On the Boomerang Uniformity of Cryptographic Sboxes
The boomerang attack is a cryptanalysis technique against block ciphers which combines two differentials for the upper part and the lower part of the cipher. The dependency between these two differentials then highly affects the complexity of the attack and all its variants. Recently, Cid et al. in...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2018-09-01
|
Series: | IACR Transactions on Symmetric Cryptology |
Subjects: | |
Online Access: | https://tosc.iacr.org/index.php/ToSC/article/view/7304 |
id |
doaj-a189257d6b3c4958b4b8fae05963ccac |
---|---|
record_format |
Article |
spelling |
doaj-a189257d6b3c4958b4b8fae05963ccac2021-03-02T10:21:48ZengRuhr-Universität BochumIACR Transactions on Symmetric Cryptology2519-173X2018-09-012018310.13154/tosc.v2018.i3.290-310On the Boomerang Uniformity of Cryptographic SboxesChristina Boura0Anne Canteaut1University of Versailles and InriaInria The boomerang attack is a cryptanalysis technique against block ciphers which combines two differentials for the upper part and the lower part of the cipher. The dependency between these two differentials then highly affects the complexity of the attack and all its variants. Recently, Cid et al. introduced at Eurocrypt’18 a new tool, called the Boomerang Connectivity Table (BCT) that permits to simplify this complexity analysis, by storing and unifying the different switching probabilities of the cipher’s Sbox in one table. In this seminal paper a brief analysis of the properties of these tables is provided and some open questions are raised. It is being asked in particular whether Sboxes with optimal BCTs exist for even dimensions, where optimal means that the maximal value in the BCT equals the lowest known differential uniformity. When the dimension is even and differs from 6, such optimal Sboxes correspond to permutations such that the maximal value in their DDT and in their BCT equals 4 (unless APN permutations for such dimensions exist). We provide in this work a more in-depth analysis of boomerang connectivity tables, by studying more closely differentially 4-uniform Sboxes. We first completely characterize the BCT of all differentially 4-uniform permutations of 4 bits and then study these objects for some cryptographically relevant families of Sboxes, as the inverse function and quadratic permutations. These two families provide us with the first examples of differentially 4-uniform Sboxes optimal against boomerang attacks for an even number of variables, answering the above open question. https://tosc.iacr.org/index.php/ToSC/article/view/7304SboxBoomerang Connectivity TableBoomerang attackBoomerang uniformity |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Christina Boura Anne Canteaut |
spellingShingle |
Christina Boura Anne Canteaut On the Boomerang Uniformity of Cryptographic Sboxes IACR Transactions on Symmetric Cryptology Sbox Boomerang Connectivity Table Boomerang attack Boomerang uniformity |
author_facet |
Christina Boura Anne Canteaut |
author_sort |
Christina Boura |
title |
On the Boomerang Uniformity of Cryptographic Sboxes |
title_short |
On the Boomerang Uniformity of Cryptographic Sboxes |
title_full |
On the Boomerang Uniformity of Cryptographic Sboxes |
title_fullStr |
On the Boomerang Uniformity of Cryptographic Sboxes |
title_full_unstemmed |
On the Boomerang Uniformity of Cryptographic Sboxes |
title_sort |
on the boomerang uniformity of cryptographic sboxes |
publisher |
Ruhr-Universität Bochum |
series |
IACR Transactions on Symmetric Cryptology |
issn |
2519-173X |
publishDate |
2018-09-01 |
description |
The boomerang attack is a cryptanalysis technique against block ciphers which combines two differentials for the upper part and the lower part of the cipher. The dependency between these two differentials then highly affects the complexity of the attack and all its variants. Recently, Cid et al. introduced at Eurocrypt’18 a new tool, called the Boomerang Connectivity Table (BCT) that permits to simplify this complexity analysis, by storing and unifying the different switching probabilities of the cipher’s Sbox in one table. In this seminal paper a brief analysis of the properties of these tables is provided and some open questions are raised. It is being asked in particular whether Sboxes with optimal BCTs exist for even dimensions, where optimal means that the maximal value in the BCT equals the lowest known differential uniformity. When the dimension is even and differs from 6, such optimal Sboxes correspond to permutations such that the maximal value in their DDT and in their BCT equals 4 (unless APN permutations for such dimensions exist). We provide in this work a more in-depth analysis of boomerang connectivity tables, by studying more closely differentially 4-uniform Sboxes. We first completely characterize the BCT of all differentially 4-uniform permutations of 4 bits and then study these objects for some cryptographically relevant families of Sboxes, as the inverse function and quadratic permutations. These two families provide us with the first examples of differentially 4-uniform Sboxes optimal against boomerang attacks for an even number of variables, answering the above open question.
|
topic |
Sbox Boomerang Connectivity Table Boomerang attack Boomerang uniformity |
url |
https://tosc.iacr.org/index.php/ToSC/article/view/7304 |
work_keys_str_mv |
AT christinaboura ontheboomeranguniformityofcryptographicsboxes AT annecanteaut ontheboomeranguniformityofcryptographicsboxes |
_version_ |
1724237080105582592 |