1995
DOI: 10.1007/3-540-44750-4_14
|View full text |Cite
|
Sign up to set email alerts
|

On Differential and Linear Cryptanalysis of the RC5 Encryption Algorithm

Abstract: This paper analyzes the security of the RC5 encryption algorithm against differential and linear cryptanalysis. RC5 is a new block cipher recently designed by Ron Rivest. It has a variable word size, a variable number of rounds, and a variable-length secret key. In RC5, the secret key is used to fill an expanded key table which is then used in encryption. Both our differential and linear attacks on RC5 recover every bit of the expanded key table without any exhaustive search. However, the plaintext requirement… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
61
0

Year Published

1998
1998
2002
2002

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 50 publications
(61 citation statements)
references
References 5 publications
0
61
0
Order By: Relevance
“…Because of the fact that (14) has a bigger bias than (15), 'traditionally' approximations on the LSB have been considered to be most useful for a linear attack (see [KY95,KY98]). Using Approximations (9), (10) and (14) one can derive the following iterative approximation for one round of RC5.…”
Section: Key Dependency and Piling-upmentioning
confidence: 99%
“…Because of the fact that (14) has a bigger bias than (15), 'traditionally' approximations on the LSB have been considered to be most useful for a linear attack (see [KY95,KY98]). Using Approximations (9), (10) and (14) one can derive the following iterative approximation for one round of RC5.…”
Section: Key Dependency and Piling-upmentioning
confidence: 99%
“…RC5 has been extensively studied from a regular cryptanalysis point of view. See for example [9,8,18].…”
Section: Probing Rc5mentioning
confidence: 99%
“…Furthermore in our analysis we shall be interested in how single-bit differences behave within RC2. The decision to restrict our attention to single-bit differences facilitates analysis but is also motivated by a typical assumption that characteristics involving multiple-bit differences over integer addition will generally hold with lower probability than single-bit characteristics [6]. We note that other more complex techniques [2,7] might open new avenues for the analysis of RC2.…”
Section: Differential Cryptanalysis Of Rc2mentioning
confidence: 99%
“…Such attacks appear to be ineffective for ciphers that mix integer addition and bitwise operations unless the approximation can be limited to the least significant bits across an addition [6]. Such a restriction appears unlikely as an extension of the current approximation into a third MIXING round illustrates: Nevertheless, there are complex interactions between the individual steps of RC2 and these often provide unintuitive results.…”
Section: The Effectiveness Of Linear Cryptanalysismentioning
confidence: 99%