Algebraic Analysis of a Simplified Encryption Algorithm GOST R 34.12-2015

Author:

Ishchukova EvgeniaORCID,Maro EkaterinaORCID,Pristalov Pavel

Abstract

In January 2016, a new standard for symmetric block encryption was established in the Russian Federation. The standard contains two encryption algorithms: Magma and Kuznyechik. In this paper we propose to consider the possibility of applying the algebraic analysis method to these ciphers. To do this, we use the simplified algorithms Magma ⊕ and S-KN2. To solve sets of nonlinear Boolean equations, we choose two different approaches: a reduction and solving of the Boolean satisfiability problem (by using the CryptoMiniSat solver) and an extended linearization method (XL). In our research, we suggest using a security assessment approach that identifies the resistance of block ciphers to algebraic cryptanalysis. The algebraic analysis of an eight-round Magma (68 key bits were fixed) with the CryptoMiniSat solver demanded four known text pairs and took 3029.56 s to complete (the search took 416.31 s). The algebraic analysis of a five-round Magma cipher with weakened S-boxes required seven known text pairs and took 1135.61 s (the search took 3.36 s). The algebraic analysis of a five-round Magma cipher with disabled S-blocks (equivalent value substitution) led to getting only one solution for five known text pairs in 501.18 s (the search took 4.92 s). The complexity of the XL algebraic analysis of a four-round S-KN2 cipher with three text pairs was 236.33 s (took 1.191 Gb RAM).

Publisher

MDPI AG

Subject

Applied Mathematics,Modeling and Simulation,General Computer Science,Theoretical Computer Science

Reference44 articles.

1. Algebraic Complexity Reduction and Cryptanalysis of GOST http://www.nicolascourtois.com/papers/gostac11.pdf

2. Communication Theory of Secrecy Systems*

3. Algebraic Attack Efficiency Versus S-Box Representation https://eprint.iacr.org/2017/007.pdf

4. Cryptographic Properties of Addition Modulo 2n https://eprint.iacr.org/2016/181.pdf

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. On Inequalities Between Convex, Concave, and Multilinear Continuations of Boolean Functions;Keldysh Institute Preprints;2024

2. Algebraic Attack on 2-Round SMALLPRESENT-[2] Algorithm;2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs);2023-08-22

3. Gost R 34.12-2015 (Kuznechik) analysis of a cryptographic algorithm;NOVEL TRENDS IN RHEOLOGY IX;2023

4. Atomic Formulation of the Boolean Curve Fitting Problem;International Journal of Mathematical, Engineering and Management Sciences;2022-10-01

5. Application of the algebraic cryptanalysis method to the Kuznyechik encryption algorithm;2021 International Conference on Information Science and Communications Technologies (ICISCT);2021-11-03

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3