The cryptographic transformation algorithm is intended for either hardware or software implementation, satisfies the cryptographic requirements, and does not place any limitations on the secrecy level of the protected information.
This standard is employed in organizations, companies, and offices that use cryptographic protection for data stored in or transferred through computer networks, separate computer complexes, or computers.
The GOST 28147-89 Standard Cryptographic Protection for Data Processing Systems published in 1990 and now is widely available in software. In apparent contrast to DES's explicit limitation to unclassified information, the introduction to GOST 28147-89 contains remark that the cryptographic transformation algorithm does not place any limitations on the secrecy level of the protected information.
The algorithms are similar to DES in that both operate on 64-bit blocks by successively modifying half of the bits with a function of the other half. Beyond that, the similarity declines and several differences are visible:
- The GOST 28147-89 has 32 rounds rather than the 16 of DES.
- Each round is somewhat simpler than a round of DES.
- In contrast to DES's meager 56 bits of key, GOST 28147-89 standard has 256 bits of primary key.
- GOST 28147-89 works faster than DES!
- Each round is somewhat simpler than a round of DES.