On the Boomerang Uniformity of Cryptographic Sboxes

The boomerang attack is a cryptanalysis technique against block ciphers which combines two differentials for the upper part and the lower part of the cipher. The dependency between these two differentials then highly affects the complexity of the attack and all its variants. Recently, Cid et al. in...

Full description

Bibliographic Details
Main Authors: Christina Boura, Anne Canteaut
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2018-09-01
Series:IACR Transactions on Symmetric Cryptology
Subjects:
Online Access:https://tosc.iacr.org/index.php/ToSC/article/view/7304
id doaj-a189257d6b3c4958b4b8fae05963ccac
record_format Article
spelling doaj-a189257d6b3c4958b4b8fae05963ccac2021-03-02T10:21:48ZengRuhr-Universität BochumIACR Transactions on Symmetric Cryptology2519-173X2018-09-012018310.13154/tosc.v2018.i3.290-310On the Boomerang Uniformity of Cryptographic SboxesChristina Boura0Anne Canteaut1University of Versailles and InriaInria The boomerang attack is a cryptanalysis technique against block ciphers which combines two differentials for the upper part and the lower part of the cipher. The dependency between these two differentials then highly affects the complexity of the attack and all its variants. Recently, Cid et al. introduced at Eurocrypt’18 a new tool, called the Boomerang Connectivity Table (BCT) that permits to simplify this complexity analysis, by storing and unifying the different switching probabilities of the cipher’s Sbox in one table. In this seminal paper a brief analysis of the properties of these tables is provided and some open questions are raised. It is being asked in particular whether Sboxes with optimal BCTs exist for even dimensions, where optimal means that the maximal value in the BCT equals the lowest known differential uniformity. When the dimension is even and differs from 6, such optimal Sboxes correspond to permutations such that the maximal value in their DDT and in their BCT equals 4 (unless APN permutations for such dimensions exist). We provide in this work a more in-depth analysis of boomerang connectivity tables, by studying more closely differentially 4-uniform Sboxes. We first completely characterize the BCT of all differentially 4-uniform permutations of 4 bits and then study these objects for some cryptographically relevant families of Sboxes, as the inverse function and quadratic permutations. These two families provide us with the first examples of differentially 4-uniform Sboxes optimal against boomerang attacks for an even number of variables, answering the above open question. https://tosc.iacr.org/index.php/ToSC/article/view/7304SboxBoomerang Connectivity TableBoomerang attackBoomerang uniformity
collection DOAJ
language English
format Article
sources DOAJ
author Christina Boura
Anne Canteaut
spellingShingle Christina Boura
Anne Canteaut
On the Boomerang Uniformity of Cryptographic Sboxes
IACR Transactions on Symmetric Cryptology
Sbox
Boomerang Connectivity Table
Boomerang attack
Boomerang uniformity
author_facet Christina Boura
Anne Canteaut
author_sort Christina Boura
title On the Boomerang Uniformity of Cryptographic Sboxes
title_short On the Boomerang Uniformity of Cryptographic Sboxes
title_full On the Boomerang Uniformity of Cryptographic Sboxes
title_fullStr On the Boomerang Uniformity of Cryptographic Sboxes
title_full_unstemmed On the Boomerang Uniformity of Cryptographic Sboxes
title_sort on the boomerang uniformity of cryptographic sboxes
publisher Ruhr-Universität Bochum
series IACR Transactions on Symmetric Cryptology
issn 2519-173X
publishDate 2018-09-01
description The boomerang attack is a cryptanalysis technique against block ciphers which combines two differentials for the upper part and the lower part of the cipher. The dependency between these two differentials then highly affects the complexity of the attack and all its variants. Recently, Cid et al. introduced at Eurocrypt’18 a new tool, called the Boomerang Connectivity Table (BCT) that permits to simplify this complexity analysis, by storing and unifying the different switching probabilities of the cipher’s Sbox in one table. In this seminal paper a brief analysis of the properties of these tables is provided and some open questions are raised. It is being asked in particular whether Sboxes with optimal BCTs exist for even dimensions, where optimal means that the maximal value in the BCT equals the lowest known differential uniformity. When the dimension is even and differs from 6, such optimal Sboxes correspond to permutations such that the maximal value in their DDT and in their BCT equals 4 (unless APN permutations for such dimensions exist). We provide in this work a more in-depth analysis of boomerang connectivity tables, by studying more closely differentially 4-uniform Sboxes. We first completely characterize the BCT of all differentially 4-uniform permutations of 4 bits and then study these objects for some cryptographically relevant families of Sboxes, as the inverse function and quadratic permutations. These two families provide us with the first examples of differentially 4-uniform Sboxes optimal against boomerang attacks for an even number of variables, answering the above open question.
topic Sbox
Boomerang Connectivity Table
Boomerang attack
Boomerang uniformity
url https://tosc.iacr.org/index.php/ToSC/article/view/7304
work_keys_str_mv AT christinaboura ontheboomeranguniformityofcryptographicsboxes
AT annecanteaut ontheboomeranguniformityofcryptographicsboxes
_version_ 1724237080105582592