Slide Magma cipher analysis:
News of the Kabardin-Balkar scientific center of RAS, no. 6-2 (2018), pp. 23-29.

Voir la notice de l'article provenant de la source Math-Net.Ru

In this graduation work there were developed, software-implemented and tested out parallel algorithms of searching slide pairs of texts for Magma cipher in the case of periodically repeated round subkeys. Cases of self-similarity in one, two or four encryption cycles are examined. As a part of the study extensive experimental data based on the method of slide attack were obtained. These data show the interaction between computing speed in slide pairs of texts, cipher key and the number of computation nodes and cipher characteristics.
Keywords: cryptography, slide attack, Magma cipher, RF encryption standard, GOST R 34.12-2015.
Mots-clés : cryptanalysis
@article{IZKAB_2018_6-2_a3,
     author = {L. K. Babenko and E. A. Ishchukova and D. M. Alekseev and A. S. Shumilin},
     title = {Slide {Magma} cipher analysis:},
     journal = {News of the Kabardin-Balkar scientific center of RAS},
     pages = {23--29},
     publisher = {mathdoc},
     number = {6-2},
     year = {2018},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/IZKAB_2018_6-2_a3/}
}
TY  - JOUR
AU  - L. K. Babenko
AU  - E. A. Ishchukova
AU  - D. M. Alekseev
AU  - A. S. Shumilin
TI  - Slide Magma cipher analysis:
JO  - News of the Kabardin-Balkar scientific center of RAS
PY  - 2018
SP  - 23
EP  - 29
IS  - 6-2
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/IZKAB_2018_6-2_a3/
LA  - ru
ID  - IZKAB_2018_6-2_a3
ER  - 
%0 Journal Article
%A L. K. Babenko
%A E. A. Ishchukova
%A D. M. Alekseev
%A A. S. Shumilin
%T Slide Magma cipher analysis:
%J News of the Kabardin-Balkar scientific center of RAS
%D 2018
%P 23-29
%N 6-2
%I mathdoc
%U http://geodesic.mathdoc.fr/item/IZKAB_2018_6-2_a3/
%G ru
%F IZKAB_2018_6-2_a3
L. K. Babenko; E. A. Ishchukova; D. M. Alekseev; A. S. Shumilin. Slide Magma cipher analysis:. News of the Kabardin-Balkar scientific center of RAS, no. 6-2 (2018), pp. 23-29. http://geodesic.mathdoc.fr/item/IZKAB_2018_6-2_a3/

[1] Kriptograficheskaya zaschita informatsii. Blochnye shifry, https://www.tc26.ru/standard/gost/GOST_R_3412-2015.pdf

[2] A. Biryukov, D. Vagner, “Rasshirennaya slaidovaya ataka. Dostizheniya v kriptologii”, Evrokript 2000, Lektsii v oblasti kompyuternykh nauk, 1807, 589–606

[3] A. Biryukov, D. Vagner, “Slaidovye ataki”, Trudy bystrogo programmnogo shifrovaniya, Lektsii v oblasti kompyuternykh nauk, 1636, 1999, 245–259 | Zbl