ABSTRACT
In this paper we present results of algebraic analysis of GOST⌖ algorithm in SageMath environment. Using the GOST⌖ as the example we explore basic stages of algebraic analysis of any symmetric block cipher based on Feistel network. We construct sets of boolean equations for five encryption rounds and determine the number of known text pairs for which the key can be found with the probability of 1. The algebraic analysis of five rounds of GOST⌖ allowed to find a 160-bit encryption key with the probability of 1 for five known text pairs within 797.21 s; the search for the solution took 24.66 s.
- Sage tutorial. http://www.sagemath.org/.Google Scholar
- M. Albrecht and C. Cid. Algebraic techniques in differential cryptanalysis. In Fast Software Encryption, pages 193--208. Springer, 2009. Google ScholarDigital Library
- L. Babenko, E. Ishchukova, and E. Maro. Research about strength of gost 28147-89 encryption algorithm. In Proceedings of the Fifth International Conference on Security of Information and Networks, pages 138--142. ACM, 2012. Google ScholarDigital Library
- G. V. Bard, N. T. Courtois, and C. Jefferson. Efficient methods for conversion and solution of sparse systems of low-degree multivariate polynomials over gf (2) via sat-solvers. 2007.Google Scholar
- A. Biryukov and D. Wagner. Advanced slide attacks. In Advances in Cryptology -- EUROCRYPT 2000, pages 589--606. Springer, 2000. Google ScholarDigital Library
- C. Charnes, L. O'Connor, J. Pieprzyk, R. Safavi-Naini, and Y. Zheng. Comments on soviet encryption algorithm. In Advances in Cryptology -- EUROCRYPT'94, pages 433--438. Springer, 1994.Google Scholar
- N. T. Courtois and G. V. Bard. Algebraic cryptanalysis of the data encryption standard. In Cryptography and Coding, pages 152--169. Springer, 2007. Google ScholarDigital Library
- J.-C. Faugère and P.-J. Spaenlehauer. Algebraic cryptanalysis of the PKC'2009 algebraic surface cryptosystem. In Public Key Cryptography -- PKC 2010, pages 35--52. Springer, 2010. Google ScholarDigital Library
- A. Semenov, O. Zaikin, D. Bespalov, and M. Posypkin. Parallel Computing Technologies: 11th International Conference, PaCT 2011, Kazan, Russia, September 19-23, 2011. Proceedings, chapter Parallel Logical Cryptanalysis of the Generator A5/1 in BNB-Grid System, pages 473--483. Springer Berlin Heidelberg, Berlin, Heidelberg, 2011. Google ScholarDigital Library
- P. Sepehrdad. Statistical and algebraic cryptanalysis of lightweight and ultra-lightweight symmetric primitives. PhD thesis, École Polytechnique Fédérale de Lausanne, 2012.Google Scholar
- M. Soos. CryptoMiniSAT, v2.5.1, 2010.Google Scholar
- Technical Committee for Standardization "Cryptography and Security Mechanisms" (TC 26). GOST R 34.12-2015 "Information technology. Cryptographic data security. Block ciphers.".Google Scholar
- M. Wang, Y. Sun, N. Mouha, and B. Preneel. Algebraic techniques in differential cryptanalysis revisited. In Information Security and Privacy, pages 120--141. Springer, 2011. Google ScholarDigital Library
- Modeling of Algebraic Analysis of GOST+ Cipher in SageMath
Recommendations
Practical Algebraic Attacks on the Hitag2 Stream Cipher
ISC '09: Proceedings of the 12th International Conference on Information SecurityHitag2 is a stream cipher that is widely used in RFID car locks in the automobile industry. It can be seen as a (much) more secure version of the [in]famous Crypto-1 cipher that is used in MiFare Classic RFID products [14,20,15]. Recently, a ...
Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering
FDTC '14: Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in CryptographyGOST is a well-known block cipher as the official encryption standard for the Russian Federation. A special feature of GOST is that its eight S-boxes can be secret. However, most of the researches on GOST assume that the design of these S-boxes is ...
Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon
ICETE 2014: Proceedings of the 11th International Joint Conference on e-Business and Telecommunications - Volume 4Recently, two families of ultra-lightweight block ciphers were proposed, SIMON and SPECK, which come in a variety of block and key sizes (Beaulieu et al., 2013). They are designed to offer excellent performance for hardware and software implementations (...
Comments