Short Paper - Semantic Scholar

3 downloads 0 Views 22KB Size Report
AND CHAN-CHI WANG. Institute of Computer Science and Information Engineering. National Chiao Tung University. Hsinchu, Taiwan 300, R.O.C.. E-mail: ...
YNAMIC GOST JOURNAL OF INFORMATION SCIENCE AND EDNGINEERING 16, 857-861 (2000)

857

Short Paper Dynamic GOST YI-SHIUNG YEH, CHU-HSING LIN* AND CHAN-CHI WANG Institute of Computer Science and Information Engineering National Chiao Tung University Hsinchu, Taiwan 300, R.O.C. E-mail: [email protected] * Department of Computer Science and Information Engineering Tunghai University Taichung, Taiwan 407, R.O.C. E-mail: [email protected]

GOST is a block algorithm which was adopted as a standard by the former Soviet Union. Because it keeps a lot of secret information, including S-boxes, the algorithm is secure and easy to understand. In this article, we propose a variant of GOST, called dynamic GOST, in which permutations are applied. With the permutation information securely kept, the new version of GOST is more secure and better to withstand differential and linear attacks. Keywords: GOST, block cipher, S-boxes, DES, subkey generation, cryptanalysis, differential attack, linear attack, random permutation

1. INTRODUCTION GOST is a block algorithm used as a government standard in the former Soviet Union. It is a Feistel network for cryptographically protecting data processing systems [1,2]. The important role GOST played in the former Soviet Union was not less significant than that of the Data Encryption Standard in the U. S. The algorithm processes a 64-bit message by using a 256-bit key and some secret information, including S-boxes. There are 32 rounds in GOST, as opposed to 16 rounds in DES. Therefore, it needs 32 subkeys, which are generated by a 256-bit key (or 8 32-bit subkeys), for the 32 rounds. Initially, the eight 32-bit subkeys are denoted as k1 , k2 ,..., k8 , where ki is a 32-bit subkey. Let ki be the ith subkey for round i. Then, ki = k ( i mod 8) for k0 = k8 and 1 £ i £ 24, and ki = k ( 33− i ) mod 8 for 25 £ i £ 32 and k9 = k1 . With these subkeys, the transformation in round i of GOST can be described as: Li = Ri-1 and Ri = Li-1 ≈ f(Ri-1, ki), where L0R0 is a plaintext message with 32-bits in each part. Received September 2, 1998; revised November 30, 1998; accepted March 18, 1999. Communicated by Chi Sung Laih.

857

858

YI-SHIUNG YEH, CHU-HSING LIN AND CHAN-CHI WANG

Further, there are 8 S-boxes in GOST, and each S-box is a permutation on {0, 1, ..., 15}. Let S be an ordered set of the 8 S-boxes in GOST. Then, the function f can be denoted as: f(X, Y) = S(X ° Y)