Research Article

Multiple Impossible Differential Attacks for ForkAES

Algorithm 2

Sieved expected pairs of the first attack trail.
Inputs: arrays ; tweaks ; Value fuction ;
Outputs: sorted arrays indexed the value of 12 bytes
(1)for do
(2)  for do
(3)    for do
(4)      
(5)      
(6)    end for
(7)  end for
(8)  IDQUICKSORT
(9)end for