Abstract
In this paper, we make progress on χ 2-attack by introducing the optimization. We propose three key recovery attacks against RC6 without post-whitening, and apply these three key recovery algorithms to RC6. We discuss their differences and optimization and thus our best attack can break 16-round RC6 without pre-whitening with 128-bit key (resp. 16-round RC6 with 192-bit key) by using 2117.84 (resp. 2122.84) chosen plaintexts with a success probability of 95% (resp. 90%). As far as the authors know, this is the best result of attacks to RC6.
Chapter PDF
Similar content being viewed by others
References
Borst, J., Preneel, B., Vandewalle, J.: Linear Cryptanalysis of RC5 and RC6. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 16–30. Springer, Heidelberg (1999)
Contini, S., Rivest, R., Robshaw, M., Yin, Y.: The Security of the RC6 Block Cipher. v 1.0. August 20 (1998), Available at http://www.rsasecurity.com/rsalabs/rc6/
Contini, S., et al.: Improved analysis of some simplified variants of RC6. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 1–15. Springer, Heidelberg (1999)
Freund, R.J., Wilson, W.J.: Statistical Method. Academic Press, San Diego (1993)
Gilbert, H., et al.: A Statistical Attack on RC6. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 64–74. Springer, Heidelberg (2001)
Handschuh, H., Gilbert, H.: χ2 Cryptanalysis of the SEAL Encryption Algorithm. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 1–12. Springer, Heidelberg (1997)
Knudsen, L., Meier, W.: Correlations in RC6 with a reduced number of rounds. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 94–108. Springer, Heidelberg (2001)
Menezes, A., van Oorschot, P.C., Vanstone, S.: Handbook of applied cryptography. CRC Press, Inc., Boca Raton (1996)
Miyaji, A., Nonaka, M.: Cryptanalysis of the Reduced-Round RC6. In: Deng, R.H., et al. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 480–494. Springer, Heidelberg (2002)
Rivest, R.: The RC5 Encryption Algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 86–96. Springer, Heidelberg (1995)
Rivest, R., Robshaw, M., Sidney, R., Yin, Y.: The RC6 Block Cipher. v1.1. August 20 (1998), Available at http://www.rsasecurity.com/rsalabs/rc6/
Shimoyama, T., Takenaka, M., Koshiba, T.: Multiple linear cryptanalysis of a reduced round RC6. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 76–88. Springer, Heidelberg (2002)
Shimoyama, T., Takeuchi, K., Hayakawa, J.: Correlation Attack to the Block Cipher RC5 and the Simplified Variants of RC6. In: 3rd AES Candidate Conference (April 2000)
Vaudenay, S.: An Experiment on DES Statistical Cryptanalysis. In: Proc. 3rd ACM Conference on Computer and Communications Security, pp. 139–147. ACM Press, New York (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Isogai, N., Matsunaka, T., Miyaji, A. (2003). Optimized χ 2-Attack against RC6. In: Zhou, J., Yung, M., Han, Y. (eds) Applied Cryptography and Network Security. ACNS 2003. Lecture Notes in Computer Science, vol 2846. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45203-4_2
Download citation
DOI: https://doi.org/10.1007/978-3-540-45203-4_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20208-0
Online ISBN: 978-3-540-45203-4
eBook Packages: Springer Book Archive