GOST Encryption Algorithm and Approaches to its Analysis

GOST Encryption Algorithm and Approaches to its Analysis

Author: 
Babenko, Ludmila
Place: 
Hershey, PA
Publisher: 
IGI Global
Date published: 
2013
Responsibility: 
Ishchukova, Evgeniya, jt. author
Maro, Ekaterina, jt. author
Editor: 
Elçi, Atilla
Source: 
Theory and Practice of Cryptography Solutions for Secure Information Systems
Abstract: 

This chapter considers approaches to analysis of the GOST 28147-89 encryption algorithm (also known as simply GOST), which is the basis of most secure information systems in the Russian Federation. As soon as the GOST algorithm is characterized by a simple structure and uses widely known mathematical operations, approaches to its analysis can be easily propagated to other cryptographic systems. In the conclusion, the authors consider some interesting observations that are related to the structure of GOST encryption and can be useful for further development of cryptanalysis.

Series: 
Advances in Information Security, Privacy, and Ethics

CITATION: Babenko, Ludmila. GOST Encryption Algorithm and Approaches to its Analysis edited by Elçi, Atilla . Hershey, PA : IGI Global , 2013. Theory and Practice of Cryptography Solutions for Secure Information Systems - Available at: https://library.au.int/gost-encryption-algorithm-and-approaches-its-analysis