Research Article

Multiple Impossible Differential Attacks for ForkAES

Table 1

The comparison of attacks on ForkAES.

Attack typeRoundsTimeDataMemoryReference
Encs.MAs

Reconstruction queries
Rectangle diff.ForkAES- -4-4[5]
Impossible diff.ForkAES- -4-4[5]
YoyoForkAES- -3-3[5]
Imp.-diff. YoyoForkAES- -4-4[5]
Impossible diffmkForkAES- -5-4This paper
Truncated diff.ForkAES- -5-5[6]

Encryption queries
RectangleForkAES- -4-4[5]
Impossible diff.ForkAES- -4-4[5]
Impossible diff mkForkAES- -5-4This paper

mk: recover the master key; MAs: memory accesses.