Log in

Differences with high probability and impossible differentials for the KB-256 cipher

  • Original Paper
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

In this paper differences with probability 1 were found for 6 and 7 rounds of KB-256 block cipher. Also using Biham’s et al. shrinking technique we find more than 1700 impossible differentials for the KB-256 cipher with number of rounds from 8 up to 18 (2 rounds more than in the original KB-256)

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Data availibility statement

The data that support the findings of this study are openly available in kb_anlysis at https://github.com/Astrarog/hse-impossible, reference number [12].

References

  1. Biham, E., Shamir, A.: Differential cryptanalysis of des-like cryptosystems. In: Menezes, A.J., Vanstone, S.A. (eds.) Advances in Cryptology-CRYPTO’ 90, pp. 2–21. Springer, Berlin, Heidelberg (1991)

    Chapter  Google Scholar 

  2. Matsui, M.: Linear cryptanalysis method for des cipher. In: Helleseth, T. (ed.) Advances in Cryptology – EUROCRYPT ’93, pp. 386–397. Springer, Berlin, Heidelberg (1994)

    Chapter  Google Scholar 

  3. Malyshev, F.M., Trishin, A.E.: Linear and differential cryptanalysis: Another viewpoint 11(2), 83–98 (2020)

    Google Scholar 

  4. Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit blockcipher clefia (extended abstract). In: Biryukov, A. (ed.) Fast Software Encryption, pp. 181–195. Springer, Berlin, Heidelberg (2007)

  5. Shirai, T., Preneel, B.: On feistel ciphers using optimal diffusion map**s across multiple rounds. In: International Conference on the Theory and Application of Cryptology and Information Security (2004). https://api.semanticscholar.org/CorpusID:11202917

  6. Shirai, T., Shibutani, K.: On feistel structures using a diffusion switching mechanism. In: Fast Software Encryption Workshop (2006). https://api.semanticscholar.org/CorpusID:16285931

  7. The 128-bit blockcipher clefia security and performance evaluations. https://api.semanticscholar.org/CorpusID:46963092

  8. Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. J. Cryptol. 18(4) (2002)

  9. Fomichev, V.M., Koreneva, A.M., Miftakhutdinova, A.R., Zadorozhny, D.I.: Evaluation of the maximum performance of block encryption algorithms. Matematicheskie Voprosy Kriptografii 10(2), 181–191 (2019)

    Article  MathSciNet  Google Scholar 

  10. Fomichev, V.M., Koreneva, A.M.: Encryption performance and security of certain wide block ciphers. Journal of Computer Virology and Hacking Techniques 16, 197–216 (2020)

    Article  Google Scholar 

  11. GOST 34.12-2018 Information Technology. Cryptographic data security. Block ciphers, Russia (2018)

  12. Astrakhancev, R.: Source code of the implementation of the algorithm for enumeration of impossible differentials. https://github.com/Astrarog/hse - impossible

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to A. Chuhno or A. Dmukh.

Ethics declarations

Conflict of interest

The authors declare that there are no conflict of interest regarding the publication of this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Astrakhantsev, R., Chuhno, A., Dmukh, A. et al. Differences with high probability and impossible differentials for the KB-256 cipher. J Comput Virol Hack Tech (2024). https://doi.org/10.1007/s11416-024-00532-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11416-024-00532-2

Keywords

Navigation