Abstract
In this paper, we give a theoretical analysis of η2 attack proposed by Knudsen and Meier on the RC6 block cipher. To this end, we propose the method of security evaluation against η2 attack precisely including key dependency by introducing a method “Transition Matrix Computing.” Previously, no theoretical security evaluation against η2 attack was known, it has been done by computer experiments. We should note that this is the first results that a theoretical evaluation against η2 attack is shown.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
J. Borst, B. Preneel, and J. Vandewalle. Linear cryptanalysis of RC5 and RC6. FSE’99, LNCS 1636, pp.16–30, 1999.
S. Contini, R.L. Rivest, M.J.B. Robshaw, and Y.L. Yin. The security of the RC6 block cipher. v.1.0, August 20, 1998. Available at http://www.rsasecurity.com/rsalabs/rc6/.
S. Contini, R.L. Rivest, M.J.B. Robshaw, and Y.L. Yin. Improved analysis of some simplified variants of RC6. FSE’99, LNCS 1636, pp.1–15, 1999.
H. Gilbert, H. Handschuh, A. Joux and S. Vaudenay, A Statistical Attack on RC6. FSE 2000, LNCS 1978, pp.64–74, 2001.
J. Kelsey, B. Schneier, and D. Wagner. Mod n cryptanalysis, with applications against RC5P and M6. FSE’99, LNCS 1363, pp.139–155, 1999.
L.R. Knudsen and W. Meier. Correlations in RC6 with a reduced number of rounds. FSE 2000, LNCS 1978, pp.94–108, 2001.
M. Minier and H. Gilbert. Stochastic Cryptanalysis of Crypton. FSE 2000, LNCS 1978, pp.121–133, 2001.
R.L. Rivest. The RC5 encryption algorithm. FSE’94, LNCS 1008, pp.86–96, 1995.
R.L. Rivest, M.J.B. Robshaw, R. Sidney and Y.L. Yin. The RC6 block cipher. v1.1, August 20, 1998. Available at http://www.rsasecurity.com/rsalabs/rc6/.
T. Shimoyama, M. Takenaka and T. Koshiba. Multiple linear cryptanalysis of a reduced round RC6. FSE 2002, LNCS 2365, pp.76–88, 2002.
S. Vaudenay. An Experiment on DES Statistical Cryptanalysis. 3rd ACM Conference on Computer and Communications Security, ACM Press, pp. 139–147, 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Takenaka, M., Shimoyama, T., Koshiba, T. (2003). Theoretical Analysis of η2 Attack on RC6. In: Safavi-Naini, R., Seberry, J. (eds) Information Security and Privacy. ACISP 2003. Lecture Notes in Computer Science, vol 2727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45067-X_13
Download citation
DOI: https://doi.org/10.1007/3-540-45067-X_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40515-3
Online ISBN: 978-3-540-45067-2
eBook Packages: Springer Book Archive