ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2507.02181
0
0

Extended c-differential distinguishers of full 9 and reduced-round Kuznyechik cipher

2 July 2025
Pantelimon Stanica
Ranit Dutta
Bimal Mandal
ArXiv (abs)PDFHTML
Main:17 Pages
4 Figures
Bibliography:4 Pages
14 Tables
Appendix:11 Pages
Abstract

This paper introduces {\em truncated inner ccc-differential cryptanalysis}, a novel technique that for the first time enables the practical application of ccc-differential uniformity to block ciphers. While Ellingsen et al. (IEEE Trans. Inf. Theory, 2020) established the notion of ccc-differential uniformity using (F(x⊕a),cF(x))(F(x\oplus a), cF(x))(F(x⊕a),cF(x)), a key challenge remained: multiplication by ccc disrupts the structural properties essential for block cipher analysis, particularly key addition.We resolve this challenge by developing an \emph{inner} ccc-differential approach where multiplication by ccc affects the input: (F(cx⊕a),F(x))(F(cx\oplus a), F(x))(F(cx⊕a),F(x)). We prove that the inner ccc-differential uniformity of a function FFF equals the outer ccc-differential uniformity of F−1F^{-1}F−1, establishing a fundamental duality. This modification preserves cipher structure while enabling practical cryptanalytic applications.Our main contribution is a comprehensive multi-faceted statistical-computational framework, implementing truncated ccc-differential analysis against the full 9-round Kuznyechik cipher (the inner ccc-differentials are immune to the key whitening at the backend). Through extensive computational analysis involving millions of differential pairs, we demonstrate statistically significant non-randomness across all tested round counts. For the full 9-round cipher, we identify multiple configurations triggering critical security alerts, with bias ratios reaching 1.7×1.7\times1.7× and corrected p-values as low as 1.85×10−31.85 \times 10^{-3}1.85×10−3, suggesting insufficient security margin against this new attack vector. This represents the first practical distinguisher against the full 9-round Kuznyechik.

View on arXiv
@article{stanica2025_2507.02181,
  title={ Extended c-differential distinguishers of full 9 and reduced-round Kuznyechik cipher },
  author={ Pantelimon Stanica and Ranit Dutta and Bimal Mandal },
  journal={arXiv preprint arXiv:2507.02181},
  year={ 2025 }
}
Comments on this paper