GOST Encryption Algorithm and Approaches to its Analysis
GOST Encryption Algorithm and Approaches to its Analysis
This chapter considers approaches to analysis of the GOST 28147-89 encryption algorithm (also known as simply GOST), which is the basis of most secure information systems in the Russian Federation. As soon as the GOST algorithm is characterized by a simple structure and uses widely known mathematical operations, approaches to its analysis can be easily propagated to other cryptographic systems. In the conclusion, the authors consider some interesting observations that are related to the structure of GOST encryption and can be useful for further development of cryptanalysis.
CITATION: Babenko, Ludmila. GOST Encryption Algorithm and Approaches to its Analysis edited by Elçi, Atilla . Hershey, PA : IGI Global , 2013. Theory and Practice of Cryptography Solutions for Secure Information Systems - Available at: https://library.au.int/gost-encryption-algorithm-and-approaches-its-analysis