Apart from the reduced-round nature of rotational cryptanalysis and the
luck needed for a successful attack, a big mitigation against it is to add the amount of additions needed to fit the security level of the cipher. For an ARX cipher that requires 2^security, there must approximately at most 128 modular additions as per the previous (p)^q equation, not including the other limitations. The attack method for
Threefish requires a
chosen-plaintext-attack to occur, which comes with the limitations of such an attack. Another limitation is that there is no guarantee that successful application of the error correction variables will undo constants within rounds. The original paper claims that the chance of constants being randomly nullified in a given round become lower as the
hamming weight becomes higher. Raising hamming weights of constants in key rounds and compression rounds increases the security margin. == References ==