Implementation and analysis of Schindler-Itoh attacks door