On differential and linear cryptanalysis of the RC5 encryption algorithm

被引:0
|
作者
Kaliski, BS
Yin, YL
机构
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper analyzes the security of the RC5 encryption algorithm against differential and linear cryptanalysis. RC5 is a new block cipher recently designed by Ron Rivest. It has a variable word size, a variable number of sounds, and a variable-length secret key. In RC5, the secret key is used to fill an expanded key table which is then used in encryption. Both our differential and linear attacks on RC5 recover every bit of the expanded key table without any exhaustive search. However, the plaintext requirement is strongly dependent on the number of rounds. For 64-bit block size, our differential attack on nine-round RC5 uses 2(45) chosen plaintext pairs (about the same as DES), while 2(62) pairs are needed for la-round RC5. Similarly, our linear attack on five-round RC5 uses 2(47) known plaintexts (about the same as DES), and the plaintext requirement is impractical for more than six rounds. We conjecture that the linear approximations used in our linear cryptanalysis are optimal. Thus, we conclude that Rivest's suggested use of 12 rounds is sufficient to make differential and linear cryptanalysis of RC5 impractical.
引用
收藏
页码:171 / 184
页数:14
相关论文
共 50 条
  • [31] Enhancement of RC6 Block Cipher Algorithm and Comparison with RC5 & RC6
    Verma, Harsh Kumar
    Singh, Ravindra Kumar
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 556 - 561
  • [32] Improving Stored Data Security In Cloud Using Rc5 Algorithm
    Singh, Jay
    Kumar, Brajesh
    Khatri, Asha
    3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,
  • [33] 从RC5到RC6
    姜浩
    信息安全与通信保密, 2006, (10) : 49 - 50+54
  • [34] Selection of Parameter 'r' in RC5 Algorithm on the basis of Prime Number
    Gill, Harsimranjit Singh
    2014 RECENT ADVANCES IN ENGINEERING AND COMPUTATIONAL SCIENCES (RAECS), 2014,
  • [35] Linearly weak keys of RC5
    Heys, HM
    ELECTRONICS LETTERS, 1997, 33 (10) : 836 - 838
  • [36] On solving RC5 challenges with FPGAs
    de Dormale, Guerric Meurice
    Bass, John
    Quisquater, Jean-Jacques
    FCCM 2007: 15TH ANNUAL IEEE SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES, PROCEEDINGS, 2007, : 281 - +
  • [37] Improved correlation attack on RC5
    Miyaji, A
    Nonaka, M
    Takii, Y
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2002, E85A (01) : 44 - 57
  • [38] An enhanced chaotic key-based RC5 block cipher adapted to image encryption
    Faragallah, Osama S.
    INTERNATIONAL JOURNAL OF ELECTRONICS, 2012, 99 (07) : 925 - 943
  • [39] Impossible Differential Cryptanalysis and Linear Cryptanalysis for Eight-Sided Fortress Algorithm
    Hongru, W. E., I
    Yifan, Z. H. U.
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (03) : 793 - 799
  • [40] EVALUATION OF THE DRIVERS CAB IN THE RC5 ENGINE
    HEDBERG, G
    APPLIED ERGONOMICS, 1987, 18 (01) : 35 - 42