Abstract
In this paper, we make progress on χ 2-attack by introducing the optimization. We propose three key recovery attacks against RC6 without post-whitening, and apply these three key recovery algorithms to RC6. We discuss their differences and optimization and thus our best attack can break 16-round RC6 without pre-whitening with 128-bit key (resp. 16-round RC6 with 192-bit key) by using 2117.84 (resp. 2122.84) chosen plaintexts with a success probability of 95% (resp. 90%). As far as the authors know, this is the best result of attacks to RC6.
Keywords
Download to read the full chapter text
Chapter PDF
References
Borst, J., Preneel, B., Vandewalle, J.: Linear Cryptanalysis of RC5 and RC6. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 16–30. Springer, Heidelberg (1999)
Contini, S., Rivest, R., Robshaw, M., Yin, Y.: The Security of the RC6 Block Cipher. v 1.0. August 20 (1998), Available at http://www.rsasecurity.com/rsalabs/rc6/
Contini, S., et al.: Improved analysis of some simplified variants of RC6. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 1–15. Springer, Heidelberg (1999)
Freund, R.J., Wilson, W.J.: Statistical Method. Academic Press, San Diego (1993)
Gilbert, H., et al.: A Statistical Attack on RC6. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 64–74. Springer, Heidelberg (2001)
Handschuh, H., Gilbert, H.: χ2 Cryptanalysis of the SEAL Encryption Algorithm. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 1–12. Springer, Heidelberg (1997)
Knudsen, L., Meier, W.: Correlations in RC6 with a reduced number of rounds. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 94–108. Springer, Heidelberg (2001)
Menezes, A., van Oorschot, P.C., Vanstone, S.: Handbook of applied cryptography. CRC Press, Inc., Boca Raton (1996)
Miyaji, A., Nonaka, M.: Cryptanalysis of the Reduced-Round RC6. In: Deng, R.H., et al. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 480–494. Springer, Heidelberg (2002)
Rivest, R.: The RC5 Encryption Algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 86–96. Springer, Heidelberg (1995)
Rivest, R., Robshaw, M., Sidney, R., Yin, Y.: The RC6 Block Cipher. v1.1. August 20 (1998), Available at http://www.rsasecurity.com/rsalabs/rc6/
Shimoyama, T., Takenaka, M., Koshiba, T.: Multiple linear cryptanalysis of a reduced round RC6. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 76–88. Springer, Heidelberg (2002)
Shimoyama, T., Takeuchi, K., Hayakawa, J.: Correlation Attack to the Block Cipher RC5 and the Simplified Variants of RC6. In: 3rd AES Candidate Conference (April 2000)
Vaudenay, S.: An Experiment on DES Statistical Cryptanalysis. In: Proc. 3rd ACM Conference on Computer and Communications Security, pp. 139–147. ACM Press, New York (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Isogai, N., Matsunaka, T., Miyaji, A. (2003). Optimized χ 2-Attack against RC6. In: Zhou, J., Yung, M., Han, Y. (eds) Applied Cryptography and Network Security. ACNS 2003. Lecture Notes in Computer Science, vol 2846. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45203-4_2
Download citation
DOI: https://doi.org/10.1007/978-3-540-45203-4_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20208-0
Online ISBN: 978-3-540-45203-4
eBook Packages: Springer Book Archive