https://hal.inria.fr/hal-01944598Boura, ChristinaChristinaBouraUVSQ - Université de Versailles Saint-Quentin-en-YvelinesSECRET - Security, Cryptology and Transmissions - Inria de Paris - Inria - Institut National de Recherche en Informatique et en AutomatiqueCanteaut, AnneAnneCanteautSECRET - Security, Cryptology and Transmissions - Inria de Paris - Inria - Institut National de Recherche en Informatique et en AutomatiqueOn the Boomerang Uniformity of Cryptographic SboxesHAL CCSD2018SboxBoomerang Connectivity TableBoomerang attackBoomerang uniformity[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]Canteaut, Anne2018-12-04 17:31:392022-10-25 16:23:132018-12-05 11:57:44enJournal articleshttps://hal.inria.fr/hal-01944598/document10.13154/tosc.v2018.i3.290-310application/pdf1The boomerang attack is a cryptanalysis technique against block ciphers which combines two differentials for the upper part and the lower part of the cipher. The dependency between these two differentials then highly affects the complexity of the attack and all its variants. Recently, Cid et al. introduced at Eurocrypt’18 a new tool, called the Boomerang Connectivity Table (BCT) that permits to simplify this complexity analysis, by storing and unifying the different switching probabilities of the cipher’s Sbox in one table. In this seminal paper a brief analysis of the properties of these tables is provided and some open questions are raised. It is being asked in particular whether Sboxes with optimal BCTs exist for even dimensions, where optimal means that the maximal value in the BCT equals the lowest known differentialuniformity. When the dimension is even and differs from 6, such optimal Sboxes correspond to permutations such that the maximal value in their DDT and in their BCT equals 4 (unless APN permutations for such dimensions exist). We provide in this work a more in-depth analysis of boomerang connectivity tables, by studying more closely differentially 4-uniform Sboxes. We first completely characterize the BCT of all differentially 4-uniform permutations of 4 bits and then study these objects for some cryptographically relevant families of Sboxes, as the inverse function and quadratic permutations. These two families provide us with the first examples of differentially 4-uniform Sboxes optimal against boomerang attacks for an even number of variables, answering the above open question.