119
v1v2v3 (latest)

Extended c-differential distinguishers of full 9 and reduced-round Kuznyechik cipher

Main:16 Pages
5 Figures
Bibliography:4 Pages
24 Tables
Appendix:16 Pages
Abstract

This paper introduces {\em truncated inner cc-differential cryptanalysis}, a technique that enables the practical application of cc-differential uniformity to block ciphers. While Ellingsen et al. (IEEE Trans. Inf. Theory, 2020) established the notion of cc-differential uniformity by analyzing the equation F(xa)cF(x)=bF(x\oplus a) \oplus cF(x) = b, a key challenge remained: the outer multiplication by cc disrupts the structural properties essential for block cipher analysis, particularly key addition. We address this challenge by developing an \emph{inner} cc-differential approach where multiplication by cc affects the input: (F(cxa),F(x))(F(cx\oplus a), F(x)), thereby returning to the original idea of Borisov et al. (FSE, 2002). We prove that the inner cc-differential uniformity of a function FF equals the outer cc-differential uniformity of F1F^{-1}, establishing a duality between the two notions. This modification preserves cipher structure while enabling practical cryptanalytic applications.We apply our methodology to Kuznyechik (GOST R 34.12-2015) without initial key whitening. For reduced rounds, we construct explicit cc-differential trails achieving probability 284.02^{-84.0} for two rounds and 2169.72^{-169.7} for three rounds, representing improvements of 5.2 and 4.6 bits respectively over the best classical differential trails. For the full 9-round cipher, we develop a statistical truncated cc-differential distinguisher. Through computational analysis involving millions of differential pairs, we identify configurations with bias ratios reaching 1.7×1.7\times and corrected p-values as low as 1.85×1031.85 \times 10^{-3}. The distinguisher requires data complexity 2332^{33} chosen plaintext pairs, time complexity 2342^{34}, and memory complexity 2162^{16}.

View on arXiv
Comments on this paper