Security and Communication Networks / 2018 / Article / Tab 1

Research Article

Multiple Impossible Differentials Cryptanalysis on 7-Round ARIA-192

Table 1

The comparison of cryptanalytic attacks on ARIA.

Attack type Rounds Time Data Memory Reference

Impossible differential 5 [12]
Impossible differential 6 [10]
Impossible differential 6 [12]
Impossible differential 7 - [13]
Impossible differential 7 This paper
Integral attack 7 - [16]
Boomerang attack 7 [17]
Meet-in-the-middle 7 [18]
Meet-in-the-middle 7 [19]
Meet-in-the-middle 8 [18]
Meet-in-the-middle 8 [19]

mk: recover the actual master key; -: not given in the related paper.

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at help@hindawi.com to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.