Research Article
Unveiling the Neutral Difference and Its Automated Search
Algorithm 1
Pseudocode for the Key Recovery of Differential-Linear Attack.
| Input: neutral differences and corresponding subspace , number of replications , plaintext structures for , threshold . | | Output: List of key candidates, denoted by . | | 1 | | 2 fordo | | 3 Choose the th plaintext structure | | / Denote the ciphertext pairs, encrypted from , by / | | 4 foreach possible do | | 5 | | 6 fordo | | // A filtering process that enhances advantages. | | / represents one round decryption with . represents the output mask, and is the number of ciphertext pairs to calculate this correlation. / | | 7 if is useful for current then | | 8 end | | 8 else | | 10 Continue | | // Without losing generality, let the correlation of the bottom DL distinguisher be less than 0 and . | | 11 ifthen | | 12 Store the key candidate to . |
|