On differential and linear cryptanalysis of the RC5 encryption algorithm

被引:0
|
作者
Kaliski, BS
Yin, YL
机构
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper analyzes the security of the RC5 encryption algorithm against differential and linear cryptanalysis. RC5 is a new block cipher recently designed by Ron Rivest. It has a variable word size, a variable number of sounds, and a variable-length secret key. In RC5, the secret key is used to fill an expanded key table which is then used in encryption. Both our differential and linear attacks on RC5 recover every bit of the expanded key table without any exhaustive search. However, the plaintext requirement is strongly dependent on the number of rounds. For 64-bit block size, our differential attack on nine-round RC5 uses 2(45) chosen plaintext pairs (about the same as DES), while 2(62) pairs are needed for la-round RC5. Similarly, our linear attack on five-round RC5 uses 2(47) known plaintexts (about the same as DES), and the plaintext requirement is impractical for more than six rounds. We conjecture that the linear approximations used in our linear cryptanalysis are optimal. Thus, we conclude that Rivest's suggested use of 12 rounds is sufficient to make differential and linear cryptanalysis of RC5 impractical.
引用
收藏
页码:171 / 184
页数:14
相关论文
共 50 条
  • [41] Cracking RC5 with Java']Java applets
    Gladychev, P
    Patel, A
    O'Mahony, D
    CONCURRENCY-PRACTICE AND EXPERIENCE, 1998, 10 (11-13): : 1165 - 1171
  • [42] Differential and linear cryptanalysis
    Dr Dobb's J Software Tools Prof Program, 1 (4pp):
  • [43] Differential and linear cryptanalysis
    Schneier, B
    DR DOBBS JOURNAL, 1996, 21 (01): : 42 - &
  • [44] Differential cryptanalysis of a novel image encryption algorithm based on chaos and Line map
    Lei Chen
    Bing Ma
    Xiaohong Zhao
    Shihong Wang
    Nonlinear Dynamics, 2017, 87 : 1797 - 1807
  • [45] Cryptanalysis of the cellular message encryption algorithm
    Wagner, D
    Schneier, B
    Kelsey, J
    ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 526 - 537
  • [46] Integral Cryptanalysis of ACE Encryption Algorithm
    Ye Tao
    Wei Yongzhuang
    Li Lingchen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (04) : 908 - 914
  • [47] χ2 cryptanalysis of the SEAL encryption algorithm
    Handschuh, H
    Gilbert, P
    FAST SOFTWARE ENCRYPTION, 1997, 1267 : 1 - 12
  • [49] Differential cryptanalysis of a novel image encryption algorithm based on chaos and Line map
    Chen, Lei
    Ma, Bing
    Zhao, Xiaohong
    Wang, Shihong
    NONLINEAR DYNAMICS, 2017, 87 (03) : 1797 - 1807
  • [50] Cryptanalysis of an ergodic chaotic encryption algorithm
    王兴元
    谢旖欣
    秦学
    Chinese Physics B, 2012, (04) : 163 - 169