Improved attacks on full GOST

  • Authors:
  • Itai Dinur;Orr Dunkelman;Adi Shamir

  • Affiliations:
  • Computer Science Department, The Weizmann Institute, Rehovot, Israel;Computer Science Department, The Weizmann Institute, Rehovot, Israel,Computer Science Department, University of Haifa, Israel;Computer Science Department, The Weizmann Institute, Rehovot, Israel

  • Venue:
  • FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

GOST is a well known block cipher which was developed in the Soviet Union during the 1970's as an alternative to the US-developed DES. In spite of considerable cryptanalytic effort, until very recently there were no published single key attacks against its full 32-round version which were faster than the 2256 time complexity of exhaustive search. In February 2011, Isobe used the previously discovered reflection property in order to develop the first such attack, which requires 232 data, 264 memory and 2224 time. In this paper we introduce a new fixed point property and a better way to attack 8-round GOST in order to find improved attacks on full GOST: Given 232 data we can reduce the memory complexity from an impractical 264 to a practical 236 without changing the 2224 time complexity, and given 264 data we can simultaneously reduce the time complexity to 2192 and the memory complexity to 236.