A lightweight-friendly modification of GOST block cipher
Matematičeskie voprosy kriptografii, Tome 5 (2014) no. 2, pp. 47-55
A. A. Dmukh; D. M. Dygin; G. B. Marshalko. A lightweight-friendly modification of GOST block cipher. Matematičeskie voprosy kriptografii, Tome 5 (2014) no. 2, pp. 47-55. http://geodesic.mathdoc.fr/item/MVK_2014_5_2_a5/
@article{MVK_2014_5_2_a5,
     author = {A. A. Dmukh and D. M. Dygin and G. B. Marshalko},
     title = {A~lightweight-friendly modification of {GOST} block cipher},
     journal = {Matemati\v{c}eskie voprosy kriptografii},
     pages = {47--55},
     year = {2014},
     volume = {5},
     number = {2},
     language = {en},
     url = {http://geodesic.mathdoc.fr/item/MVK_2014_5_2_a5/}
}
TY  - JOUR
AU  - A. A. Dmukh
AU  - D. M. Dygin
AU  - G. B. Marshalko
TI  - A lightweight-friendly modification of GOST block cipher
JO  - Matematičeskie voprosy kriptografii
PY  - 2014
SP  - 47
EP  - 55
VL  - 5
IS  - 2
UR  - http://geodesic.mathdoc.fr/item/MVK_2014_5_2_a5/
LA  - en
ID  - MVK_2014_5_2_a5
ER  - 
%0 Journal Article
%A A. A. Dmukh
%A D. M. Dygin
%A G. B. Marshalko
%T A lightweight-friendly modification of GOST block cipher
%J Matematičeskie voprosy kriptografii
%D 2014
%P 47-55
%V 5
%N 2
%U http://geodesic.mathdoc.fr/item/MVK_2014_5_2_a5/
%G en
%F MVK_2014_5_2_a5

Voir la notice de l'article provenant de la source Math-Net.Ru

We study the possibility to modify the GOST block cipher to resist Isobe and Dinu–Dunkelman–Shamir attacks, and, at the same time, to remain to be suitable for lightweight realization.

[1] Government Standard of the USSR, GOST 28147-89, Government Committee of the USSR for Standards, 1989 (In Russian)

[2] Poschmann A., Ling S., Wang H., “256 bit standardized crypto for 650 GE – GOST revisited”, CHES 2010, Lect. Notes Comput. Sci., 6225, 2010, 219–233 | DOI

[3] Isobe T., “A single-key attack on the full GOST block cipher”, Lect. Notes Comput. Sci., 6733, 2011, 290–305 | DOI | MR

[4] Dinur I., Dunkelman O., Shamir A., Improved attacks on full GOST, Cryptology ePrint Archive, Report 2011/558, 2011

[5] Rudskoy V. I., “On several approaches for the estimation of the effectiveness of related-key attacks”, RusCrypto' 2011, 2011 (In Russian) http://www.ruscrypto.ru/

[6] ISO/IEC JTC 1/SC 27 Standing Document 12 (SD12) on the Assessment of cryptographic algorithms and key lengths

[7] Leander G., Poschmann A., “On the classification of 4-bit $S$-boxes”, WAIFI, Lect. Notes Comput. Sci., 4547, 2007, 159–176 | DOI | MR | Zbl