Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2070425.2070437acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Algebraic analysis of GOST encryption algorithm

Published: 14 November 2011 Publication History

Abstract

This paper is devoted to the investigation of GOST algorithm with regard to its resistance against algebraic cryptanalysis. GOST algorithm is a state standard of Russian Federation. Its characteristic feature is the use of variable S-blocks and simple mathematical operations. It is considered that any initial values of S-blocks provide enough strength to resist any attacks. The general idea of algebraic analysis is based on the representation of initial encryption algorithm as a system of multivariate quadratic equations, which define relations between a secret key and a cipher text. Extended linearization method is evaluated as a method for solving the nonlinear system of equations.
The most challenging problem of the analysis is caused by addition modulo 2n in GOST. In order to make the analysis simpler we have considered a simplified scheme for GOST, in which the operation of addition modulo 2n is replaced by the addition modulo 2 (denoted as GOST+). We have proposed an analysis algorithm of GOST according to experimental data.
The research has shown that 32-round GOST is described by a system of 5376 quadratic equations, which characterize dependencies between inputs and outputs of S-blocks. The total number of variables is 2048 and the system contains 9472 monomials. Generation of the system for a single-round GOST demands circa 14 hours (with AMD Athlon X2DualCore processor 3800+, 1Gb RAM).

References

[1]
Shannon C.E. Communication theory of secret systems. Bell System Technical Journal 28, 704 (1949)
[2]
Nicolas Courtois, Gregory V. Bard: Algebraic Cryptanalysis of the Data Encryption Standard, In 11-th IMA Conference, Cirencester, UK, 18--20 December 2007, Springer LNCS 4887.
[3]
Patarin J. Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): two new families of Asymmetric Algorithms; in Eurocrypt'96, Springer Verlag, pp. 33--48.
[4]
Nicolas Courtois and Josef Pieprzyk, Cryptanalysis of Block Ciphers with Overdefined Systems of Equations In Yuliang Zheng, editor, ASIACRYPT 2002, volume 2501 of Lecture Notes in Computer Science, pages 267--287. Springer, 2002.
[5]
Bruno Buchberger. Ein Algorithmus zum Auffinden der Basiselemente des Restklassenringes nach einem nulldimensionalen Polynomideal. PhDthesis, 1965.
[6]
Jean-Charles Faugère, A new efficient algorithm for computing Gröbner bases (F4), Journal of Pure and Applied Algebra 139 (1999) pp. 61--88.
[7]
Jean-Charles Faugère, A new efficient algorithm for computing Gröbner basis without reduction to 0 F5, In T. Mora, editor, Proceeding of ISSAC, pages 75--83, ACM Press, July 2002.
[8]
A.Kipnis, A. Shamir. Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. Crypto99, LNCS 142,144. Springer-Verlag, pp.19--31.
[9]
L. Babenko, E. Ishchukova, Differential Analysis GOST Encryption Algorithm // Proceedings of the 3rd International Conference of Security of Information and Networks (SIN 2010), p.149--157. ACM, New York, 2010.
[10]
A. Biryukov and D. Wagner. Advanced Slide Attacks. In Proc. EUROCRYPT 2000, LNCS 1807, pp.589--606, Springer, 2000.
[11]
Orhun Kara. Reflection Attacks on Product Ciphers. Cryptology ePrint Archive, Report 2007/043, 2007. http://eprint.iacr.org/
[12]
Nicolas Courtois and Blandine Debraize: Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0., In ICICS 2008, 10th International Conference on Information and Communications Security, 20 - 22 October, 2008, Birmingham, UK. In LNCS 5308, pp. 328--344, Springer, 2008.
[13]
N. Courtois, A. Klimov, J. Patarin, A. Shamir. Efficient Algorithms for solving Overdefined System of Multivariate Polynomial Equations. Eurocrypt'2000, LNCS 1807. Springer-Verlag, pp. 392--407.

Cited By

View all
  • (2014)Algebraic Cryptanalysis of GOST Encryption AlgorithmJournal of Computer and Communications10.4236/jcc.2014.2400202:04(10-17)Online publication date: 2014
  • (2013)GOST Encryption Algorithm and Approaches to its AnalysisTheory and Practice of Cryptography Solutions for Secure Information Systems10.4018/978-1-4666-4030-6.ch002(34-61)Online publication date: 2013
  • (2012)Research about strength of GOST 28147-89 encryption algorithmProceedings of the Fifth International Conference on Security of Information and Networks10.1145/2388576.2388595(138-142)Online publication date: 25-Oct-2012

Index Terms

  1. Algebraic analysis of GOST encryption algorithm

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SIN '11: Proceedings of the 4th international conference on Security of information and networks
    November 2011
    276 pages
    ISBN:9781450310208
    DOI:10.1145/2070425
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • SDU: Suleyman Demirel University
    • AOARD: Asian Office of Aerospace Research and Development
    • RDECOM: U.S. Army Research, Development and Engineering Command
    • US Army ITC-PAC Asian Research Office
    • AFOSR: AFOSR
    • ONRGlobal: U.S. Office of Naval Research Global
    • Macquarie University-Sydney

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 November 2011

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. algebraic cryptanalysis
    2. extended linearization method
    3. gaussian elimination
    4. gost
    5. gost+
    6. s-box
    7. systems of multivariate quadratic equations

    Qualifiers

    • Research-article

    Conference

    SIN 2011

    Acceptance Rates

    Overall Acceptance Rate 102 of 289 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 22 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2014)Algebraic Cryptanalysis of GOST Encryption AlgorithmJournal of Computer and Communications10.4236/jcc.2014.2400202:04(10-17)Online publication date: 2014
    • (2013)GOST Encryption Algorithm and Approaches to its AnalysisTheory and Practice of Cryptography Solutions for Secure Information Systems10.4018/978-1-4666-4030-6.ch002(34-61)Online publication date: 2013
    • (2012)Research about strength of GOST 28147-89 encryption algorithmProceedings of the Fifth International Conference on Security of Information and Networks10.1145/2388576.2388595(138-142)Online publication date: 25-Oct-2012

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media