This page uses content from Wikipedia and is licensed under CC BY-SA.

Kalyna (cipher)

Kalyna
General
First published2010; 2014/2015 (Standard)
Related toRijndael (AES)
CertificationDSTU 7624:2014 (Ukraine)
Cipher detail
Key sizes128, 256 or 512 bits
Block sizes128, 256 or 512 bits
StructureSPN
Rounds10, 14 or 18 (depending on key size)

Kalyna (Ukrainian: Калина, Viburnum opulus) is a symmetric block cipher. It supports block sizes of 128, 256 or 512 bits; the key length is either equal to or double the block size.

Kalyna was adopted as the national encryption standard of Ukraine in 2015 (standard DSTU 7624:2014) after holding Ukrainian national cryptographic competition. Kalyna is a substitution-permutation network and its design is based on the Rijndael (AES) encryption function having quite different key schedule, another set of four different S-boxes and increased MDS matrix size.

Kalyna has 10 rounds for 128-bit keys, 14 rounds for 256-bit keys and 18 rounds for 512-bit keys. Independent researchers proposed some attacks on reduced-round variants of Kalyna, but all of them have a very high complexity and none of them are practical.

Word size Block size Key size Identification Rounds
64 bits 128 bits 1×128 = 128 bits Kalyna-128/128 10
2×128 = 256 bits Kalyna-128/256 14
256 bits 1×256 = 256 bits Kalyna-256/256
2×256 = 512 bits Kalyna-256/512 18
512 bits 1×512 = 512 bits Kalyna-512/512

References

  • Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov, Ruslan Mordvinov, Dmytro Kaidalov. A New Encryption Standard of Ukraine: The Kalyna Block Cipher. IACR Cryptology ePrint Archive, p650 (2015) [eprint.iacr.org]
  • Roman Oliynykov, Ivan Gorbenko, Viktor Dolgov and Viktor Ruzhentsev. Results of Ukrainian national public cryptographic competition. Tatra Mt. Math. Publ. 47 (2010), 99–113. DOI: 10.2478/v10127-010-0033-6 [www.degruyter.com]
  • Roman Oliynykov. Kalyna block cipher presentation (in English) [www.slideshare.net]
  • Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya. Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512. Volume 9558 of the series Lecture Notes in Computer Science, pp. 119–135. [link.springer.com]
  • Riham Altawy, Ahmed Abdelkhalek, Amr M. Youssef. A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b. IEICE Transactions on Information and Systems, Vol. E99-D, No.4, pp. 1246–1250. [search.ieice.org]