Research Article

Multiple Impossible Differential Attacks for ForkAES

Algorithm 3

Multiple impossible differentials attack with reconstruction queries.
Input: Two arrays , ; Four arrays ; Array ; Three arrays
Outputs: Right master key
(1)for all elements of array do
(2)   
(3)   for all elements of array do
(4)      
(5)      
(6)      
(7)       the pair of
(8)   end for
(9)end for
(10)for all arrays do
(11)  initialize variable
(12)  for all elements of array do
(13)    for all elements of array do
(14)      
(15)      
(16)      
(17)      
(18)      
(19)      ifthen
(20)         
(21)         
(22)      end if
(23)    end for
(24)    ifthen
(25)       
(26)       Break
(27)     end if
(28)   end for
(29)end for
(30)Based on array , repeat step 1–9 to obtain .
(31)Based on array , utilize the similar step to discard wrong subkeys . Then the candidates can be obtained.
(32)Guessing all values of , the right master key can be obtained by brute force.