Theoretical Analysis of "Correlations in RC6"
نویسندگان
چکیده
In this paper, we give the theoretical analysis of χ attack proposed by Knudsen and Meier on the RC6 block cipher. To this end, we propose the novel method of security evaluation against χ attack precisely including key dependency by introducing a technique “Transition Matrix Computing.” On the other hand, the way of security evaluation against χ attack has not been known except the computer experiment. We should note that it is the first results the way of security evaluation against χ attack is shown theoretically. Using this method, we can obtain the “weakest keys” against the attack. Keyword: RC6, χ attack, Transition Matrix,
منابع مشابه
Correlations in RC 6 on 256 - bit blocks ∗
Earlier it has been reported that there exist correlation attacks on RC6 with 128-bit blocks with a reduced number of rounds. In this note it is investigated how well RC6 with 256-bit blocks resists such attacks.
متن کاملSuccess probability in chi - square attacks
Knudsen and Meier applied the χ-attack to RC6. This attack is one of the most effective attacks for RC6. The χ-attack can be used for both distinguishing attacks and for key recovery attacks. Up to the present, theoretical analysis of χ-attacks, especially the relation between a distinguishing attack and a key recovery attack, has not been discussed. In this paper, we investigate the theoretica...
متن کاملBest Regards Lars Correlations in Rc6
In this paper the block cipher RC6 is analysed. RC6 is submitted as a candidate for the Advanced Encryption Standard, it has 128-bit blocks and supports keys of 128, 192 and 256 bits, and is an iterated 20-round block cipher. Here it is shown that versions of RC6 with 128-bit blocks can be distinguished from a random permutation with up to 15 rounds; for some weak keys up to 17 rounds. Moreover...
متن کاملCorrelations in RC 6
In this paper the block cipher RC6 is analysed. RC6 is submitted as a candidate for the Advanced Encryption Standard, it has 128-bit blocks and supports keys of 128, 192 and 256 bits, and is an iterated 20-round block cipher. Here it is shown that versions of RC6 with 128-bit blocks can be distinguished from a random permutation with up to 15 rounds; for some weak keys up to 17 rounds. Moreover...
متن کاملCorrelations in RC6 with a Reduced Number of Rounds
In this paper the block cipher RC6 is analysed. RC6 is submitted as a candidate for the Advanced Encryption Standard, and is one of five finalists. It has 128-bit blocks and supports keys of 128, 192 and 256 bits, and is an iterated 20-round block cipher. Here it is shown that versions of RC6 with 128-bit blocks can be distinguished from a random permutation with up to 15 rounds; for some weak ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2002 شماره
صفحات -
تاریخ انتشار 2002