Improved Attacks on Full GOST
Itai Dinur1, Orr Dunkelman1,2 and Adi Shamir1
1The Weizmann Institute, Israel 2University of Haifa, Israel
Improved Attacks on Full GOST Itai Dinur 1 , Orr Dunkelman 1,2 and - - PowerPoint PPT Presentation
Improved Attacks on Full GOST Itai Dinur 1 , Orr Dunkelman 1,2 and Adi Shamir 1 1 The Weizmann Institute, Israel 2 University of Haifa, Israel GOST Designed by Soviet cryptographers in the 1980 s Motivated by the desire to construct an
Itai Dinur1, Orr Dunkelman1,2 and Adi Shamir1
1The Weizmann Institute, Israel 2University of Haifa, Israel
to DES
K1,K2,…,K8,K1,K2,…,K8,K1,K2,…K8 ,K8,K7,…,K1
full GOST
(Kara 2008)
Russian banks
discovered by Courtois’11)
round GOST given 2 input-output pairs
two sides of Y are equal
information
(independently discovered by Courtois’11)
pairs (the full codebook)
point occurs with probability c
least 2128
full GOST with the same parameters as Isobe’s
attack
the outer loop:
attack
LOG(M) LOG(T) 64 19 256 236 224 36
I’11
232 data
192 204
264 data
C’11
full GOST with the same parameters as Isobe’s
for Y and Y* in a sorted list
O I Y
K1-K4 K5-K8
O* I* Y*
full GOST with the same parameters as Isobe’s
(I,Y) in time 264
stored in the lists
O I Y
K1-K4 K5-K8
O* I* Y*
The 4-Round Attack
suggestions for K1-K4
O I Y
K1-K4 K5-K8
full GOST with the same parameters as Isobe’s
key
O I Y
K1-K4 K5-K8
O* I* Y*
subset of the key bits
number of additional key bits
the block cipher
smallest number of bits in each layer
S-GOST
K1
S1
K2
S4
bit chunks
evaluating 4 state bits from both sides
basically the same and is called an iteration
12 12
K1
S1
K2
S4
bits
their natural order
iteration
known
the first iteration
S2 S5
Real GOST
Complexity Analysis
all)
full GOST with the same parameters as Isobe’s
Determine" attack with knowledge of 82 out of 128 bit of Y and Y*
O I Y
K1-K4 (top part) K5-K8 (bottom part)
O* I* Y*
partial 4-round attacks
requires (282 times)
partial attacks to suggestions for the 4-round keys
K1-K4 K5-K8 Top MITM Bottom MITM
Y,Y*
parts to obtain suggestions for the full key using a final MITM attack
round attacks
are executed 282 times
K1-K4 K5-K8 Top MITM Bottom MITM Joint MITM
Y,Y*
the bottleneck
the 2128 time complexity of the attack
top and bottom keys which we need to store
K1-K4 K5-K8 Top MITM Bottom MITM Joint MITM
Y,Y*
Courtois)
based attacks