Improved Analysis of Some Simplified Variants of RC6
Reads0
Chats0
TLDR
Simplified variants that omit a quadratic function and a fixed rotation in RC6 are examined to clarify their essential contribution to the overall security of RC6.Abstract:
RC6 has been submitted as a candidate for the Advanced Encryption Standard (AES). Two important features of RC6 that were absent from its predecessor RC5 are a quadratic function and a fixed rotation. By examining simplified variants that omit these features we clarify their essential contribution to the overall security of RC6.read more
Citations
More filters
Book
The Block Cipher Companion
Lars R. Knudsen,Matthew Robshaw +1 more
TL;DR: This book provides a technically detailed, yet readable, account of the state of the art of block cipher analysis, design, and deployment and provides an overview of some of the most important cryptanalytic methods.
Book ChapterDOI
Secure Conversion between Boolean and Arithmetic Masking of Any Order
TL;DR: To convert masks of a size of ki¾?bits securely against attacks of order n, the proposed algorithms have a time complexity of $\mathcal{O}n^2 k$ in both directions and are proven to be secure in the Ishai, Sahai, and Wagner ISW framework for private circuits.
Book ChapterDOI
Correlations in RC6 with a Reduced Number of Rounds
Lars R. Knudsen,Willi Meier +1 more
TL;DR: It is shown that versions of RC6 with 128-bit blocks can be distinguished from a random permutation with up to 15 rounds; for some weak keys up to 17 rounds; and with an increased effort key-recovery attacks faster than exhaustive key search can be mounted on RC6.
Book ChapterDOI
Mod n Cryptanalysis, with Applications Against RC5P and M6
TL;DR: A form of partitioning attack that is effective against ciphers which rely on modular addition and bit rotations for their security, and that the general attack is extensible to other values of n.
Book ChapterDOI
Linear Cryptanalysis of RC5 and RC6
TL;DR: A known plaintext attack that can break RC5-32 (blocksize 64) with 10 rounds andRC5-64 (block-size 128) with 15 rounds is described, which are the bestknown plaintext attacks on RC5, which have negligible storage requirements and do not make any assumption on the plaintext distribution.
References
More filters
Book
Differential Cryptanalysis of the Data Encryption Standard
Eli Biham,Adi Shamir +1 more
TL;DR: This book introduces a new cryptographic method, called differential cryptanalysis, which can be applied to analyze cryptosystems, and describes the cryptanalysis of DES, deals with the influence of its building blocks on security, and analyzes modified variants.
Book ChapterDOI
The RC5 encryption algorithm
TL;DR: This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software implementations and a novel feature of RC5 is the heavy use of data-dependent rotations.
Book ChapterDOI
Truncated and higher order differentials
TL;DR: The concept of truncated differentials is introduced and it is shown how to find a minimum nonlinear order of a block cipher using higher order differentials.
BookDOI
Advances in Cryptology — CRYPTO ’96
TL;DR: This work presents new, simple, and practical constructions of message authentication schemes based on a cryptographic hash function, and proves that NMAC and HMAC are proven to be secure as long as the underlying hash function has some reasonable cryptographic strengths.