Attacks against GOST? Was: Protocol Construction

Joseph Ashwood ashwood at msn.com
Thu Aug 6 01:51:12 EDT 2009


My apologies for the delay, I had forgotten the draft message.

--------------------------------------------------
From: "Alexander Klimov" <alserkli at inbox.ru>
Subject: Attacks against GOST? Was: Protocol Construction

> On Sun, 2 Aug 2009, Joseph Ashwood wrote:
>> > So far, evidence supports the idea that the stereotypical Soviet
>> > tendency to overdesign might have been a better plan after all,
>> > because the paranoia about future discoveries and breaks that
>> > motivated that overdesign is being regularly proven out.
>>
>> And that is why Kelsey found an attack on GOST
>
> Do you want to say that the GOST (28147-89) block cipher is broken? I
> have never heard of an attack against it that is faster than the
> exhaustive search.

I just said there are attacks, the situation is open for interpretation 
because of the nature of the attacks and the unknown S-box. Kelsey and 
Schneier published the first related key attack in 1996, in 1997 Kelsey 
enhanced the attack. My point was that the proposed method of boosting 
security (increased key size and rounds) does not necessarily correlate to 
increased security and since GOST was given as an example of how to do it 
"right" the attacks by Kelsey, et al mattered.

> By the way, it was not "overdesign" (IMO it is simpler even than DES),
> nor it was an example of "the stereotypical Soviet..." According to an
> informed source [1], it was specifically made to be not like military
> ciphers:  its only purpose was to make something for non-military
> cryptography that would not betray any Soviet cryptographic know-how
> (this is why they chose to do something very similar to DES).

Good to know, I didn't remember that part.
                Joe 

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list