GOST-CRYPTO Hash Tool
Other Hash Generator
MD2 MD4 MD5 SHA1 SHA224 SHA256 SHA384 SHA512/224 SHA512/256 SHA512 SHA3-224 SHA3-256 SHA3-384 SHA3-512 RIPEMD128 RIPEMD160 RIPEMD256 RIPEMD320 WHIRLPOOL TIGER128,3 TIGER160,3 TIGER192,3 TIGER128,4 TIGER160,4 TIGER192,4 SNEFRU SNEFRU256 GOST GOST-CRYPTO ADLER32 CRC32 CRC32B CRC32C FNV132 FNV1A32 FNV164 FNV1A64 JOAAT MURMUR3A MURMUR3C MURMUR3F XXH32 XXH64 XXH3 XXH128 HAVAL128,3 HAVAL160,3 HAVAL192,3 HAVAL224,3 HAVAL256,3 HAVAL128,4 HAVAL160,4 HAVAL192,4 HAVAL224,4 HAVAL256,4 HAVAL128,5 HAVAL160,5 HAVAL192,5 HAVAL224,5 HAVAL256,5The GOST-Crypto algorithm is a symmetric key block cipher developed under the Soviet Union standards, specifically defined by the Russian national standard GOST R 34.11-94 for cryptographic hashing and GOST 28147-89 for encryption. It operates on fixed-size data blocks of 64 bits using a key of 256 bits, designed for secure data transformation and integrity assurance. The algorithm is structured around a Feistel network, which divides the input data into two equal halves and processes them through multiple rounds of substitution and permutation.
Key Components
- Block Size: 64 bits
- Key Size: 256 bits
- Rounds: 32 iterations
- S-Boxes: Non-linear substitution tables providing confusion
- Modular Addition: Arithmetic operation to combine data and key material
- Feistel Structure: Core iterative process ensuring diffusion and reversibility
Operational Steps
- Input data block is split into two 32-bit halves labeled Left and Right.
- The algorithm applies a round function to the Right half and a subkey derived from the main key.
- The output of the round function is combined with the Left half using bitwise XOR.
- After each round, the Left and Right halves are swapped, except for the final round.
- The process repeats for all 32 rounds using a predefined key schedule to select subkeys.
- The final encrypted block is obtained by concatenating the Left and Right halves after the last round.
Key Schedule
The key schedule in GOST-Crypto divides the 256-bit master key into eight 32-bit subkeys. These subkeys are used sequentially for the first 24 rounds and in reverse order for the last eight rounds, providing enhanced diffusion and resistance against differential attacks. Each subkey contributes to the non-linear transformation of the data, ensuring uniform distribution of output bits across all rounds.
Security Properties
- Provides strong diffusion through repeated substitution and permutation.
- Ensures high resistance against linear and differential cryptanalysis due to 32-round structure.
- Non-linear S-boxes introduce non-predictability, strengthening confidentiality.
- Feistel network allows symmetric encryption and decryption using the same key with minimal modification.
Applications
GOST-Crypto is applied in environments requiring secure symmetric encryption, digital signatures, and hash function generation. Its design ensures compatibility with hardware and software implementations, and it has been adopted in several national and international cryptographic protocols for secure communications.