Abstract
The guaranteed number of activations (GNA) is an important characteristic to determine the effectiveness of differential cryptanalysis of a given \(\textsf{XS}\)-circuit. In this paper, we propose an approach to optimize the known algorithm for GNA computation based on the branch and bound method. We also analyze special matrices that define \(\textsf{XS}\)-circuit. The experiments show that the proposed algorithm significantly outperforms the existing approach. In this paper, we prove that canonical forms of \(\textsf{XS}\)-circuit and its dual coincide, providing the strict connection between the guaranteed number of linear and differential activations. The circuits with the extremal values of GNA are studied. We made several hypotheses based on computational experiments. One of the hypotheses is that there are no \(\textsf{XS}\)-circuits of dimension greater than 2, which achieve an optimal GNA on every round.





Similar content being viewed by others
References
Agievich, S.V.: XS-circuits in block ciphers. Mat. Vopr. Kriptogr. 10, 7–30 (2019)
Berger, T.P., Minier, M., Thomas, G.: Extended generalized Feistel networks using matrix representation. In Lange, T., Lauter, K. & Lisonek, P. (eds.) SAC 2013, vol. 8282 of LNCS, 289–305 (Springer, Heidelberg), (2014)
Blondeau, C., Bogdanov, A., Wang, M.: On the (in)equivalence of impossible differential and zero-correlation distinguishers for Feistel- and Skipjack-type ciphers. In Boureanu, I., Owesarski, P. & Vaudenay, S. (eds.) ACNS 14, vol. 8479 of LNCS, 271–288 (Springer, Heidelberg), (2014)
Blondeau, C., Minier, M.: Analysis of impossible, integral and zero-correlation attacks on type-II generalized Feistel networks using the matrix method. In Leander, G. (ed.) FSE 2015, vol. 9054 of LNCS, 92–113 (Springer, Heidelberg), (2015)
Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology 4, 3–72 (1991)
Agievich, S.V.: On the guaranteed number of activations in XS-circuits. Mat. Vopr. Kriptogr. 12, 7–20 (2021)
Matsui, M.: Linear cryptanalysis method for DES cipher. In Helleseth, T. (ed.) EUROCRYPT’93, vol. 765 of LNCS, 386–397 (Springer, Heidelberg), (1994)
Malyshev, F.: The duality of differential and linear methods in cryptography. Mat. Vopr. Kriptogr. 5, 35–47 (2014)
Sun, S. et al.: Automatic security evaluation and (related-key) differential characteristic search: Application to SIMON, PRESENT, LBlock, DES(L) and other bit-oriented block ciphers. In Sarkar, P. & Iwata, T. (eds.) ASIACRYPT 2014, Part I, vol. 8873 of LNCS, 158–178 (Springer, Heidelberg), (2014)
Little, J.D.C., Murty, K.G., Sweeney, D.W., Karel, C.: An algorithm for the traveling salesman problem. Operations Research 11, 972–989 (1963)
Python implementation of algorithm for calculating the guaranteed number of activations in a given cascade. https://github.com/agievich/xs
Stb 34.101.31-2011. information technology and security. data encryption and integrity algorithms. (2011). http://apmi.bsu.by/assets/files/std/belt-spec27.pdf
Su, B., Wu, W., Zhang, W.: Differential cryptanalysis of SMS4 block cipher. Cryptology ePrint Archive, Report 2010/062 (2010). https://eprint.iacr.org/2010/062
Acknowledgements
We wish to thank Sergey Agievich for valuable discussions and advice.
Funding
The work is supported by the Mathematical Center in Akademgorodok under the Agreement No. 075-15-2022-282 with the Ministry of Science and Higher Education of the Russian Federation.
Author information
Authors and Affiliations
Contributions
All authors contributed to the ideas that led to the results presented in the manuscript text. All authors reviewed the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix A Theorem 2 proof
Appendix A Theorem 2 proof
Proof
Denote the dual circuit to the (a, B, c) as \(\big (\bar{a}, \bar{B}, \bar{c}\big )\). By definition of duality: \(\bar{a} = c^T, \bar{B} = B^T, \bar{c} = a^T\). We bring the \(\big (\bar{a}, \bar{B}, \bar{c}\big )\) to the first canonical form \(\big (\widetilde{a},\widetilde{B},\widetilde{c}\big )\) by using the theory from [1]:
1) Let us find the matrix \(\widetilde{B} = A^{-1} \bar{B} A = A^{-1} B^T A\), where \({A =\big ( \bar{a} \ \bar{B} \bar{a} \dots \bar{B}^{n-1} \bar{a} \big )}\).
Since \(\bar{a} = c^T\) and \(c = (0, \dots ,0,1)\), then in \(\bar{B}^{i} \bar{a}\) we are only interested in the last column.
Note that the matrix \(\bar{B}\), when multiplied on the left, lifts the last \(n-1\) rows one up. Denote by \(\alpha _i\) the lower right element of the matrix \(\bar{B}^i\). Then, the matrix A has the following form:
where \(\alpha _i = b_{n+1-i} + \sum \nolimits _{j=1}^{i-1}\alpha _{j}b_{n+1-i+j}\). Then from \(AA^{-1}=E\) find the elements of the matrix \(A^{-1}\):
where \(\alpha _{i}^{-1} = \alpha _{i} + \sum \nolimits _{j=1}^{i-1}\alpha _{j}^{-1}\alpha _{i-j}\).
where \(c_i = b_{n+1-i} + \sum \nolimits _{j=1}^{i-1}\alpha _{j}b_{n+1-i+j} = \alpha _i\).
where \(w_{n+1-i} = \alpha _i + \sum \nolimits _{j=1}^{i-1}\alpha _{j}^{-1}\alpha _{i-j} = \alpha _{i}^{-1}\), \(i=1,2,\ldots ,n\). Consider these numbers in detail:
We obtain that
and finally \(\widetilde{B} = B\).
2) Now let us find the vector \(\widetilde{a} = PA^{-1}\bar{a} = PA^{-1}c^T\).
We have
so we are only interested in the first column of the matrix P.
where \(M_n = E, M_i = BM_{i+1} + b_{i+1}E = B^{n-i} + b_{n}B^{n-i-1} + \ldots + b_{i-1}E\).
where \(v_i = a_{n+1-i} + \sum \nolimits _{j=1}^{i-1}\alpha _{j}a_{n+1-i+j}\), \(i=1,2,\ldots ,n\). Consider in detail these matrices
Then
where \(p_{n+1-i} = v_i + \sum \nolimits _{j=1}^{i-1}v_{j}b_{n+1-i+j} = a_{n+1-i} + \sum \nolimits _{j=1}^{i-1}\left( \alpha _{j}a_{n+1-i+j} + v_{j}b_{n+1-i+j}\right) \).
We are to prove that \(\sum \nolimits _{j=1}^{i-1}\left( \alpha _{j}a_{n+1-i+j} + v_{j}b_{n+1-i+j}\right) =0\). It can be
Consider the last two amounts separately. For the first one, it holds
whereas for the second one we have the following multipliers with each \(\alpha _i\), \({i=1,2,\ldots ,i-2}\):
therefore, all the multipliers of \(\alpha _i\) are zero.
Thus, we obtain that \(p_i = a_i\) for \(i=1,2,\ldots ,n\). Then it holds
\(\square \)
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Parfenov, D., Bakharev, A., Kutsenko, A. et al. Optimization of the algorithm to compute the guaranteed number of activations in \(\textsf{XS}\)-circuits and its application to the analysis of block ciphers. J Cryptogr Eng 15, 4 (2025). https://doi.org/10.1007/s13389-025-00374-8
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s13389-025-00374-8