Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
The RC5 algorithm is the cipher from the family of symmetric ciphers created by Ronald Rivest. Unlike other encryption algorithms, RC5 is designed this way, that a user or a security system architect can change some of its parameters. RC5 is a block cipher processing cipher-text blocks in the sequential rounds, where input of each round is the output of the previous one. In each round data is processed with usage of the key. The parameters of the cipher that can be changed are following: length of the key, length of the processed block and number of rounds. These parameters should be chosen based on the required level of security of communication. However there are such structures in RC5 that use of them is not entirely clear from the point of view for algorithm’s security. The aim of this paper is to examine how a cryptographic power of the cipher is affected by modifications to these structures. For this purpose will be used the well-known NIST tests.
Rocznik
Tom
Strony
115--122
Opis fizyczny
Bibliogr. 11 poz., tab.
Twórcy
autor
- Military Communication Institute, ul. Warszawska 22A, 05-130 Zegrze Południowe, Poland
autor
- Cardinal Stefan Wyszynski University, Institute of Computer Science, ul. Dewajtis 5, 01-815 Warsaw, Poland
Bibliografia
- [1] Rivest, R. L., The RC5 Encryption Algorithm, Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings, vol. 1008 of LNCS, pp. 86–96, Springer Verlag, 1995.
- [2] Menezes A. J. , van Oorschot P. C., Vanstone S. A., Handbook of Applied Cryptography, CRC Press, 1996.
- [3] Knudsen L. R., Meier W., Differential cryptanalysis of RC5, European Transactions on Telecommunications 8(5), pp. 445-454, 1997. DOI: 10.1002/ett.4460080503
- [4] Biryukov A., Kushilevitz E., Improved Cryptanalysis of RC5, EUROCRYPT 1998, vol. 1403 of LNCS, pp. 85-99, Springer Verlag,1998.
- [5] Rivest, R. L., Block Encryption Algorithm With Data Dependent Rotation, U.S. Patent 5,724,428, issued on 3 March 1998.
- [6] Knudsen L. R., Meier W., Improved Differential Attacks on RC5, Advances in Cryptology — CRYPTO ’96, vol. 1109 of LNCS, pp. 216-228, Springer Verlag, 2001.
- [7] Hasan M., Al-Shalabi H., Modified Cryptanalysis of RC5. Int. Arab J. Inf. Technol. 3(4), pp. 299-302, 2006.
- [8] http://csrc.nist.gov/groups/ST/toolkit/rng/documentation_software.html
- [9] http://csrc.nist.gov/groups/ST/toolkit/rng/stats_tests.html
- [10] http://www.distributed.net/RC5
- [11] http://stats.distributed.net/projects.php?project_id=8
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-60ea7fa3-3a41-42af-8737-cae958cb4b87