Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Linearly weak keys of RC5

Linearly weak keys of RC5

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Electronics Letters — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The author examines the application of linear cryptanalysis to the RC5 private-key ciphers and show that there are expected to be weak keys for which the attack is applicable to many rounds. It is demonstrated that, for the 12-round nominal RC5 version with a 64 bit block size and a 128 bit key, there are 228 weak keys for which only ~217 known plaintexts are required to break the cipher. There are 268 keys for which the cipher is theoretically breakable, requiring ~257 known plaintexts. The analysis highlights the sensitivity of RC5 security to its key scheduling algorithm.

References

    1. 1)
      • Rivest, R.L.: `The RC5 encryption algorithm', Proc. Fast Software Encryption - Second Int. Workshop at K.U.Leuven, December 1994, p. 86–96.
    2. 2)
      • Knudsen, L.R., Meier, W.: `Improved differential attacks on RC5', Advances in Cryptology - CRYPTO '96, 1996, p. 216–228.
    3. 3)
      • Matsui, M.: `Linear cryptanalysis method for DES cipher', Advances in Cryptology - EUROCRYPT '93, 1994, p. 386–397.
    4. 4)
      • Kaliski, B.S., Yin, Y.L.: `On differential and linear cryptanalysis of the RC5 encryption algorithm', Advances in Cryptology - CRYPTO '95, 1995, p. 171–184.
http://iet.metastore.ingenta.com/content/journals/10.1049/el_19970601
Loading

Related content

content/journals/10.1049/el_19970601
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address