Research Article
Multiple Impossible Differential Attacks for ForkAES
Table 1
The comparison of attacks on ForkAES.
| Attack type | Rounds | Time | Data | Memory | Reference | Encs. | MAs |
| Reconstruction queries | Rectangle diff. | ForkAES- -4-4 | | | | | [5] | Impossible diff. | ForkAES- -4-4 | | | | | [5] | Yoyo | ForkAES- -3-3 | | | | | [5] | Imp.-diff. Yoyo | ForkAES- -4-4 | | | | | [5] | Impossible diffmk | ForkAES- -5-4 | | | | | This paper | Truncated diff. | ForkAES- -5-5 | | | | | [6] |
| Encryption queries | Rectangle | ForkAES- -4-4 | | | | | [5] | Impossible diff. | ForkAES- -4-4 | | | | | [5] | Impossible diff mk | ForkAES- -5-4 | | | | | This paper |
|
|
mk: recover the master key; MAs: memory accesses.
|