The Understanding of GOST Crytography Technique
Citation
Muhammad Iqbal, Yudi Sahputra, Andysah Putera Utama Siahaan"The Understanding of GOST CrytographyTechnique", International Journal of Engineering Trends and Technology (IJETT), V39(3),168-172 September 2016. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
Nowadays, it is often found a wide range of
the securing information. The understanding that the
author wants to design is about cryptography.
Cryptography is the study of the security of data or
information, commonly found in transferring data.
One of them is the method of GOST, GOST is an
abbreviation of "Gosudarstvennyi Standard" or
"Government Standard." The algorithm is simple
encryption algorithm which has some processes as
many as 32 rounds and uses 64-bit block cipher with
256-bit key. GOST method also uses the S-Box 8
pieces of permanent and XOR operations and Rotate
Left Shift. The author chose the GOST topic since the
author wants to describe the understanding of the
GOST method. The learning is presenting calculation
of the encryption and decryption. The learning course
is the study of cryptographic methods GOST. Learning
software is also designed so that the method can be
more easily understood GOST both algorithms and
operations contained in this GOST method.
References
[1] M. Varnamkhasti, “Overview of the Algorithms for Solving the
Multidimensional Knapsack Problems,” Advanced Studies in
Biology, vol. 4, no. 1, pp. 37-47, 2012.
[2] N. Courtois dan G. V. Bard, “Algebraic Cryptanalysis of the
Data Encryption Standard, In Cryptography and Coding,” dalam
11-th IMA Conference, 2007.
[3] L. Babenko dan E. Maro, “Algebraic Cryptanalysis of GOST
Encryption Algorithm,” Journal of Computer and
Communications, vol. 2, no. 1, pp. 10-17, 2014.
[4] C. E. Shannon, “Communication Theory of Secrecy Systems,”
Bell System Technical Journal, vol. 28, no. 1, pp. 656-715,
1949.
[5] N. T. Courtois, “Cryptanalysis of GOST In The Multiple-Key
Scenario,” Tatra Mountains Mathematical Publication, vol. 57,
no. 1, pp. 45-63, 2013.
[6] E. Biham dan A. Shamir, “Differential Cryptanalysis of DESlike
Cryptosystems,” Journal of Cryptology, vol. 4, no. 1, pp. 3-
72, 1991.
[7] A. P. U. Siahaan dan R. Rahim, “Dynamic Key Matrix of Hill
Cipher Using Genetic Algorithm,” International Journal of
Security and Its Applications, vol. 10, no. 8, pp. 173-180, 2016.
[8] A. P. U. Siahaan, “Factorization Hack of RSA Secret Numbers,”
International Journal of Engineering Trends and Technology,
vol. 37, no. 1, pp. 15-18, 2016.
Keywords
Cryptography, GOST, Encryption,
Decryption.