Notes in Computer Science 1372

نویسندگان

  • J. van Leeuwen
  • Serge Vaudenay
  • Jan van Leeuwen
چکیده

We show that the linear cryptanalytic attack on RC5 that was published by Kaliski and Yin at Crypto’95 does not work as expected due to the failure of some hidden assumptions involved. Then we present new linear attacks on RC5. Our attacks use the same linear approximation as the one used by Kaliski and Yin. Therefore, the plaintext requirement of our attack is around 4w2r−2 which is impractically high for reasonably high values of w and r. These new attacks has also significances beyond the linear cryptanalysis of RC5 to show how linear cryptanalysis can carry on when the approximation used has a non-zero bias for the wrong key values. We also discuss certain issues about linear cryptanalysis of RC5 that need to be resolved for a better linear attack.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

LNCS 1372 - Attacking Triple Encryption

The standard technique to attack triple encryption is the meet-in-the-middle attack which requires 2 encryption steps. In this paper, more efficient attacks are presented. One of our attacks reduces the overall number of steps to roughly 2. Other attacks optimize the number of encryptions at the cost of increasing the number of other operations. It is possible to break triple DES doing 2 single...

متن کامل

Tv and or Fm Transmitting Antennas Desien Using Computer Graphic System (RESEARCH NOTES)

The purpose of this paper is three fold. First, the major theoretical pattern relationships of TV and/or FM transmitting antennas are dealt with. Secend, the computer calculation method and designing of such patterns using the given relationships. And third, a method in which a computer graphic system can be used to design such antennas for a specific pattern is introduced and its results are p...

متن کامل

Some notes concerning the convergence control parameter in homotopy analysis method

omotopy analysis method (HAM) is a promising method for handling func-tional equations. Recent publications proved the eectiveness of HAM in solvingwide variety of problems in dierent elds. HAM has a unique property whichmakes it superior to other analytic methods, this property is its ability to con-trol the convergence region of the solution series. In this work, we claried theadvantages and ...

متن کامل

Cavity Quantum Electrodynamics : Coherence in

www.sciencemag.org (this information is current as of April 15, 2008 ): The following resources related to this article are available online at http://www.sciencemag.org/cgi/content/full/298/5597/1372 version of this article at: including high-resolution figures, can be found in the online Updated information and services, found at: can be related to this article A list of selected additional a...

متن کامل

Bank Notes Authentication System based on Wavelet Features and Artificial Neural Network

Monetary transactions are integral part of our day to day activities, so currency authentication has become one of the active research area at present and it has vast potential applications. In this paper we introduced a system to verify the authentication of banknotes bench mark dataset using computer vision. We considered 1372 samples of various bank notes in our work. The technology of curre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009