On differential and linear cryptanalysis of the RC5 encryption algorithm

被引:0
|
作者
Kaliski, BS
Yin, YL
机构
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper analyzes the security of the RC5 encryption algorithm against differential and linear cryptanalysis. RC5 is a new block cipher recently designed by Ron Rivest. It has a variable word size, a variable number of sounds, and a variable-length secret key. In RC5, the secret key is used to fill an expanded key table which is then used in encryption. Both our differential and linear attacks on RC5 recover every bit of the expanded key table without any exhaustive search. However, the plaintext requirement is strongly dependent on the number of rounds. For 64-bit block size, our differential attack on nine-round RC5 uses 2(45) chosen plaintext pairs (about the same as DES), while 2(62) pairs are needed for la-round RC5. Similarly, our linear attack on five-round RC5 uses 2(47) known plaintexts (about the same as DES), and the plaintext requirement is impractical for more than six rounds. We conjecture that the linear approximations used in our linear cryptanalysis are optimal. Thus, we conclude that Rivest's suggested use of 12 rounds is sufficient to make differential and linear cryptanalysis of RC5 impractical.
引用
收藏
页码:171 / 184
页数:14
相关论文
共 50 条
  • [1] Differential cryptanalysis of RC5
    Knudsen, LR
    Meier, W
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 1997, 8 (05): : 445 - 454
  • [2] THE RC5 ENCRYPTION ALGORITHM
    RIVEST, RL
    DR DOBBS JOURNAL, 1995, 20 (01): : 146 - &
  • [3] Linear cryptanalysis of RC5 and RC6
    Borst, J
    Preneel, B
    Vandewalle, J
    FAST SOFTWARE ENCRYPTION, 1999, 1636 : 16 - 30
  • [4] New results in linear cryptanalysis of RC5
    Selçuk, AA
    FAST SOFTWARE ENCRYPTION, 1998, 1372 : 1 - 16
  • [5] Improved cryptanalysis of RC5
    Biryukov, A
    Kushilevitz, E
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 85 - 99
  • [6] Digital Image Encryption Based on the RC5 Block Cipher Algorithm
    Faragallah, Osama S.
    SENSING AND IMAGING, 2011, 12 (3-4): : 73 - 94
  • [7] Area optimized architecture and VLSI implementation of RC5 encryption algorithm
    Sklavos, N
    Machas, C
    Koufopavlou, O
    ICECS 2003: PROCEEDINGS OF THE 2003 10TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS 1-3, 2003, : 172 - 175
  • [8] Concurrent fault detection in a hardware implementation of the RC5 encryption algorithm
    Bertoni, G
    Breveglieri, L
    Koren, I
    Maistri, P
    Piuri, V
    IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES, AND PROCESSORS, PROCEEDINGS, 2003, : 423 - 432
  • [9] Complete SAT based Cryptanalysis of RC5 Cipher
    Sobon, Artur
    Kurkowski, Miroslaw
    Stachowiak, Sylwia
    JOURNAL OF INFORMATION AND ORGANIZATIONAL SCIENCES, 2020, 44 (02) : 365 - 382
  • [10] ERC5a-An Enhanced RC5 Algorithm on Bit Propagation in the Encryption Function
    Vibar, Jayvee Christopher N.
    Medina, Ruji P.
    Sison, Ariel M.
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 479 - 482