The answer of Roman Oliynykov is presented below, while his account is waiting for the approval.
"Thanks for interest to Kalyna, but your hypothesis is incorrect. It seems to you that it's possible split the whole 128-bit cipher into 16 independent 8-bit ciphers, and only arithmetic addition modulo 2^{64} prevents you. It's not true, you don't take into account linear operations of the cipher. Otherwise you can easily do the same with AES, Camellia and many other byte-oriented symmetric primitives and break them with chosen plaintext attack with 2^8 complexity. You can practically check (and disprove) your
hypotheses by fixing any 15 input bytes of the plaintext and changing the remaining byte, looking to changing of the ciphertext. You can take any implementation of AES (which does not have modular addition). Optimized implementation of Kalyna, as well as AES, you can download from here: [
github.com]."