Theoretical analysis of η2 attack on RC6

Masahiko Takenaka*, Takeshi Shimoyama, Takeshi Koshiba

*Corresponding author for this work

Research output: Contribution to journalConference articlepeer-review

2 Citations (Scopus)

Abstract

In this paper, we give a theoretical analysis of η2 attack proposed by Knudsen and Meier on the RC6 block cipher. To this end, we propose the method of security evaluation against η2 attack precisely including key dependency by introducing a method "Transition Matrix Computing." Previously, no theoretical security evaluation against η2 attack was known, it has been done by computer experiments. We should note that this is the first results that a theoretical evaluation against η2 attack is shown.

Original languageEnglish
Pages (from-to)142-153
Number of pages12
JournalLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2727 LNCS
DOIs
Publication statusPublished - 2003
Externally publishedYes
Event8th Australasian Conference on Information Security and Privacy, ACISP 2003 - Wollongong, NSW, Australia
Duration: 2003 Jul 92003 Jul 11

Keywords

  • RC6
  • Transition Matrix
  • η attack

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Theoretical analysis of η2 attack on RC6'. Together they form a unique fingerprint.

Cite this