Research Article
Multiple Impossible Differential Attacks for ForkAES
Algorithm 3
Multiple impossible differentials attack with reconstruction queries.
| Input: Two arrays , ; Four arrays ; Array ; Three arrays | | Outputs: Right master key | (1) | for all elements of array do | (2) | | (3) | for all elements of array do | (4) | | (5) | | (6) | | (7) | the pair of | (8) | end for | (9) | end for | (10) | for all arrays do | (11) | initialize variable | (12) | for all elements of array do | (13) | for all elements of array do | (14) | | (15) | | (16) | | (17) | | (18) | | (19) | ifthen | (20) | | (21) | | (22) | end if | (23) | end for | (24) | ifthen | (25) | | (26) | Break | (27) | end if | (28) | end for | (29) | end for | (30) | Based on array , repeat step 1–9 to obtain . | (31) | Based on array , utilize the similar step to discard wrong subkeys . Then the candidates can be obtained. | (32) | Guessing all values of , the right master key can be obtained by brute force. |
|