Modification of the key schedule of the 2-GOST block cipher and its implementation on FPGA

被引:2
作者
Dmukh, A. [1 ]
Trifonov, D. [1 ]
Chookhno, A. [2 ]
机构
[1] Acad Cryptog Russian Federat, Moscow, Russia
[2] HSE Tikhonov Moscow Inst Elect & Math, Moscow, Russia
关键词
Block ciphers; 2-GOST; Key schedule; Implementation on FPGA; CRYPTANALYSIS;
D O I
10.1007/s11416-021-00406-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For 2-GOST block lightweight cipher we will consider the Ashur-Bar-On-Dunkelman attack, show that its time complexity is underestimated and propose a modification of this attack with lower time and memory complexity (2(2.49) and 2(6.15) times smaller respectively). A new key schedule for 2-GOST will be proposed to counteract attacks using key schedule features such as fixed points, sliding pairs and so on. It will be shown that the new key schedule of 2-GOST leave it in the class of lightweight ciphers.
引用
收藏
页码:49 / 59
页数:11
相关论文
共 48 条
[1]  
AlTawy Riham., 2014, IACR CRYPTOLOGY EPRI
[2]  
[Anonymous], 2004, BOOLEAN FUNCTIONS CO
[3]  
[Anonymous], 2015, 34122015 GOSTR NAT S
[4]  
Aslan B, 2008, LECT NOTES COMPUT SC, V5130, P123
[5]  
Augot D, 2013, IEEE INT SYMP INFO, P1551, DOI 10.1109/ISIT.2013.6620487
[6]  
Barreto P SLM., 2000, Primitive submitted to NESSIE, V97, P106
[7]  
Bilgin B, 2012, LECT NOTES COMPUT SC, V7428, P76, DOI 10.1007/978-3-642-33027-8_5
[8]  
Biryukov A, 2003, LECT NOTES COMPUT SC, V2656, P33
[9]  
Biryukov A, 1999, LECT NOTES COMPUT SC, V1636, P245
[10]  
Biryukov A, 2000, LECT NOTES COMPUT SC, V1807, P589