In this paper we evaluate the resistance of the block cipher RC5 against linear cryptanalysis. We describe a known plaintext attack that can break RC5-32 (block-size 64) with 10 rounds and RC5-64 (block- size 128) with 15 rounds. In order to do this we use techniques related to the use of multiple linear approximations. Furthermore the success of the attack is largely based on the linear hull-effect. To our knowledge, at this moment these are the best known plaintext attacks on RC5, which have negligible storage requirements and do not make any assumption on the plaintext distribution. Furthermore we discuss the impact of our attacking method on the AES-candidate RC6, whose design was based on RC5.
CITATION STYLE
Borst, J., Preneel, B., & Vandewalle, J. (1999). Linear cryptanalysis of RC5 and RC6. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1636, pp. 16–30). Springer Verlag. https://doi.org/10.1007/3-540-48519-8_2
Mendeley helps you to discover research relevant for your work.