Paper 2024/1230

Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY

Jianing Zhang, Shanghai Jiao Tong University
Haoyang Wang, Shanghai Jiao Tong University
Deng Tang, Shanghai Jiao Tong University
Abstract

The impossible boomerang (IB) attack was first introduced by Lu in his doctoral thesis and subsequently published at DCC in 2011. The IB attack is a variant of the impossible differential (ID) attack by incorporating the idea of the boomerang attack. In this paper, we revisit the IB attack, and introduce the incompatibility of two characteristics in boomerang to the construction of an IB distinguisher. With our methodology, all the constructions of IB distinguisher are represented in a unified manner. Moreover, we show that the related-(twea)key IB distinguishers possess more freedom than the ones of ID so that it can cover more rounds. We also propose a new tool based on Mixed-Integer Quadratically-Constrained Programming (MIQCP) to search for IB attacks. To illustrate the power of the IB attack, we mount attacks against three tweakable block ciphers: Deoxys-BC, Joltik-BC and SKINNY. For Deoxys-BC, we propose a related-tweakey IB attack on 14-round Deoxys-BC-384, which improves the best previous related-tweakey ID attack by 2 rounds, and we improve the data complexity of the best previous related-tweakey ID attack on 10-round Deoxys-BC-256. For Joltik-BC, we propose the best attacks against 10-round Joltik-BC-128 and 14-round Joltik-BC-192 with related-tweakey IB attack. For SKINNY-n-3n, we propose a 27-round related-tweakey IB attack, which improves both the time and the memory complexities of the best previous ID attack. We also propose the first related-tweakey IB attack on 28 round SKINNY-n-3n, which improves the previous best ID attack by one round.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
A minor revision of an IACR publication in TOSC 2024
DOI
https://doi.org/10.46586/tosc.v2024.i2.254-295
Keywords
Impossible Boomerang AttackMIQCPDeoxys-BCJoltik-BCSKINNY
Contact author(s)
zhangjn @ sjtu edu cn
haoyang wang @ sjtu edu cn
dengtang @ sjtu edu cn
History
2024-08-05: approved
2024-08-02: received
See all versions
Short URL
https://ia.cr/2024/1230
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1230,
      author = {Jianing Zhang and Haoyang Wang and Deng Tang},
      title = {Impossible Boomerang Attacks Revisited: Applications to Deoxys-{BC}, Joltik-{BC} and {SKINNY}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1230},
      year = {2024},
      doi = {https://doi.org/10.46586/tosc.v2024.i2.254-295},
      url = {https://eprint.iacr.org/2024/1230}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.