International Association for Cryptologic Research

International Association
for Cryptologic Research

Transactions on Symmetric Cryptology, Volume 2024

On Impossible Boomerang Attacks


Xavier Bonnetain
Université de Lorraine, CNRS, Inria, LORIA, Nancy, France

Margarita Cordero
Université de Lorraine, CNRS, Inria, LORIA, Nancy, France

Virginie Lallemand
Université de Lorraine, CNRS, Inria, LORIA, Nancy, France

Marine Minier
Université de Lorraine, CNRS, Inria, LORIA, Nancy, France

María Naya-Plasencia
Inria, Paris, France


Keywords: Cryptanalysis, Impossible boomerang attack, Simon, SKINNYee


Abstract

The impossible boomerang attack, introduced in 2008 by Jiqiang Lu, is an extension of the impossible differential attack that relies on a boomerang distinguisher of probability 0 for discarding incorrect key guesses. In Lu’s work, the considered impossible boomerang distinguishers were built from 4 (different) probability-1 differentials that lead to 4 differences that do not sum to 0 in the middle, in a miss-in-the-middle way. In this article, we study the possibility of extending this notion by looking at finerlevel contradictions that derive from boomerang switch constraints. We start by discussing the case of quadratic Feistel ciphers and in particular of the Simon ciphers. We exploit their very specific boomerang constraints to enforce a contradiction that creates a new type of impossible boomerang distinguisher that we search with an SMT solver. We next switch to word-oriented ciphers and study how to leverage the Boomerang Connectivity Table contradictions. We apply this idea to SKINNYee, a recent tweakable block cipher proposed at Crypto 2022 and obtain a 21-round distinguisher. After detailing the process and the complexities of an impossible boomerang attack in the single (twea)key and related (twea)key model, we extend our distinguishers into attacks and present a 23-round impossible boomerang attack on Simon-32/64 (out of 32 rounds) and a 29-round impossible boomerang attack on SKINNYee (out of 56 rounds). To the best of our knowledge our analysis covers two more rounds than the (so far, only) other third-party analysis of SKINNYee that has been published to date.

Publication

Transactions on Symmetric Cryptology, Volume 2024, Issue 2

Paper

Artifact

Artifact number
tosc/2024/a2

Artifact published
September 5, 2025

Badge
IACR FSE Artifacts Functional

README

TGZ (58701 Bytes)  

View on Github

License
This work is licensed under the MIT License.

Some files in this archive are licensed under a different license. See the contents of this archive for more information.

Note that license information is supplied by the authors and has not been confirmed by the IACR.


BibTeX How to cite

Bonnetain, X., Cordero, M., Lallemand, V., Minier, M., & Naya-Plasencia, M. (2024). On Impossible Boomerang Attacks: Application to Simon and SKINNYee. IACR Transactions on Symmetric Cryptology, 2024(2), 222-253. https://doi.org/10.46586/tosc.v2024.i2.222-253. Artifact available at https://artifacts.iacr.org/tosc/2025/a2