Key-dependency of linear probability of RC5

被引:0
|
作者
Moriai, S [1 ]
Aoki, K [1 ]
Ohta, K [1 ]
机构
[1] NTT LABS, YOKOSUKA, KANAGAWA 23803, JAPAN
关键词
RC5; linear cryptanalysis; linear probability; weak key; key-dependency;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In estimating the vulnerability of a block cipher to differential cryptanalysis and linear cryptanalysis, we must consider the fact that the differential probability and the linear probability vary with the key. In the case of cryptosystems where the round key is XORed to the input data of each round, the difference in both types of probability with different keys is regarded as negligible. However, this is not the case with RC5. This paper makes a primary analysis of the key-dependency of linear probability of RC5. Throughout this paper we study ''precise'' linear probability. We find some linear approximations that have higher deviation (bias) for some keys than the ''best linear approximation'' claimed by Kaliski and Yin in CRYPTO'95. Using one linear approximation, we find 10 weak keys of RC5-4/2/2 with linear probability 2(-1), 2 weak keys of RC5-4/5/16 with linear probability 2(-2) and a weak key of RC5-16/5/16 with linear probability 2(-15.4), while Kaliski-Yin's ''best biases'' are 2(-3), 2(-9), and 2(-17), respectively.
引用
收藏
页码:9 / 18
页数:10
相关论文
共 50 条
  • [1] Key-dependency of linear probability of RC5
    NTT Lab, Yokosuka-shi, Japan
    IEICE Trans Fund Electron Commun Comput Sci, 1 (9-18):
  • [2] Linear cryptanalysis of RC5 and RC6
    Borst, J
    Preneel, B
    Vandewalle, J
    FAST SOFTWARE ENCRYPTION, 1999, 1636 : 16 - 30
  • [3] New results in linear cryptanalysis of RC5
    Selçuk, AA
    FAST SOFTWARE ENCRYPTION, 1998, 1372 : 1 - 16
  • [4] On differential and linear cryptanalysis of the RC5 encryption algorithm
    Kaliski, BS
    Yin, YL
    ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 171 - 184
  • [5] THE RC5 ENCRYPTION ALGORITHM
    RIVEST, RL
    DR DOBBS JOURNAL, 1995, 20 (01): : 146 - &
  • [6] A timing attack on RC5
    Handschuh, H
    Heys, HM
    SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 306 - 318
  • [7] Differential cryptanalysis of RC5
    Knudsen, LR
    Meier, W
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 1997, 8 (05): : 445 - 454
  • [8] Improved cryptanalysis of RC5
    Biryukov, A
    Kushilevitz, E
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 85 - 99
  • [9] 从RC5到RC6
    姜浩
    信息安全与通信保密, 2006, (10) : 49 - 50+54
  • [10] Linearly weak keys of RC5
    Heys, HM
    ELECTRONICS LETTERS, 1997, 33 (10) : 836 - 838