and other ideas to benefit from the additional degrees
of freedom available. There is a substantial amount
of published work which deal with these aspects of
GOST, see (Kara, 2008; Isobe, 2011; Courtois, a) for
a more complete bibliography. In this paper we will
look only at one aspect of GOST which is the study of
symmetric fixed points in GOST (Kara, 2008; Isobe,
2011; Courtois, a; F. Mendel N. Pramstaller, 2008),
which are those which are relevant in the attack on the
GOST hash function (F. Mendel N. Pramstaller,2008)
presented at Crypto 2008. In our attack we will not
use any particular property of GOST, only a higher-
level self-similarity property: one inside the compres-
sion function, namely the fact that it uses the same
block cipher several times. This is a very weak prop-
erty present in many cryptographic constructions.
1.1 Hash Functions
A hash function H : {0, 1}
∗
→ {0,1}
n
is a map that
maps a message M of arbitrary but finite length
to a fixed-length hash value. Cryptographic hash
functions are never injective and have many appli-
cations in information security such as digital sig-
natures, message authentication codes (MACs) and
other forms of authentication (Schneier, 1996). The
three main security requirements for cryptographic
hash functions are one-wayness, second pre-image
resistance, and collision resistance (Schneier, 1996;
J. Talbot, 2006). The properties which seem to be the
hardest to achieve for the designers of hash functions,
or those on which most successful attacks concentrate
are second pre-image resistance, and collision resis-
tance. Each property has its own generic attacks and
their complexity determines the security objective to
be attained, as shown in Table 1. Any attack below
this bound will be considered as a valid shortcut at-
tack on this security property.
Table 1: Number of messages needed to perform an attack.
Resistance type Number of messages
Collision 2
n/2
Pre-image 2
n
Second pre-image 2
n
We can remark that the reference attack complexity
level for collision attacks on hash functions is much
smaller than in the other two security notions, due
to the well-known birthday paradox (Schneier, 1996).
This security requirement depends only on the size of
the output space. In the GOST hash function, the out-
put space for the compression function which hashes
messages of a fixed length, and for the full hash func-
tion which hashes messages of variable length, are of
the same size, both outputs are 256 bits long. Accord-
ingly in both cases the goal of the attacker is to find
an attack faster than 2
128
times the cost of comput-
ing the compression function. We stress the fact that
for the hash functions the reference unit is also the
cost of computing the compression function, and the
cost of computing the hash function is variable. These
bounds correspond closely to what really is achieved
by generic attacks on hash functions. In both cases,
any attack to compute collisions faster than 2
128
com-
putations of the GOST compression function, will be
considered as a valid shortcut attack which allows to
break the given (hash or compression) function.
Attacks on hash functions can occur at three dis-
tinct levels. Some of the attacks on hash function
are generic and high-level attacks related to high-
level construction used in a specific hash function,
such as the Merkle-Damg˚ard construction (Damg˚ard,
1990). Other are more specific attacks exhibit a spe-
cific weaknesses of a given compression function. Fi-
nally in block-cipher based constructions, one can
also go one level deeper and exploit particular weak-
nesses of the underlying block cipher.
It is well known that if the compression func-
tion is collision-resistant, so is the resulting Merkle-
Damg˚ard construction (Damg˚ard, 1990). If the com-
pression function is not collision-resistant, as it is the
case in this paper, it may be possible or not to extend
the attack to the full hash function, but the exact way
to do that will depend a lot on the high-levelconstruc-
tion.
1.2 Specificity of GOST Hash
At Crypto 2008 an attack on the GOST compression
function of complexity of 2
96
evaluations of the com-
pression function is presented. Then the attack is ex-
tended to a collision attack on the full GOST hash
function with a complexity of 2
105
evaluations of the
compression function, see (F. Mendel N. Pramstaller,
2008). This extension is a non-trivial step. GOST
contains a major innovation compared to many clas-
sical hash functions based on the Merkle-Damg˚ard
construction (Damg˚ard, 1990). It has an additional
checksum computed over all input message blocks
which is hashed in the last application of the com-
pression function. However in 2008 Gauravaram and
Kelsey demonstrated that if the checksum is linear or
additive, one can still do the extension of the attack
and this independently of the underlying compres-
sion function (P. Gauravaram, 2008). The extension
method uses the Camion-Patarin-Wagner generalized
birthday attack (P. Camion, 1991; Wagner, 2002).
Thus at Crypto 2008 the authors were able also to
SECRYPT 2011 - International Conference on Security and Cryptography
326