Abstract
We show that the linear cryptanalytic attack on RC5 that was published by Kaliski and Yin at Crypto’95 does not work as expected due to the failure of some hidden assumptions involved. Then we present new linear attacks on RC5. Our attacks use the same linear approximation as the one used by Kaliski and Yin. Therefore, the plaintext requirement of our attack is around 4w 2r−2 which is impractically high for reasonably high values of w and r. These new attacks has also significances beyond the linear cryptanalysis of RC5 to show how linear cryptanalysis can carry on when the approximation used has a non-zero bias for the wrong key values. We also discuss certain issues about linear cryptanalysis of RC5 that need to be resolved for a better linear attack.
Keywords
This research was done while the author was visiting RSA Laboratories.
Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
B. S. Kaliski and Y. L. Yin. On differential and linear cryptanalysis of the RC5 encryption algorithm. In D. Coppersmith, editor, Advances in Cryptology — Crypto’95, pages 171–184. Springer Verlag, New York, 1995.
L. Knudsen and M. Robshaw. Non-linear approximations in linear cryptanalysis. In U. Maurer, editor, Advances in Cryptology — Eurocrypt’96, pages 224–236. Springer-Verlag, New York, 1996.
M. Matsui. Linear cryptanalysis of DES cipher (I). Journal of Cryptology, to appear.
M. Matsui. Linear cryptanalysis method for DES cipher. In T. Helleseth, editor, Advances in Cryptology — Eurocrypt’93, pages 386–397. Springer-Verlag, Berlin, 1994.
R. Rivest. The RC5 encryption algorithm. In Fast Software Encryption, Second International Workshop, pages 86–96. Springer-Verlag, New York, 1995.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Selçuk, A.A. (1998). New Results in Linear Cryptanalysis of RC5. In: Vaudenay, S. (eds) Fast Software Encryption. FSE 1998. Lecture Notes in Computer Science, vol 1372. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-69710-1_1
Download citation
DOI: https://doi.org/10.1007/3-540-69710-1_1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64265-7
Online ISBN: 978-3-540-69710-7
eBook Packages: Springer Book Archive