Paper 2010/111

On zero practical significance of “"Key recovery attack on full GOST block cipher with zero time and memory”"

Vladimir Rudskoy

Abstract

In this paper we show that the related key boomerang attack by E. Fleischmann et al. from the paper mentioned in the title does not allow to recover the master key of the GOST block cipher with complexity less than the complexity of the exhaustive search. Next we present modified attacks. Finally we argue that these attacks and the related key approach itself are of extremely limited practical applications and do not represent a fundamental obstacle to practical usage of the block ciphers such as GOST, AES and Kasumi.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown status
Keywords
secret-keyrelated-keyboomerangGOST
Contact author(s)
rudskoy_vladimir @ mail ru
History
2015-10-07: last of 2 revisions
2010-03-04: received
See all versions
Short URL
https://ia.cr/2010/111
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2010/111,
      author = {Vladimir Rudskoy},
      title = {On zero practical significance of “"Key recovery attack on  full GOST block cipher with zero time and memory”"},
      howpublished = {Cryptology ePrint Archive, Paper 2010/111},
      year = {2010},
      note = {\url{https://eprint.iacr.org/2010/111}},
      url = {https://eprint.iacr.org/2010/111}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.