“…As shown in Fig. 3, for each attack trail, sixteen subkey bytes (k 0, (2,3,4,7,8,9,13,14) , k 1,(4,6,9,11) , k 7,(0,7,10,13) ) and (k 0, (2,3,4,7,8,9,13,14) , k 1,(5,7,8,10) , k 7,(0,7,10,13) ) need to be attacked, respectively. These two trails have the same subkey bytes of whitening keys k 0 and 7-th round subkey k 7 but different subkey bytes of first round subkey k 1 .…”