Uma versão mais forte do algoritmo RC6 contra criptanálise χ2

  • Eduardo Takeo Ueda USP
  • Routo Terada USP

Abstract


We analyze the χ2 attack, one of the most successful cryptanalysis technique against the RC6 algorithm. We apply this type of cryptanalysis as distinction attack as well as key-recovery attack. We present a modified version of RC6 by introducing a swapping function in its structure. The conclusions inferred by stastistical experiments is that this modified version is stronger against the χ2 cryptanalys technique.

References

Isogai, N., Matsunaka, T., and Miyaji, A. (2003). Optimized χ2-Attack against RC6. Applied Cryptography and Network Security, pages 16–32.

Kelsey, J., Schneier, B., and Wagner, D. (1999). Mod n Cryptanalysis, with Applications Against RC5P and M6. Lecture Notes in Computer Science, 1636:139–155.

Knudsen, L. R. and Meier, W. (2000). Correlations in RC6 with a Reduced Number of Rounds. Proceedings of the 7th International Workshop on Fast Software Encryption.

Knuth, D. E. (1981). The Art of Computer Programming, Volume 2, volume 2. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2 edition.

Miyaji, A. and Nonaka, M. (2002). Cryptanalysis of the Reduced-Round RC6. International Conference on Information and Communications Security, pages 480–494.

Miyaji, A. and Nonaka, M. (2003). Cryptanalysis of Reduced-Round RC6 without Whitening. IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, E86-A(1):19–30.

Miyaji, A. and Takano, Y. (2005). On the Success Probability of χ2-attack on RC6. Australasian Conference on Information Security and Privacy, pages 61–74.

Rivest, R. L., Robshaw, M. J. B., Sidney, R., and Yin, Y. L. (1998). The RC6 Block Cipher. Version 1.1.

Ryabko, B. (2003). Adaptive Chi-Square Test and Its Application to Some Cryptographic Problems. Cryptology ePrint Archive.

Takenaka, M., Shimoyama, T., and Koshiba, T. (2004). Theoretical Analysis of χ2 Attack on RC6. IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, E87-A(1):28–35.

Terada, R. (2000). Segurança de Dados Criptografia em Redes de Computador. Editora Edgard Blücher, São Paulo, SP, 1 edition.

Terada, R. and Junior, I. C. (2003). A Stronger Version of RC6 Against Differential Cryptanalysis. Symposium on Cryptography and Information Security, pages 11D04–11D09.

Terada, R., Pinheiro, P. G., and Koyama, K. (1996). A New Version of FEAL, Stronger Against Differential Cryptanalysis. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E79-A(1).

Vaudenay, S. (1996). An Experiment on DES Statistical Cryptanalysis. ACM Conference on Computer and Communications Security, pages 139–147.
Published
2007-08-27
UEDA, Eduardo Takeo; TERADA, Routo. Uma versão mais forte do algoritmo RC6 contra criptanálise χ2. In: BRAZILIAN SYMPOSIUM ON INFORMATION AND COMPUTATIONAL SYSTEMS SECURITY (SBSEG), 7. , 2007, Rio de Janeiro. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2007 . p. 26-37. DOI: https://doi.org/10.5753/sbseg.2007.20915.

Most read articles by the same author(s)

1 2 > >>