scispace - formally typeset
Open AccessBook ChapterDOI

Improved Analysis of Some Simplified Variants of RC6

Reads0
Chats0
TLDR
Simplified variants that omit a quadratic function and a fixed rotation in RC6 are examined to clarify their essential contribution to the overall security of RC6.
Abstract
RC6 has been submitted as a candidate for the Advanced Encryption Standard (AES). Two important features of RC6 that were absent from its predecessor RC5 are a quadratic function and a fixed rotation. By examining simplified variants that omit these features we clarify their essential contribution to the overall security of RC6.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book

The Block Cipher Companion

TL;DR: This book provides a technically detailed, yet readable, account of the state of the art of block cipher analysis, design, and deployment and provides an overview of some of the most important cryptanalytic methods.
Book ChapterDOI

Secure Conversion between Boolean and Arithmetic Masking of Any Order

TL;DR: To convert masks of a size of ki¾?bits securely against attacks of order n, the proposed algorithms have a time complexity of $\mathcal{O}n^2 k$ in both directions and are proven to be secure in the Ishai, Sahai, and Wagner ISW framework for private circuits.
Book ChapterDOI

Correlations in RC6 with a Reduced Number of Rounds

TL;DR: It is shown that versions of RC6 with 128-bit blocks can be distinguished from a random permutation with up to 15 rounds; for some weak keys up to 17 rounds; and with an increased effort key-recovery attacks faster than exhaustive key search can be mounted on RC6.
Book ChapterDOI

Mod n Cryptanalysis, with Applications Against RC5P and M6

TL;DR: A form of partitioning attack that is effective against ciphers which rely on modular addition and bit rotations for their security, and that the general attack is extensible to other values of n.
Book ChapterDOI

Linear Cryptanalysis of RC5 and RC6

TL;DR: A known plaintext attack that can break RC5-32 (blocksize 64) with 10 rounds andRC5-64 (block-size 128) with 15 rounds is described, which are the bestknown plaintext attacks on RC5, which have negligible storage requirements and do not make any assumption on the plaintext distribution.
References
More filters
Book

Differential Cryptanalysis of the Data Encryption Standard

TL;DR: This book introduces a new cryptographic method, called differential cryptanalysis, which can be applied to analyze cryptosystems, and describes the cryptanalysis of DES, deals with the influence of its building blocks on security, and analyzes modified variants.
Book ChapterDOI

The RC5 encryption algorithm

TL;DR: This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software implementations and a novel feature of RC5 is the heavy use of data-dependent rotations.
Book ChapterDOI

Truncated and higher order differentials

TL;DR: The concept of truncated differentials is introduced and it is shown how to find a minimum nonlinear order of a block cipher using higher order differentials.
BookDOI

Advances in Cryptology — CRYPTO ’96

Neal Koblitz
TL;DR: This work presents new, simple, and practical constructions of message authentication schemes based on a cryptographic hash function, and proves that NMAC and HMAC are proven to be secure as long as the underlying hash function has some reasonable cryptographic strengths.