350 rub
Journal Highly available systems №2 for 2011 г.
Article in number:
Cryptanalysis of block ciphers
Authors:
L.С. Babenko, E.A. Maro
Abstract:
This paper is devoted to the research of applicability of algebraic cryptanalysis methods to block ciphers. The aim of this work is to analyze features of eXtended Linearization (XL) and eXtended Sparse Linearization (XSL) methods when they are applied to GOST 28147-89 and AES algorithms. The essence of algebraic attack methods is finding secret data by solving nonlinear systems of equations, which describe the encryption algorithm. In general, algebraic attacks can be presented as two stages: - creation of a nonlinear system of equations, - solving the system (finding a secret key). Nonlinear systems of equations for block ciphers are built according to their substitution blocks (S-box). In this paper we present an algorithm of nonlinear system creation for an arbitrary S-box, as well as a sample nonlinear system obtained for a 4-4-bit S-box. Three methods of solving a nonlinear system are presented in the paper: linearization, eXtended Linearization and eXtended Sparse Linearization. The algorithms of solving are presented for each method; applicability conditions and method selection criteria are also described. As soon as S-blocks are considered a part of the secret key in GOST, we have to provide an additional stage to get GOST S-blocks. The algorithm for S-boxes computation is also presented in the paper
Pages: 13-16
References
  1. Панасенко С.П. Стандарт шифрования ГОСТ 28147-89. Обзор криптоаналитических исследований. // http://www.cio-world.ru/?15 Августа, 2007.
  2. Shannon C. Communication theory of secrecy systems // Bel System Techn.Journal V. 28. № 4. 1949. Р. 656-715.
  3. Маро Е.А. Алгебраический криптоанализ упрощенного алгоритма шифрования Rijndael // «Известия ЮФУ. Технические науки» № 11 Тематический выпуск. Информационная безопасность, ISSN 1999-9429 - ноябрь 2009. С. 187-199.
  4. Saarinen M.-J. A chosen key attack against the secret S-boxes of GOST // http://citeseer.ist.psu.edu - August 12. 1998.
  5. Courtois N., Klimov A., Patarin J., Shamir A. Efficient algorithms for solving overdefined systems of multivariate polynomial equations // EUROCRYPT. 2000. Р. 392-407.
  6. Courtois N., Pieprzyk J. Cryptanalysis of block ciphers with overdefined systems of equations // ASIACRYPT. 2002. Р. 267-287.