Attacks on full block cipher GOST 28147-89 with~2 or~4 related keys
Prikladnaâ diskretnaâ matematika, no. 12 (2010), pp. 29-30.

Voir la notice de l'article provenant de la source Math-Net.Ru

In this paper we describe the attacks on the full block cipher GOST 28147-89. This attack consists of related-key, differential and boomerang attacks. For the attack we need 2 or 4 related keys depending on properties of $s$-boxes.
@article{PDM_2010_12_a12,
     author = {M. A. Pudovkina and G. I. Khoruzhenko},
     title = {Attacks on full block cipher {GOST} 28147-89 with~2 or~4 related keys},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {29--30},
     publisher = {mathdoc},
     number = {12},
     year = {2010},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2010_12_a12/}
}
TY  - JOUR
AU  - M. A. Pudovkina
AU  - G. I. Khoruzhenko
TI  - Attacks on full block cipher GOST 28147-89 with~2 or~4 related keys
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2010
SP  - 29
EP  - 30
IS  - 12
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2010_12_a12/
LA  - ru
ID  - PDM_2010_12_a12
ER  - 
%0 Journal Article
%A M. A. Pudovkina
%A G. I. Khoruzhenko
%T Attacks on full block cipher GOST 28147-89 with~2 or~4 related keys
%J Prikladnaâ diskretnaâ matematika
%D 2010
%P 29-30
%N 12
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2010_12_a12/
%G ru
%F PDM_2010_12_a12
M. A. Pudovkina; G. I. Khoruzhenko. Attacks on full block cipher GOST 28147-89 with~2 or~4 related keys. Prikladnaâ diskretnaâ matematika, no. 12 (2010), pp. 29-30. http://geodesic.mathdoc.fr/item/PDM_2010_12_a12/

[1] Seki H., Kaneko T., “Differential cryptanalysis of reduced rounds of gost”, Selected Areas in Cryptography, LNSC, 2012, Springer, 2000, 315–323 | MR

[2] Biham E., Dunkelman O., Keller N., “Improved slide attacks”, LNCS, 4593, 2007, 153–166 | Zbl

[3] Kara O., “Reflection Cryptanalysis of Some Ciphers”, LNCS, 5365, 2008, 294–307 | MR | Zbl

[4] Ko Y., Hong S., Lee W., et al., “Related key differential attacks on 27 rounds of xtea and full-round gost”, LNCS, 3017, 2004, 299–316 | Zbl

[5] Fleischmann E., Gorski M., Huhne J.-H., Lucks S., “Key Recovery Attack on full GOST Block Cipher with Zero Time and Memory”, WEWoRC, 2009

[6] Rudskoy V., On zero practical significance of “Key recovery attack on full GOST block cipher with zero time and memory” http://eprint.iacr.org/2010/

[7] Shnaier B., Prikladnaya kriptografiya. Protokoly, algoritmy, iskhodnye teksty na yazyke Si, Triumf, M., 2002