Paper 2024/577

Determination of cryptographic tables and properties related to the revised boomerang and its application to a fundamental S-box

Said Eddahmani, Paris 8 University
Sihem Mesnager, Paris 8 University, Telecom Paris
Abstract

In symmetric cryptography, vectorial Boolean functions over finite fields F2n derive strong S-boxes. To this end, the S-box should satisfy a list of tests to resist existing attacks, such as the differential, linear, boomerang, and variants. Several tables are employed to measure an S- box’s resistance, such as the difference distribution table (DDT) and the boomerang connectivity table (BCT). Following the boomerang attacks recently revisited in terms of the boomerang switch effect, with a lustra- tion highlighting the power of this technique, a tool called the Boomerang Difference Table (BDT), an alternative to the classical Boomerang BCT, was introduced. Next, two novel tables have been introduced, namely, the Upper Boomerang Connectivity Table (UBCT) and the Lower Boomerang Connectivity Table (LBCT), which are considered improvements over BCT while allowing systematic evaluation of boomerangs to return over mul- tiple rounds. This paper focuses on the new tools for measuring the revisited version of boomerang attacks and the related tables UBCT, LBCT, as well as the so-called Extended Boomerang Connectivity Table (EBCT). Specifically, we shall study the properties of these novel tools and investigate the corresponding tables. We also study their interconnections, their links to the DDT, and their values for affine equivalent vectorial functions and compositional inverses of permutations of F2n . Moreover, we introduce the concept of the nontrivial boomerang connectivity uniformity and determine the explicit values of all the entries of the EBCT, LBCT, and EBCT for the important cryptographic case of the inverse function.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
vectorial Boolean functionsboomerang connectivity tableUpper Boomerang Connectivity TableLower Boomerang Connectivity TableExtended Boomerang Connectivity Table
Contact author(s)
said eddahmani @ etud univ-paris8 fr
smesnager @ univ-paris8 fr
History
2024-04-16: approved
2024-04-15: received
See all versions
Short URL
https://ia.cr/2024/577
License
No rights reserved
CC0

BibTeX

@misc{cryptoeprint:2024/577,
      author = {Said Eddahmani and Sihem Mesnager},
      title = {Determination of cryptographic tables and properties related to the revised boomerang and its application to a fundamental S-box},
      howpublished = {Cryptology ePrint Archive, Paper 2024/577},
      year = {2024},
      note = {\url{https://eprint.iacr.org/2024/577}},
      url = {https://eprint.iacr.org/2024/577}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.