Research Article
Multiple Impossible Differentials Cryptanalysis on 7-Round ARIA-192
Table 1
The comparison of cryptanalytic attacks on ARIA.
| Attack type | Rounds | Time | Data | Memory | Reference |
| Impossible differential | 5 | | | | [12] | Impossible differential | 6 | | | | [10] | Impossible differential | 6 | | | | [12] | Impossible differential | 7 | | | - | [13] | Impossible differential | 7 | | | | This paper | Integral attack | 7 | | | - | [16] | Boomerang attack | 7 | | | | [17] | Meet-in-the-middle | 7 | | | | [18] | Meet-in-the-middle | 7 | | | | [19] | Meet-in-the-middle | 8 | | | | [18] | Meet-in-the-middle | 8 | | | | [19] |
|
|
mk: recover the actual master key; -: not given in the related paper.
|