Research Article
Unveiling the Neutral Difference and Its Automated Search
Algorithm 1
Pseudocode for the Key Recovery of Differential-Linear Attack.
Input: neutral differences and corresponding subspace , number of replications , plaintext structures for , threshold . | Output: List of key candidates, denoted by . | 1 | 2 fordo | 3 Choose the th plaintext structure | / Denote the ciphertext pairs, encrypted from , by / | 4 foreach possible do | 5 | 6 fordo | // A filtering process that enhances advantages. | / represents one round decryption with . represents the output mask, and is the number of ciphertext pairs to calculate this correlation. / | 7 if is useful for current then | 8 end | 8 else | 10 Continue | // Without losing generality, let the correlation of the bottom DL distinguisher be less than 0 and . | 11 ifthen | 12 Store the key candidate to . |
|