This paper details the attack on RC6 which was announced in a report published in the proceedings of the second AES candidate conference (March 1999). Based on an observation on the RC6 statistics, we show how to distinguish RC6 from a random permutation and to recover the secret extended key for a fair number of rounds.
CITATION STYLE
Gilbert, H., Handschuh, H., Joux, A., & Vaudenay, S. (2001). A statistical attack on RC6. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1978, pp. 64–74). Springer Verlag. https://doi.org/10.1007/3-540-44706-7_5
Mendeley helps you to discover research relevant for your work.