350 rub
Journal Highly available systems №2 for 2011 г.
Article in number:
Cryptoanalysis of the GOST 28147-89 modes of operation that provides confidentiality
Authors:
I.A. Kukalo
Abstract:
In this research the estimation of the GOST 28147-89 modes against attack on the chosen clear texts is executed. For each mode the size of the data guaranteeing preservation of confidentiality of the information is defined
Pages: 23-27
References
  1. ГОСТ 28147-89. Системы обработки информации. Защита криптографическая. Алгоритм криптографического преобразования. Введ. 01.07.90. М.: Государственный комитет СССР по стандартам: Изд-во стандартов. 1989. 28 с.
  2. Advanced Slide Attacks [Электронный ресурс] / A. Biryukov, D. Wagner. 2000. Режим доступа: http://now.cs.berkeley.edu/~daw/papers/advslide-ec00.ps.
  3. On zero practical significance of - Key recovery attack on full GOST block cipher with zero time and memory - [Electronic resource] / М. Rudskoy. 2000. Режим доступа: http://eprint.iacr.org/2010/111.pdf.
  4. Introduction to Modern Cryptography [Электронный ресурс] / M. Bellare, P. Rogaway. 2005. Режим доступа: http://cseweb.ucsd.edu/~mihir/cse207/w-se.pdf.
  5. Lecture Notes on Cryptography [Электронный ресурс] / S. Goldwasser, M. Bellare. 2001. Режим доступа: http://cseweb.ucsd.edu/~mihir/papers/gb.html.
  6. Practice-oriented provable-security [Электронный ресурс] / M. Bellare. 1998. Режим доступа: http://cseweb.ucsd.edu/~mihir/papers/pops.pdf.
  7. Sequences of Games: A Tool for Taming Complexity in Security Proofs [Электронный ресурс] / V.Shoup. 2006. Режим доступа: http://citeseerx.ist.psu.edu/viewdoc/download-doi=10.1.1.63.2390&rep=rep1&type=pdf.