Method of Security Evaluation of the LBlock-like Ciphers against Differential Cryptanalysis

dc.contributor.authorYakymchuk, Oleksii
dc.contributor.authorLopatetskyi, Mykhailo
dc.date.accessioned2026-02-25T13:26:44Z
dc.date.available2026-02-25T13:26:44Z
dc.date.issued2025
dc.description.abstractThis paper considers the problem of estimating the security of the lightweight block cipher LBlockagainst differential cryptanalysis. We formalize the process and present two algorithms of computingupper bounds for differential probabilities. The baseline algorithm provides approximate estimatesbased on the number of active๐‘†-boxes, while the refined algorithm incorporates the full probabilitydistributions of๐‘†-box differentials, yielding significantly better bounds.To illustrate the efficiency of the proposed methodology, we introduce a modified version of LBlockwith8ร—8๐‘†-boxes, which has lower computational complexity and allows experimental evaluationon our resources. We consider different linear permutations of encryption round, analyzing affect theestimates produced by both algorithms. The results demonstrate that the refined algorithm achievesmuch smaller maximum bounds (below2โˆ’40in the best cases) compared to the baseline approach andprovides a more accurate characterization of security against differential cryptanalysis.Overall, the proposed algorithms make it possible to efficiently evaluate the provable security ofLBlock-like ciphers against differential cryptanalysis
dc.format.pagerangeP. 13-23
dc.identifier.citationYakymchuk, O. Method of Security Evaluation of the LBlock-like Ciphers against Differential Cryptanalysis / Oleksii Yakymchuk, Mykhailo Lopatetskyi // Theoretical and Applied Cybersecurity: scientific journal. โ€“ 2025. โ€“ Vol. 7, No. 2. โ€“ P. 13-23. โ€“ Bibliogr.: 17 ref.
dc.identifier.doihttps://doi.org/10.20535/tacs.2664-29132025.2.339994
dc.identifier.orcid0009-0000-6911-0708
dc.identifier.urihttps://ela.kpi.ua/handle/123456789/79043
dc.language.isoen
dc.publisherIgor Sikorsky Kyiv Polytechnic Institute
dc.publisher.placeKyiv
dc.relation.ispartofTheoretical and Applied Cybersecurity: scientific journal, Vol. 7, No. 2
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/deed.uk
dc.subjectsymmetric cryptography
dc.subjectblock cipher
dc.subjectdifferential cryptanalysis
dc.subjectLBlock
dc.subject.udc003.26.09
dc.titleMethod of Security Evaluation of the LBlock-like Ciphers against Differential Cryptanalysis
dc.typeArticle

ะคะฐะนะปะธ

ะšะพะฝั‚ะตะนะฝะตั€ ั„ะฐะนะปั–ะฒ
ะ—ะฐั€ะฐะท ะฟะพะบะฐะทัƒั”ะผะพ 1 - 1 ะท 1
ะ’ะฐะฝั‚ะฐะถะธั‚ัŒัั...
ะ•ัะบั–ะท
ะะฐะทะฒะฐ:
13-23.pdf
ะ ะพะทะผั–ั€:
9.5 MB
ะคะพั€ะผะฐั‚:
Adobe Portable Document Format
ะ›ั–ั†ะตะฝะทั–ะนะฝะฐ ัƒะณะพะดะฐ
ะ—ะฐั€ะฐะท ะฟะพะบะฐะทัƒั”ะผะพ 1 - 1 ะท 1
ะ•ัะบั–ะท ะฝะตะดะพัั‚ัƒะฟะฝะธะน
ะะฐะทะฒะฐ:
license.txt
ะ ะพะทะผั–ั€:
8.98 KB
ะคะพั€ะผะฐั‚:
Item-specific license agreed upon to submission
ะžะฟะธั: