# Enhanced Truncated Differential Cryptanalysis of GOST

### Nicolas T. Courtois, Theodosis Mourouzis, Michal Misztal

#### Abstract

.

#### References

- A. Poschmann, S. L. and Wang, H. (2010). 256 bit standardized crypto for 650 ge gost revisited. In In CHES 2010, LNCS 6225, pp. 219-233.
- Biham, E. and Shamir, A. (1990). Differential cryptanalysis of des-like cryptosystems. In Extended Abstract. In: Crypto'90,Springer-Verlag, 2.
- Biham, E. and Shamir, A. (1992). Differential cryptanalysis of the full 16-round des. In In: Crypto'92, SpringerVerlag, 487.
- Courtois, N. (2011a). Algebraic complexity reduction and cryptanalysis of gost. In Cryptology ePrint Archive, Report 2011/626.
- Courtois, N. (2011b). Security evaluation of gost 28147- 89 in view of international standardisation. In In Cryptologia, Volume 36, Issue 1, pp. 2-13, 2012. http://www.tandfonline.com/toc/ucry20/36/1 An earlier version which was ocially sub-mitted to ISO in May 2011 can be found at http://eprint. iacr.org/2011/211/.
- Courtois, N. (2012). An improved differential attack on full gost. In In Cryptology ePrint Archive, Report 2012/138. 15 March 2012, http://eprint. iacr.org/2012/.
- Courtois, N. and Misztal, M. (2011). First differential attack on full 32-round gost. In in ICICS'11, pp. 216-227, Springer LNCS 7043.
- Courtois, N. and Misztal, M. (2012). Aggregated differentials and cryptanalysis of pp-1 and gost. In CECC 2011, 11th Central European Conference on Cryptology. In Periodica Mathematica Hungarica Vol. 65(2), pp. 1126, DOI:10.1007/s10998-012-2983-8, Springer.
- Dolmatov, V. (2010). Rfc 5830: Gost 28147-89 encryption, decryption and mac algorithms. In IETF. ISSN: 2070- 1721.
- GOST (2005). A russian reference implementation of gost implementing russian algorithms as an extension of tls v1.0. is available as a part of openssl library. the file gost89.c contains eight different sets of s-boxes and is found in openssl 0.9.8 and later: http://www.openssl.org/source/.
- I.A. Zabotin, G. G. and Isaeva, V. (1989). Cryptographic protection for information processing systems, government standard of the ussr,gost 28147-89. In Government Committee of the USSR for Standards.
- Isobe, T. (2011). A single-key attack on the full gost block cipher. In In FSE 2011, pp. 290-305, Springer LNCS 6733.
- Itai Dinur, O. D. and Shamir, A. Improved attacks on full gost. In FSE 2012, LNCS 7549, pp. 9-28.
- Knudsen, L. (1994). Truncated and higher order differentials. In In FSE 1994, pp.196-211, LNCS 1008, Springer.
- Malchik, A. and Diffie, W. (1994). English translation: Cryptographic protection for information processing systems, government standard of the ussr,gost 28147-89. In http://www.autochthonous.org/ crypto/gosthash.tar.gz.
- , Saarinen, M. (1998). A chosen key attack against the secret s-boxes of gost. In Unpublished manuscript.
- Schneier, B. (1996). Section 14.1 gost, in applied cryptography, second edition. In John Wiley and Sons.
- Seki, H. and T.Kaneko (2000). Differential cryptanalysis of reduced rounds of gost. In In SAC 2000, LNCS 2012, pp. 315-323, Springer.
- V. Popov, I. K. and Leontie, S. (2006). Rfc 4357: Additional cryptographic algorithms for use with gost 28147-89, gost r 34.10-94,gost r 34.10-2001, and gost r 34.11-94 algorithms. In http://tools.ietf.org/html/rfc4357.

#### Paper Citation

#### in Harvard Style

T. Courtois N., Mourouzis T. and Misztal M. (2013). **Enhanced Truncated Differential Cryptanalysis of GOST** . In *Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)* ISBN 978-989-8565-73-0, pages 411-418. DOI: 10.5220/0004532504110418

#### in Bibtex Style

@conference{secrypt13,

author={Nicolas T. Courtois and Theodosis Mourouzis and Michal Misztal},

title={Enhanced Truncated Differential Cryptanalysis of GOST},

booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},

year={2013},

pages={411-418},

publisher={SciTePress},

organization={INSTICC},

doi={10.5220/0004532504110418},

isbn={978-989-8565-73-0},

}

#### in EndNote Style

TY - CONF

JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)

TI - Enhanced Truncated Differential Cryptanalysis of GOST

SN - 978-989-8565-73-0

AU - T. Courtois N.

AU - Mourouzis T.

AU - Misztal M.

PY - 2013

SP - 411

EP - 418

DO - 10.5220/0004532504110418