Transactions on Symmetric Cryptology, Volume 2024
On Impossible Boomerang Attacks
Xavier Bonnetain
Université de Lorraine, CNRS, Inria, LORIA, Nancy, France
Margarita Cordero
Université de Lorraine, CNRS, Inria, LORIA, Nancy, France
Virginie Lallemand
Université de Lorraine, CNRS, Inria, LORIA, Nancy, France
Marine Minier
Université de Lorraine, CNRS, Inria, LORIA, Nancy, France
María Naya-Plasencia
Inria, Paris, France
Keywords: Cryptanalysis, Impossible boomerang attack, Simon, SKINNYee
Abstract
The impossible boomerang attack, introduced in 2008 by Jiqiang Lu, is an extension of the impossible differential attack that relies on a boomerang distinguisher of probability 0 for discarding incorrect key guesses. In Lu’s work, the considered impossible boomerang distinguishers were built from 4 (different) probability-1 differentials that lead to 4 differences that do not sum to 0 in the middle, in a miss-in-the-middle way. In this article, we study the possibility of extending this notion by looking at finerlevel contradictions that derive from boomerang switch constraints. We start by discussing the case of quadratic Feistel ciphers and in particular of the Simon ciphers. We exploit their very specific boomerang constraints to enforce a contradiction that creates a new type of impossible boomerang distinguisher that we search with an SMT solver. We next switch to word-oriented ciphers and study how to leverage the Boomerang Connectivity Table contradictions. We apply this idea to SKINNYee, a recent tweakable block cipher proposed at Crypto 2022 and obtain a 21-round distinguisher. After detailing the process and the complexities of an impossible boomerang attack in the single (twea)key and related (twea)key model, we extend our distinguishers into attacks and present a 23-round impossible boomerang attack on Simon-32/64 (out of 32 rounds) and a 29-round impossible boomerang attack on SKINNYee (out of 56 rounds). To the best of our knowledge our analysis covers two more rounds than the (so far, only) other third-party analysis of SKINNYee that has been published to date.
Publication
Transactions on Symmetric Cryptology, Volume 2024, Issue 2
PaperArtifact
Artifact number
tosc/2024/a2
Artifact published
September 5, 2025
Badge
IACR FSE Artifacts Functional
License
This work is licensed under the MIT License.
Some files in this archive are licensed under a different license. See the contents of this archive for more information.
Note that license information is supplied by the authors and has not been confirmed by the IACR.
BibTeX How to cite
Bonnetain, X., Cordero, M., Lallemand, V., Minier, M., & Naya-Plasencia, M. (2024). On Impossible Boomerang Attacks: Application to Simon and SKINNYee. IACR Transactions on Symmetric Cryptology, 2024(2), 222-253. https://doi.org/10.46586/tosc.v2024.i2.222-253. Artifact available at https://artifacts.iacr.org/tosc/2025/a2