Algebraic Analysis of a Simplified Encryption Algorithm GOST R 34.12-2015

In January 2016, a new standard for symmetric block encryption was established in the Russian Federation. The standard contains two encryption algorithms: Magma and Kuznyechik. In this paper we propose to consider the possibility of applying the algebraic analysis method to these ciphers. To do this...

Full description

Bibliographic Details
Main Authors: Evgenia Ishchukova, Ekaterina Maro, Pavel Pristalov
Format: Article
Language:English
Published: MDPI AG 2020-05-01
Series:Computation
Subjects:
Online Access:https://www.mdpi.com/2079-3197/8/2/51
id doaj-d57ae5d15a4246629210d36225b521aa
record_format Article
spelling doaj-d57ae5d15a4246629210d36225b521aa2020-11-25T03:01:01ZengMDPI AGComputation2079-31972020-05-018515110.3390/computation8020051Algebraic Analysis of a Simplified Encryption Algorithm GOST R 34.12-2015Evgenia Ishchukova0Ekaterina Maro1Pavel Pristalov2Department of Information Security, Southern Federal University, 347922 Rostov Oblast, RussiaDepartment of Information Security, Southern Federal University, 347922 Rostov Oblast, RussiaLLC TopSoft (Altarix), 440000 Moscow, RussiaIn January 2016, a new standard for symmetric block encryption was established in the Russian Federation. The standard contains two encryption algorithms: Magma and Kuznyechik. In this paper we propose to consider the possibility of applying the algebraic analysis method to these ciphers. To do this, we use the simplified algorithms Magma Å and S-KN2. To solve sets of nonlinear Boolean equations, we choose two different approaches: a reduction and solving of the Boolean satisfiability problem (by using the CryptoMiniSat solver) and an extended linearization method (XL). In our research, we suggest using a security assessment approach that identifies the resistance of block ciphers to algebraic cryptanalysis. The algebraic analysis of an eight-round Magma (68 key bits were fixed) with the CryptoMiniSat solver demanded four known text pairs and took 3029.56 s to complete (the search took 416.31 s). The algebraic analysis of a five-round Magma cipher with weakened S-boxes required seven known text pairs and took 1135.61 s (the search took 3.36 s). The algebraic analysis of a five-round Magma cipher with disabled S-blocks (equivalent value substitution) led to getting only one solution for five known text pairs in 501.18 s (the search took 4.92 s). The complexity of the XL algebraic analysis of a four-round S-KN2 cipher with three text pairs was 236.33 s (took 1.191 Gb RAM).https://www.mdpi.com/2079-3197/8/2/51S-boxsystems of multivariate quadratic equationsalgebraic analysisSAT solving methodextended linearization methodGOST R 34.12-2015 encryption algorithms
collection DOAJ
language English
format Article
sources DOAJ
author Evgenia Ishchukova
Ekaterina Maro
Pavel Pristalov
spellingShingle Evgenia Ishchukova
Ekaterina Maro
Pavel Pristalov
Algebraic Analysis of a Simplified Encryption Algorithm GOST R 34.12-2015
Computation
S-box
systems of multivariate quadratic equations
algebraic analysis
SAT solving method
extended linearization method
GOST R 34.12-2015 encryption algorithms
author_facet Evgenia Ishchukova
Ekaterina Maro
Pavel Pristalov
author_sort Evgenia Ishchukova
title Algebraic Analysis of a Simplified Encryption Algorithm GOST R 34.12-2015
title_short Algebraic Analysis of a Simplified Encryption Algorithm GOST R 34.12-2015
title_full Algebraic Analysis of a Simplified Encryption Algorithm GOST R 34.12-2015
title_fullStr Algebraic Analysis of a Simplified Encryption Algorithm GOST R 34.12-2015
title_full_unstemmed Algebraic Analysis of a Simplified Encryption Algorithm GOST R 34.12-2015
title_sort algebraic analysis of a simplified encryption algorithm gost r 34.12-2015
publisher MDPI AG
series Computation
issn 2079-3197
publishDate 2020-05-01
description In January 2016, a new standard for symmetric block encryption was established in the Russian Federation. The standard contains two encryption algorithms: Magma and Kuznyechik. In this paper we propose to consider the possibility of applying the algebraic analysis method to these ciphers. To do this, we use the simplified algorithms Magma Å and S-KN2. To solve sets of nonlinear Boolean equations, we choose two different approaches: a reduction and solving of the Boolean satisfiability problem (by using the CryptoMiniSat solver) and an extended linearization method (XL). In our research, we suggest using a security assessment approach that identifies the resistance of block ciphers to algebraic cryptanalysis. The algebraic analysis of an eight-round Magma (68 key bits were fixed) with the CryptoMiniSat solver demanded four known text pairs and took 3029.56 s to complete (the search took 416.31 s). The algebraic analysis of a five-round Magma cipher with weakened S-boxes required seven known text pairs and took 1135.61 s (the search took 3.36 s). The algebraic analysis of a five-round Magma cipher with disabled S-blocks (equivalent value substitution) led to getting only one solution for five known text pairs in 501.18 s (the search took 4.92 s). The complexity of the XL algebraic analysis of a four-round S-KN2 cipher with three text pairs was 236.33 s (took 1.191 Gb RAM).
topic S-box
systems of multivariate quadratic equations
algebraic analysis
SAT solving method
extended linearization method
GOST R 34.12-2015 encryption algorithms
url https://www.mdpi.com/2079-3197/8/2/51
work_keys_str_mv AT evgeniaishchukova algebraicanalysisofasimplifiedencryptionalgorithmgostr34122015
AT ekaterinamaro algebraicanalysisofasimplifiedencryptionalgorithmgostr34122015
AT pavelpristalov algebraicanalysisofasimplifiedencryptionalgorithmgostr34122015
_version_ 1724695331205021696