Title
Side-Channeling the Kalyna Key Expansion
Abstract
In 2015, the block cipher Kalyna has been approved as the new encryption standard of Ukraine. The cipher is a substitution-permutation network, whose design is based on AES, but includes several different features. Most notably, the key expansion in Kalyna is designed to resist recovering the master key from the round keys. In this paper we present a cache attack on the Kalyna key expansion algorithm. Our attack observes the cache access pattern during key expansion, and uses the obtained information together with one round key to completely recover the master key. We analyze all five parameter sets of Kalyna. Our attack significantly reduces the attack cost and is practical for the Kalyna-128/128 variant, where it is successful for over 97% of the keys and has a complexity of only 2 43.58 . To the best of our knowledge, this is the first attack on the Kalyna key expansion algorithm. To show that the attack is feasible, we run the cache attack on the reference implementation of Ka I yna-128/128, demonstrating that we can obtain the required side-channel information. We further perform the keyrecovery step on our university's high-performance compute cluster. We find the correct key within 37 hours and note that the attack requires 50K CPU hours for enumerating all key candidates. As a secondary contribution we observe that the additive key whitening used in Kalyna facilitates first round cache attacks. Specifically, we design an attack that can recover the full first round key with only seven adaptively chosen plaintexts.
Year
DOI
Venue
2022
10.1007/978-3-030-95312-6_12
TOPICS IN CRYPTOLOGY, CT-RSA 2022
DocType
Volume
ISSN
Conference
13161
0302-9743
Citations 
PageRank 
References 
0
0.34
20
Authors
4
Name
Order
Citations
PageRank
Chitchanok Chuengsatiansup100.34
Daniel Genkin200.34
Yuval Yarom377535.54
Zhiyuan Zhang400.34