The Understanding of GOST Crytography Technique

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2016 by IJETT Journal
Volume-39 Number-3
Year of Publication : 2016
Authors : Muhammad Iqbal, Yudi Sahputra, Andysah Putera Utama Siahaan
DOI :  10.14445/22315381/IJETT-V39P229


Muhammad Iqbal, Yudi Sahputra, Andysah Putera Utama Siahaan"The Understanding of GOST CrytographyTechnique", International Journal of Engineering Trends and Technology (IJETT), V39(3),168-172 September 2016. ISSN:2231-5381. published by seventh sense research group

Nowadays, it is often found a wide range of the securing information. The understanding that the author wants to design is about cryptography. Cryptography is the study of the security of data or information, commonly found in transferring data. One of them is the method of GOST, GOST is an abbreviation of "Gosudarstvennyi Standard" or "Government Standard." The algorithm is simple encryption algorithm which has some processes as many as 32 rounds and uses 64-bit block cipher with 256-bit key. GOST method also uses the S-Box 8 pieces of permanent and XOR operations and Rotate Left Shift. The author chose the GOST topic since the author wants to describe the understanding of the GOST method. The learning is presenting calculation of the encryption and decryption. The learning course is the study of cryptographic methods GOST. Learning software is also designed so that the method can be more easily understood GOST both algorithms and operations contained in this GOST method.


[1] M. Varnamkhasti, “Overview of the Algorithms for Solving the Multidimensional Knapsack Problems,” Advanced Studies in Biology, vol. 4, no. 1, pp. 37-47, 2012.
[2] N. Courtois dan G. V. Bard, “Algebraic Cryptanalysis of the Data Encryption Standard, In Cryptography and Coding,” dalam 11-th IMA Conference, 2007.
[3] L. Babenko dan E. Maro, “Algebraic Cryptanalysis of GOST Encryption Algorithm,” Journal of Computer and Communications, vol. 2, no. 1, pp. 10-17, 2014.
[4] C. E. Shannon, “Communication Theory of Secrecy Systems,” Bell System Technical Journal, vol. 28, no. 1, pp. 656-715, 1949.
[5] N. T. Courtois, “Cryptanalysis of GOST In The Multiple-Key Scenario,” Tatra Mountains Mathematical Publication, vol. 57, no. 1, pp. 45-63, 2013.
[6] E. Biham dan A. Shamir, “Differential Cryptanalysis of DESlike Cryptosystems,” Journal of Cryptology, vol. 4, no. 1, pp. 3- 72, 1991.
[7] A. P. U. Siahaan dan R. Rahim, “Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm,” International Journal of Security and Its Applications, vol. 10, no. 8, pp. 173-180, 2016.
[8] A. P. U. Siahaan, “Factorization Hack of RSA Secret Numbers,” International Journal of Engineering Trends and Technology, vol. 37, no. 1, pp. 15-18, 2016.

Cryptography, GOST, Encryption, Decryption.