A Single-Key Attack on the Full GOST Block Cipher

被引:0
|
作者
Takanori Isobe
机构
[1] Sony Corporation,
来源
Journal of Cryptology | 2013年 / 26卷
关键词
Block cipher; GOST; Single-key attack; Reflection attack; Meet-in-the-middle attack; Equivalent keys;
D O I
暂无
中图分类号
学科分类号
摘要
The GOST block cipher is the Russian encryption standard published in 1989. In spite of considerable cryptanalytic efforts over the past 20 years, a key recovery attack on the full GOST block cipher without any key conditions (e.g., weak keys and related keys) has not been published yet. In this paper, we show the first single-key attack, which works for all key classes, on the full GOST block cipher. To begin, we develop a new attack framework called Reflection-Meet-in-the-Middle Attack. This approach combines techniques of the reflection attack and the meet-in-the-middle (MITM) attack. Then we apply it to the GOST block cipher employing bijective S-boxes. In order to construct the full-round attack, we use additional novel techniques which are the effective MITM techniques using equivalent keys on a small number of rounds. As a result, a key can be recovered with a time complexity of 2225 encryptions and 232 known plaintexts. Moreover, we show that our attack is applicable to the full GOST block cipher using any S-boxes, including non-bijective S-boxes.
引用
收藏
页码:172 / 189
页数:17
相关论文
共 50 条
  • [1] A Single-Key Attack on the Full GOST Block Cipher
    Isobe, Takanori
    FAST SOFTWARE ENCRYPTION (FSE 2011), 2011, 6733 : 290 - 305
  • [2] A Single-Key Attack on the Full GOST Block Cipher
    Isobe, Takanori
    JOURNAL OF CRYPTOLOGY, 2013, 26 (01) : 172 - 189
  • [3] A compress slide attack on the full GOST block cipher
    Lu, Linzhen
    Chen, Shaozhen
    INFORMATION PROCESSING LETTERS, 2013, 113 (17) : 634 - 639
  • [4] Improved Single-Key Attacks on 2-GOST
    Zheng, Qiuhua
    Hu, Yinhao
    Pei, Tao
    Xu, Shengwang
    Yu, Junzhe
    Wu, Ting
    Shen, Yanzhao
    Zeng, Yingpei
    Cui, Tingting
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020 (2020)
  • [5] Single-Key Attack on Full-Round Shadow Designed for IoT Nodes
    Zhang, Yuhan
    Wu, Wenling
    Zhang, Lei
    Zheng, Yafei
    IEEE TRANSACTIONS ON COMPUTERS, 2024, 73 (12) : 2776 - 2790
  • [6] Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher
    Fleischmann, Ewan
    Gorski, Michael
    Lucks, Stefan
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 298 - 309
  • [7] Low-Complexity Key Recovery Attacks on GOST Block Cipher
    Courtois, Nicolas T.
    CRYPTOLOGIA, 2013, 37 (01) : 1 - 10
  • [8] General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher
    Lin, Li
    Wu, Wenling
    Wang, Yanfeng
    Zhang, Lei
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 203 - 223
  • [9] Integral Attack on the Full FUTURE Block Cipher
    Xu, Zeyu
    Cui, Jiamin
    Hu, Kai
    Wang, Meiqin
    TSINGHUA SCIENCE AND TECHNOLOGY, 2025, 30 (01): : 161 - 170
  • [10] What is the effective key length for a block cipher: an attack on every practical block cipher
    Huang JiaLin
    Lai XueJia
    SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (07) : 1 - 11