@article{Wang_Wang_Sun_2023, title={SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers}, volume={2023}, url={https://tosc.iacr.org/index.php/ToSC/article/view/10311}, DOI={10.46586/tosc.v2023.i1.152-191}, abstractNote={<p>In Addition-Rotation-Xor (ARX) ciphers, the large domain size obstructs the application of the boomerang connectivity table. In this paper, we explore the problem of computing this table for a modular addition and the automatic search of boomerang characteristics for ARX ciphers. We provide dynamic programming algorithms to efficiently compute this table and its variants. These algorithms are the most efficient up to now. For the boomerang connectivity table, the execution time is 4<sup>2</sup>(<em>n</em> − 1) simple operations while the previous algorithm costs 8<sup>2</sup>(<em>n</em> − 1) simple operations, which generates a smaller model in the searching phase. After rewriting these algorithms with boolean expressions, we construct the corresponding Boolean Satisfiability Problem models. Two automatic search frameworks are also proposed based on these models. This is the first time bringing the SAT-aided automatic search techniques into finding boomerang attacks on ARX ciphers. Finally, under these frameworks, we find out the first verifiable 10-round boomerang trail for SPECK32/64 with probability 2<sup>−29.15</sup> and a 12-round trail for SPECK48/72 with probability 2<sup>−44.15</sup>. These are the best distinguishers for them so far. We also perceive that the previous boomerang attacks on LEA are constructed with an incorrect computation of the boomerang connection probability. The result is then fixed by our frameworks.</p>}, number={1}, journal={IACR Transactions on Symmetric Cryptology}, author={Wang, Dachao and Wang, Baocang and Sun, Siwei}, year={2023}, month={Mar.}, pages={152–191} }