Handbook of Applied Cryptography
Handbook of Applied Cryptography
On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Improved Differential Attacks on RC5
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Linear Cryptanalysis of RC5 and RC6
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Mod n Cryptanalysis, with Applications Against RC5P and M6
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Improved Analysis of Some Simplified Variants of RC6
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Correlations in RC6 with a Reduced Number of Rounds
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Multiple Linear Cryptanalysis of a Reduced Round RC6
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
A new version of the RC6 algorithm, stronger against X2 cryptanalysis
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
On the success probability of χ2-attack on RC6
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Hi-index | 0.00 |
In this paper, we propose the efficient and feasible key recovery algorithm against the reduced-round RC6 without whitening, called RC6W. Our attack applies to a rather large number of rounds. RC6W with r rounds can be broken in a success probability of 90% by using 28.1r-13.8 plaintexts. Therefore, our attack can break RC6W with 17 rounds by using 2123.9 plaintexts in a probability of 90%.