Theoretical analysis of χ2attack on RC6

  • Authors:
  • Masahiko Takenaka;Takeshi Shimoyama;Takeshi Koshiba

  • Affiliations:
  • Secure Computing Lab., Fujitsu Laboratories Ltd., Kawasaki, Japan;Secure Computing Lab., Fujitsu Laboratories Ltd., Kawasaki, Japan;Secure Computing Lab., Fujitsu Laboratories Ltd., Kawasaki, Japan

  • Venue:
  • ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we give a theoretical analysis of χ2 attack proposed by Knudsen and Meier on the RC6 block cipher. To this end, we propose the method of security evaluation against χ2 attack precisely including key dependency by introducing a method "Transition Matrix Computing." Previously, no theoretical security evaluation against χ2 attack was known, it has been done by computer experiments. We should note that this is the first results that a theoretical evaluation against χ2 attack is shown.