Abstract
This paper details the attack on RC6 which was announced in a report published in the proceedings of the second AES candidate conference (March 1999). Based on an observation on the RC6 statistics, we show how to distinguish RC6 from a random permutation and to recover the secret extended key for a fair number of rounds.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
O. Baudron, H. Gilbert, L. Granboulan, H. Handschuh, A. Joux, P. Nguyen, F. Noilhan, D. Pointcheval, T. Pornin, G. Poupard, J. Stern, S. Vaudenay, “Report on the AES Candidates,” The Second Advanced Encryption Standard Candidate Conference, N.I.S.T., 1999, pp. 53–67.
FIPS 46, Data Encryption Standard, US Department of Commerce, National Bureau of Standards, 1977 (revised as FIPS 46-1:1988; FIPS 46-2:1993).
T. Iwata, K. Kurosawa, “On the Pseudorandomness of AES Finalists — RC6 and Serpent”, These proceedings.
B. S. Kaliski Jr., Y. L. Yin, “On the Security of the RC5 Encryption Algorithm”, RSA Laboratories Technical Report TR-602, Version 1.0-September 1998.
L. Knudsen, W. Meier, “Correlations in RC6 with a reduced number of rounds ”, These proceedings.
M. Matsui, “The first experimental cryptanalysis of the Data Encryption Standard”. In Advances in Cryptology-Crypto’94, pp 1–11, Springer Verlag, New York, 1994.
S. Moriai, S. Vaudenay, “Comparison of randomness provided by several schemes for block ciphers”, Preprint, 1999.
R.L. Rivest, M.J.B. Robshaw, R. Sidney and Y.L. Yin,“The RC6 Block Cipher”, v1.1, August 20, 1998.
S. Vaudenay, “An experiment on DES-Statistical Cryptanalysis”. In 3rd ACM Conference on Computer Security, New Dehli, India, pp139–147, ACM Press, 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gilbert, H., Handschuh, H., Joux, A., Vaudenay, S. (2001). A Statistical Attack on RC6. In: Goos, G., Hartmanis, J., van Leeuwen, J., Schneier, B. (eds) Fast Software Encryption. FSE 2000. Lecture Notes in Computer Science, vol 1978. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44706-7_5
Download citation
DOI: https://doi.org/10.1007/3-540-44706-7_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41728-6
Online ISBN: 978-3-540-44706-1
eBook Packages: Springer Book Archive