Paper 2025/2297

Yoyo tricks with a BEANIE

Xavier Bonnetain, Université de Lorraine, CNRS, Inria, LORIA, Nancy, France
Sébastien Duval, Université de Lorraine, CNRS, Inria, LORIA, Nancy, France
Virginie Lallemand, Université de Lorraine, CNRS, Inria, LORIA, Nancy, France
Thierno Mamoudou Sabaly, Université de Lorraine, CNRS, Inria, LORIA, Nancy, France
Thomas Sagot, Université de Lorraine, CNRS, Inria, LORIA, Nancy, France
Thibault Sanvoisin, Université de Lorraine, CNRS, Inria, LORIA, Nancy, France
Abstract

BEANIE is a 32-bit tweakable block cipher, published in ToSC 2025.4, designed for memory encryption of microcontroller units. In this paper, we propose its first third-party analysis and present a key recovery against the full 5+5 rounds of BEANIE using a yoyo distinguisher. The attack has a cost close to the security claim of $2^{80}$ time and $2^{40}$ data.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
BEANIEYoyoCryptanalysis
Contact author(s)
xavier bonnetain @ inria fr
History
2025-12-22: approved
2025-12-20: received
See all versions
Short URL
https://ia.cr/2025/2297
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/2297,
      author = {Xavier Bonnetain and Sébastien Duval and Virginie Lallemand and Thierno Mamoudou Sabaly and Thomas Sagot and Thibault Sanvoisin},
      title = {Yoyo tricks with a {BEANIE}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/2297},
      year = {2025},
      url = {https://eprint.iacr.org/2025/2297}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.