This page uses content from Wikipedia and is licensed under CC BY-SA.

Kalyna (cipher)

Kalyna
General
First published 2010; 2014/2015 (Standard)
Related to Rijndael (AES)
Certification DSTU 7624:2014 (Ukraine)
Cipher detail
Key sizes 128, 256 or 512 bits
Block sizes 128, 256 or 512 bits
Structure SPN
Rounds 10, 14 or 18 (depending on key size)

Kalyna (Ukrainian: Калина, Viburnum opulus) is a symmetric block cipher. It supports block sizes of 128, 256 or 512 bits; the key length is either equal to or double the block size.

Kalyna was adopted as the national encryption standard of Ukraine in 2015 (standard DSTU 7624:2014) after holding Ukrainian national cryptographic competition. Kalyna is a substitution-permutation network and its design is based on the Rijndael (AES) encryption function having quite different key schedule, another set of four different S-boxes and increased MDS matrix size.

Kalyna has 10 rounds for 128-bit keys, 14 rounds for 256-bit keys and 18 rounds for 512-bit keys. Independent researchers proposed some attacks on reduced-round variants of Kalyna, but all of them have a very high complexity and none of them are practical.

Word size Block size Key size Identification Rounds
64 bits 128 bits 1×128 = 128 bits Kalyna-128/128 10
2×128 = 256 bits Kalyna-128/256 14
256 bits 1×256 = 256 bits Kalyna-256/256
2×256 = 512 bits Kalyna-256/512 18
512 bits 1×512 = 512 bits Kalyna-512/512

References

  • Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov, Ruslan Mordvinov, Dmytro Kaidalov. A New Encryption Standard of Ukraine: The Kalyna Block Cipher. IACR Cryptology ePrint Archive, p650 (2015) [eprint.iacr.org]
  • Roman Oliynykov, Ivan Gorbenko, Viktor Dolgov and Viktor Ruzhentsev. Results of Ukrainian national public cryptographic competition. Tatra Mt. Math. Publ. 47 (2010), 99–113. DOI: 10.2478/v10127-010-0033-6 [www.degruyter.com]
  • Roman Oliynykov. Kalyna block cipher presentation (in English) [www.slideshare.net]
  • Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya. Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512. Volume 9558 of the series Lecture Notes in Computer Science, pp. 119–135. [link.springer.com]
  • Riham Altawy, Ahmed Abdelkhalek, Amr M. Youssef. A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b. IEICE Transactions on Information and Systems, Vol. E99-D, No.4, pp. 1246–1250. [search.ieice.org]