On differential and linear cryptanalysis of the RC5 encryption algorithm

被引:0
|
作者
Kaliski, BS
Yin, YL
机构
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper analyzes the security of the RC5 encryption algorithm against differential and linear cryptanalysis. RC5 is a new block cipher recently designed by Ron Rivest. It has a variable word size, a variable number of sounds, and a variable-length secret key. In RC5, the secret key is used to fill an expanded key table which is then used in encryption. Both our differential and linear attacks on RC5 recover every bit of the expanded key table without any exhaustive search. However, the plaintext requirement is strongly dependent on the number of rounds. For 64-bit block size, our differential attack on nine-round RC5 uses 2(45) chosen plaintext pairs (about the same as DES), while 2(62) pairs are needed for la-round RC5. Similarly, our linear attack on five-round RC5 uses 2(47) known plaintexts (about the same as DES), and the plaintext requirement is impractical for more than six rounds. We conjecture that the linear approximations used in our linear cryptanalysis are optimal. Thus, we conclude that Rivest's suggested use of 12 rounds is sufficient to make differential and linear cryptanalysis of RC5 impractical.
引用
收藏
页码:171 / 184
页数:14
相关论文
共 50 条
  • [21] Key-dependency of linear probability of RC5
    Moriai, S
    Aoki, K
    Ohta, K
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1997, E80A (01) : 9 - 18
  • [22] Differential Cryptanalysis of New Qamal Encryption Algorithm
    Algazy, Kunbolat T.
    Babenko, Ludmila K.
    Biyashev, Rustem G.
    Ishchukova, Evgeniya A.
    Romaniuk, Ryszard
    Kapalova, Nursulu A.
    Nysynbaeva, Saule E.
    Smolarz, Andrzej
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2020, 66 (04) : 647 - 653
  • [23] Key-dependency of linear probability of RC5
    NTT Lab, Yokosuka-shi, Japan
    IEICE Trans Fund Electron Commun Comput Sci, 1 (9-18):
  • [24] Efficient modified RC5 based on chaos adapted to image encryption
    Amin, Mohamed
    Abd El-Latif, Ahmed A.
    JOURNAL OF ELECTRONIC IMAGING, 2010, 19 (01)
  • [25] An area optimized implementation of cryptographic algorithm RC5
    Liang, Jing
    Wang, Qin
    Qi, Yue
    Yu, Feng
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4585 - 4588
  • [26] Sparse Compression-Based Image Encryption using Data Encryption Standards RC5
    Pathak, Arghya
    Mondal, Hrishikesh
    Karmakar, Jayashree
    Pal, Subhashish
    Nandi, Debasish
    Mandal, Mrinal Kanti
    IETE TECHNICAL REVIEW, 2024, 41 (03) : 353 - 365
  • [27] A Real-Time 3D Collision Detection Encryption Algorithm Based on Improved RC5
    Liu, Lizhao
    Hu, Xiaojing
    Zhang, Tianhua
    Zhu, Shunzhi
    Li, Maoqing
    ADVANCED SCIENCE LETTERS, 2011, 4 (8-10) : 2708 - 2712
  • [28] Performance evaluation of different hardware models of RC5 algorithm
    Elkeelany, Omar
    Nimmagadda, Suman
    PROCEEDINGS OF THE THIRTY-NINTH SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 2007, : 124 - +
  • [29] A timing attack on RC5
    Handschuh, H
    Heys, HM
    SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 306 - 318
  • [30] Cryptanalysis of GSM Encryption Algorithm A5/1
    Ghafari, Vahid Amin
    Vardasbi, Ali
    Mohajeri, Javad
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 4 (02): : 107 - 114