Linear cryptanalysis of RC5 and RC6

27Citations
Citations of this article
40Readers
Mendeley users who have this article in their library.

Abstract

In this paper we evaluate the resistance of the block cipher RC5 against linear cryptanalysis. We describe a known plaintext attack that can break RC5-32 (block-size 64) with 10 rounds and RC5-64 (block- size 128) with 15 rounds. In order to do this we use techniques related to the use of multiple linear approximations. Furthermore the success of the attack is largely based on the linear hull-effect. To our knowledge, at this moment these are the best known plaintext attacks on RC5, which have negligible storage requirements and do not make any assumption on the plaintext distribution. Furthermore we discuss the impact of our attacking method on the AES-candidate RC6, whose design was based on RC5.

Cite

CITATION STYLE

APA

Borst, J., Preneel, B., & Vandewalle, J. (1999). Linear cryptanalysis of RC5 and RC6. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1636, pp. 16–30). Springer Verlag. https://doi.org/10.1007/3-540-48519-8_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free