“…Z'aba and Maarof [10] indicated that the superiorities of attacks were grounded in the principle of a DC attack. For instance, the impossible differential attack was utilized on the MixColumns transformation of an AES [10,29]. If a pair of plaintext varied only in one byte, then the reduced four rounds ciphertext of an AES would never be the same in the ciphertext byte positions: (0, 0), (1,3), (2, 2), (3, 1), (0, 1), (1, 0), (2, 3),(3, 2), (0, 2), (1, 1), (2, 0), (3,3) nor (0, 3), (1, 2), (2, 1), (3, 0) [10].…”