and its application to the AES block cipher
    Lu, Jiqiang
    DESIGNS CODES AND CRYPTOGRAPHY, 2011, 60 (02) : 123 - 143
  • [35] On the security of the block cipher GOST suitable for the protection in U-business services
    Jongsung Kim
    Personal and Ubiquitous Computing, 2013, 17 : 1429 - 1435
  • [36] Cryptanalysis of full PRIDE block cipher
    Yibin DAI
    Shaozhen CHEN
    Science China(Information Sciences), 2017, 60 (05) : 169 - 180
  • [37] Cryptanalysis of full PRIDE block cipher
    Dai, Yibin
    Chen, Shaozhen
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (05)
  • [38] On the security of the block cipher GOST suitable for the protection in U-business services
    Kim, Jongsung
    PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (07) : 1429 - 1435
  • [39] A Single-Key Variant of LightMAC_Plus
    Song, Haitao
    SYMMETRY-BASEL, 2021, 13 (10):
  • [40] First Differential Attack on Full 32-Round GOST
    Courtois, Nicolas T.
    Misztal, Michal
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 216 - +