“…This attack can break six rounds of the cipher with data, time and memory complexities of 2 32 chosen plaintexts, 2 72 encryptions and 2 72 blocks of memory, respectively. Recently, a related‐key boomerang attack on full rounds of this cipher was introduced in [5], which recovers 16 subkey bits with 2 36 encryptions and 2 123 adaptively chosen plaintexts and ciphertexts.…”