The RC5 encryption algorithm

  • Ronald L. Rivest
Session 2: Block Ciphers-Design
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1008)


This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of data-dependent rotations. RC5 has a variable word size, a variable number of rounds, and a variable-length secret key. The encryption and decryption algorithms are exceptionally simple.


Encryption Algorithm Decryption Algorithm Differential Cryptanalysis Magic Constant Ciphertext Block 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    E. Biham and A. Shamir. A Differential Cryptanalysis of the Data Encryption Standard. Springer-Verlag, 1993.Google Scholar
  2. 2.
    W. E. Madryga. A high performance encryption algorithm. In Computer Security: A Global Challenge, pages 557–570. North Holland: Elsevier Science Publishers, 1984.Google Scholar
  3. 3.
    Mitsuru Matsui. The first experimental cryptanalysis of the Data Encryption Standard. In Yvo G. Desmedt, editor, Proceedings CRYPTO 94, pages 1–11. Springer, 1994. Lecture Notes in Computer Science No. 839.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1995

Authors and Affiliations

  • Ronald L. Rivest
    • 1
  1. 1.MIT Laboratory for Computer ScienceCambridge

Personalised recommendations