Institutional Research Information Service
UCL Logo
Please report any queries concerning the funding data grouped in the sections named "Externally Awarded" or "Internally Disbursed" (shown on the profile page) to your Research Finance Administrator. Your can find your Research Finance Administrator at http://www.ucl.ac.uk/finance/research/post_award/post_award_contacts.php by entering your department
Please report any queries concerning the student data shown on the profile page to:

Email: portico-services@ucl.ac.uk

Help Desk: http://www.ucl.ac.uk/ras/portico/helpdesk
Publication Detail
Security Evaluation of GOST 28147-89 In View Of International Standardisation
  • Publication Type:
    Journal article
  • Publication Sub Type:
  • Authors:
  • Publisher:
    Taylor & Francis, Inc.
  • Publication date:
  • Place of publication:
    Bristol, PA, USA
  • Pagination:
    2, 13
  • Journal:
  • Volume:
  • Issue:
    Issue 1
  • Editors:
    Bauer C
  • Status:
  • Country:
  • Print ISSN:
  • Language:
  • Keywords:
    Block ciphers, Feistel schemes, key scheduling, self-similarity, reflection attacks, single-key attacks, algebraic attacks, algebraic complexity reduction, black-box reductions
GOST 28147-89 is the Russian equivalent of 3DES and AES. In 2010 GOST was submitted to ISO 18033, to also become a worldwide indus- trial encryption standard. Until 2011 researchers agreed that: "despite considerable cryptanalytic e®orts spent in the past 20 years, GOST is still not broken". Then in 2011 an attack was found. In this short paper we describe another attack, to illustrate the fact that there are now attacks on GOST, which require much less memory, and doesn't even require the re°ection property to hold. More generally, our ambition is to do more than just to point out that a major encryption standard is °awed. We would like to present and suggest a new general paradigm for e®ective symmetric cryptanalysis of so called "Black-box Algebraic Complexity Reduction". This new paradigm builds on many already known attacks on symmetric ciphers, such as ¯xed point, slide, involution, cycling and other self-similarity attacks but the exact attacks we obtain, could never be developed previously, because only in the recent 5 years it became possible to show the existence of an appropriate last step for many such attacks, which is a low data complexity software algebraic attack.
Publication data is maintained in RPS. Visit https://rps.ucl.ac.uk
 More search options
UCL Researchers
Dept of Computer Science
University College London - Gower Street - London - WC1E 6BT Tel:+44 (0)20 7679 2000

© UCL 1999–2011

Search by