Theoretical analysis of η2 attack on RC6

2Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we give a theoretical analysis of η2 attack proposed by Knudsen and Meier on the RC6 block cipher. To this end, we propose the method of security evaluation against η2 attack precisely including key dependency by introducing a method "Transition Matrix Computing." Previously, no theoretical security evaluation against η2 attack was known, it has been done by computer experiments. We should note that this is the first results that a theoretical evaluation against η2 attack is shown. © 2003 Springer-Verlag Berlin Heidelberg.

Author supplied keywords

Cite

CITATION STYLE

APA

Takenaka, M., Shimoyama, T., & Koshiba, T. (2003). Theoretical analysis of η2 attack on RC6. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2727 LNCS, pp. 142–153). https://doi.org/10.1007/3-540-45067-X_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free