A Single-Key Attack on the Full GOST Block Cipher

被引:16
|
作者
Isobe, Takanori [1 ]
机构
[1] Sony Corp, Minato Ku, Tokyo 1080075, Japan
关键词
Block cipher; GOST; Single-key attack; Reflection attack; Meet-in-the-middle attack; Equivalent keys; THE-MIDDLE ATTACKS; CRYPTANALYSIS;
D O I
10.1007/s00145-012-9118-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The GOST block cipher is the Russian encryption standard published in 1989. In spite of considerable cryptanalytic efforts over the past 20 years, a key recovery attack on the full GOST block cipher without any key conditions (e.g., weak keys and related keys) has not been published yet. In this paper, we show the first single-key attack, which works for all key classes, on the full GOST block cipher. To begin, we develop a new attack framework called Reflection-Meet-in-the-Middle Attack. This approach combines techniques of the reflection attack and the meet-in-the-middle (MITM) attack. Then we apply it to the GOST block cipher employing bijective S-boxes. In order to construct the full-round attack, we use additional novel techniques which are the effective MITM techniques using equivalent keys on a small number of rounds. As a result, a key can be recovered with a time complexity of 2(225) encryptions and 2(32) known plaintexts. Moreover, we show that our attack is applicable to the full GOST block cipher using any S-boxes, including non-bijective S-boxes.
引用
收藏
页码:172 / 189
页数:18
相关论文
共 50 条
  • [41] Cryptanalysis of the Full MMB Block Cipher
    Wang, Meiqin
    Nakahara, Jorge, Jr.
    Sun, Yue
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5867 : 231 - +
  • [42] Cryptanalysis of full skipjack block cipher
    Phan, RCW
    ELECTRONICS LETTERS, 2002, 38 (02) : 69 - 71
  • [43] First differential attack on full 32-round GOST
    University College London, Gower Street, London, United Kingdom
    不详
    Lect. Notes Comput. Sci., (216-227):
  • [44] Impossible Boomerang Attack for Block Cipher Structures
    Choy, Jiali
    Yap, Huihui
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 22 - 37
  • [45] Differential Attack With Constants On μ2 Block Cipher
    Shi, Jiali
    Li, Chao
    Liu, Guoqiang
    COMPUTER JOURNAL, 2024, 67 (01): : 195 - 209
  • [46] Differential fault attack on Zorro block cipher
    Shi, Danping
    Hu, Lei
    Song, Ling
    Sun, Siwei
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) : 2826 - 2835
  • [47] Truncated Differential Attack on Block Cipher PRINCE
    Setoguchi, Satoshi
    Igarashi, Yasutaka
    Kaneko, Toshinobu
    Arai, Kenichi
    Fukushima, Seiji
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 466 - 474
  • [48] Differential Fault Attack on SKINNY Block Cipher
    Vafaei, Navid
    Bagheri, Nasour
    Saha, Sayandeep
    Mukhopadhyay, Debdeep
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2018, 2018, 11348 : 177 - 197
  • [49] Differential Fault Attack on ITUbee Block Cipher
    Fu, Shan
    Xu, Guoai
    Pan, Juan
    Wang, Zongyue
    Wang, An
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (02)
  • [50] A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock
    Minier, Marine
    Naya-Plasencia, Maria
    INFORMATION PROCESSING LETTERS, 2012, 112 (16) : 624 - 629