New Research Exposes Significant Security Flaws in U.S. Defense Cryptographic Standard HALFLOOP
New research reveals structural flaws in the HALFLOOP cryptographic standard used by the U.S. DoD, using related-key boomerang attacks to improve hacking efficiency.
By: AXL Media
Published: Apr 25, 2026, 7:51 AM EDT
Source: Information for this report was sourced from Higher Education Press.

The Vulnerability of High-Frequency Radio Standards
Automatic Link Establishment (ALE) is a critical technology used to simplify connections in high-frequency (HF) radio systems. To protect these transmitted messages, the U.S. Department of Defense standardized a family of tweakable block ciphers known as HALFLOOP. However, recent findings published in Frontiers of Computer Science suggest that these ciphers may not be as secure as once believed. A research team has identified a structural vulnerability in HALFLOOP's larger variants, highlighting an urgent need to re-evaluate the design of cryptographic standards used in military and government communications.
Identifying the "Low Diffusion" Flaw
The researchers discovered that HALFLOOP possesses a specific structural weakness: its internal states are smaller than its master keys. This discrepancy causes "low diffusion" in the key schedule—essentially meaning that changes in the key do not spread quickly or thoroughly enough throughout the cipher's internal processes. This lack of complexity makes it easier for attackers to predict how different keys will affect the resulting encrypted data, providing a foothold for more sophisticated cryptanalysis.
The Mechanics of the Related-Key Boomerang Attack
To exploit this flaw, the team employed a "related-key boomerang attack." This method involves analyzing the relationship between two different but related keys and how they encrypt pairs of data. By combining theoretical analysis with automated tools, the researchers developed a more efficient model to search for "sandwich distinguishers"—mathematical patterns that allow an attacker to distinguish encrypted data from random noise. Their model successfully derived complex constraints in the cipher's linear layer, improving the efficiency of the search and avoiding common pitfalls like "weak-key" attacks that only work on a small subset of possible keys.
Categories
Topics
Related Coverage
- New Cryptographic Framework "BEATS" Uses Incremental Computation to Solve Blockchain's Signature Bottleneck
- Cybersecurity Researchers Set New Standards for Malware Sandbox Analysis to Boost Threat Intelligence Efficiency
- The False Dichotomy of Cybercom 2.0: Experts Argue New Reforms Must Pave the Way for an Independent Cyber Force
- Microsoft Secures Dominance in Australian Tech with Record $25 Billion AI Pact