Development of estimation method for the dependence of GOST 28147-89 cipher security on selected key information
Prikladnaâ diskretnaâ matematika, no. 12 (2010), pp. 20-21.

Voir la notice de l'article provenant de la source Math-Net.Ru

In the paper, the dependence of the nonlinearity and of the dynamic distance for Boolean functions describing the round of the GOST 28147-89 algorithm on the round key and on the substitution table is investigated. The gained results can be used for selecting key and substitution table with the highest resistance of the cipher against the most widespread cryptoanalysis methods.
@article{PDM_2010_12_a7,
     author = {V. U. Zolotukhin and T. A. Chalkin},
     title = {Development of estimation method for the dependence of {GOST} 28147-89 cipher security on selected key information},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {20--21},
     publisher = {mathdoc},
     number = {12},
     year = {2010},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2010_12_a7/}
}
TY  - JOUR
AU  - V. U. Zolotukhin
AU  - T. A. Chalkin
TI  - Development of estimation method for the dependence of GOST 28147-89 cipher security on selected key information
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2010
SP  - 20
EP  - 21
IS  - 12
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2010_12_a7/
LA  - ru
ID  - PDM_2010_12_a7
ER  - 
%0 Journal Article
%A V. U. Zolotukhin
%A T. A. Chalkin
%T Development of estimation method for the dependence of GOST 28147-89 cipher security on selected key information
%J Prikladnaâ diskretnaâ matematika
%D 2010
%P 20-21
%N 12
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2010_12_a7/
%G ru
%F PDM_2010_12_a7
V. U. Zolotukhin; T. A. Chalkin. Development of estimation method for the dependence of GOST 28147-89 cipher security on selected key information. Prikladnaâ diskretnaâ matematika, no. 12 (2010), pp. 20-21. http://geodesic.mathdoc.fr/item/PDM_2010_12_a7/

[1] Stollings V., Kriptografiya i zaschita setei: printsipy i praktika, Izdatelskii dom “Vilyams”, M., 2001

[2] Mister S., Adams C., “Practical S-box design”, Proc. Workshop in selected areas in cryptography, Queens University, Kingston-Ontario, 1996

[3] Chalkin T. A., Voloschuk K. M., “Algoritm postroeniya uzlov zamen algoritma shifrovaniya GOST 28147-89”, Vestnik Sibirskogo gosudarstvennogo aerokosmicheskogo universiteta im. akad. M. F. Reshetneva, 2:1(22) (2009), 46–50