## CryptoDB

### Paper: On the Boomerang Uniformity of Cryptographic Sboxes

Authors: Christina Boura , University of Versailles and Inria Anne Canteaut , Inria DOI: 10.13154/tosc.v2018.i3.290-310 URL: https://tosc.iacr.org/index.php/ToSC/article/view/7304 Search ePrint Search Google Slides The boomerang attack is a cryptanalysis technique against block ciphers which combines two differentials for the upper part and the lower part of the cipher. The dependency between these two differentials then highly affects the complexity of the attack and all its variants. Recently, Cid et al. introduced at Eurocrypt’18 a new tool, called the Boomerang Connectivity Table (BCT) that permits to simplify this complexity analysis, by storing and unifying the different switching probabilities of the cipher’s Sbox in one table. In this seminal paper a brief analysis of the properties of these tables is provided and some open questions are raised. It is being asked in particular whether Sboxes with optimal BCTs exist for even dimensions, where optimal means that the maximal value in the BCT equals the lowest known differential uniformity. When the dimension is even and differs from 6, such optimal Sboxes correspond to permutations such that the maximal value in their DDT and in their BCT equals 4 (unless APN permutations for such dimensions exist). We provide in this work a more in-depth analysis of boomerang connectivity tables, by studying more closely differentially 4-uniform Sboxes. We first completely characterize the BCT of all differentially 4-uniform permutations of 4 bits and then study these objects for some cryptographically relevant families of Sboxes, as the inverse function and quadratic permutations. These two families provide us with the first examples of differentially 4-uniform Sboxes optimal against boomerang attacks for an even number of variables, answering the above open question.
##### BibTeX
@article{tosc-2018-29242,
title={On the Boomerang Uniformity of Cryptographic Sboxes},
journal={IACR Transactions on Symmetric Cryptology},
publisher={Ruhr-Universität Bochum},
volume={2018, Issue 3},
pages={290-310},
url={https://tosc.iacr.org/index.php/ToSC/article/view/7304},
doi={10.13154/tosc.v2018.i3.290-310},
author={Christina Boura and Anne Canteaut},
year=2018
}