Presentation 2001/9/10
A Study on Known Plaintext Attack against RC5 by using Correlations
Masao NONAKA, Atsuko MIYAJI, Yoshinori TAKII,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Various attacks against RC5 have been analyzed intensively. A known plaintext attack has not been reported that it works on so higher round as a chosen plaintext attack, but it can work more efficiently and practically. In this paper we investigate a known plaintext attack against RC5 by improving a correlation attack. Our known plaintext correlation attack can break RC5-32 with 10 rounds(20 half-rounds)with a success probability of 90% by using 2^<63.67) plaintexts. Furthermore our attack can break RC5-32 with 21 half-rounds in a success probability of 30% by using 2^<63.07> plaintexts.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) RC5 / Correlation attack / A known plaintext attack
Paper # ISEC 2001-61
Date of Issue

Conference Information
Committee ISEC
Conference Date 2001/9/10(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Study on Known Plaintext Attack against RC5 by using Correlations
Sub Title (in English)
Keyword(1) RC5
Keyword(2) Correlation attack
Keyword(3) A known plaintext attack
1st Author's Name Masao NONAKA
1st Author's Affiliation School of Information Science, Japan Advanced Institute of Science and Technology()
2nd Author's Name Atsuko MIYAJI
2nd Author's Affiliation School of Information Science Japan Advanced Institute of Science and Technology
3rd Author's Name Yoshinori TAKII
3rd Author's Affiliation Japan Air Self Defense Force
Date 2001/9/10
Paper # ISEC 2001-61
Volume (vol) vol.101
Number (no) 311
Page pp.pp.-
#Pages 8
Date of Issue