Abstract | ||
---|---|---|
In 2015, the block cipher Kalyna has been approved as the new encryption standard of Ukraine. The cipher is a substitution-permutation network, whose design is based on AES, but includes several different features. Most notably, the key expansion in Kalyna is designed to resist recovering the master key from the round keys. In this paper we present a cache attack on the Kalyna key expansion algorithm. Our attack observes the cache access pattern during key expansion, and uses the obtained information together with one round key to completely recover the master key. We analyze all five parameter sets of Kalyna. Our attack significantly reduces the attack cost and is practical for the Kalyna-128/128 variant, where it is successful for over 97% of the keys and has a complexity of only 2 43.58 . To the best of our knowledge, this is the first attack on the Kalyna key expansion algorithm. To show that the attack is feasible, we run the cache attack on the reference implementation of Ka I yna-128/128, demonstrating that we can obtain the required side-channel information. We further perform the keyrecovery step on our university's high-performance compute cluster. We find the correct key within 37 hours and note that the attack requires 50K CPU hours for enumerating all key candidates. As a secondary contribution we observe that the additive key whitening used in Kalyna facilitates first round cache attacks. Specifically, we design an attack that can recover the full first round key with only seven adaptively chosen plaintexts. |
Year | DOI | Venue |
---|---|---|
2022 | 10.1007/978-3-030-95312-6_12 | TOPICS IN CRYPTOLOGY, CT-RSA 2022 |
DocType | Volume | ISSN |
Conference | 13161 | 0302-9743 |
Citations | PageRank | References |
0 | 0.34 | 20 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Chitchanok Chuengsatiansup | 1 | 0 | 0.34 |
Daniel Genkin | 2 | 0 | 0.34 |
Yuval Yarom | 3 | 775 | 35.54 |
Zhiyuan Zhang | 4 | 0 | 0.34 |