Algebraic Cryptanalysis of RC6 with Side Channel Information
Date Issued
2014
Date
2014
Author(s)
Lin, Chen-Chi
Abstract
This paper details a novel chosen ciphertext attack on RC6 cipher which has been chosen as one of the finalists for AES competition (March 1999) and has been declared to be resistant to all known cryptanalysis since then. In this paper, it’ll be shown that with the aid of side channel information and algebraic analysis the attacker can recover all round keys and whitening keys by using at most 2^43 ciphertext pairs and 2^78 computations. Moreover, this paper also provides theoretic analysis of the trade-off between different oracles and the general assumption (without any side channel information given), and then proves that the distribution of round key candidates may not be uniformly random.
Subjects
RC6
旁道攻擊
減法差分
代數攻擊
破密分析
Type
thesis
File(s)![Thumbnail Image]()
Loading...
Name
ntu-103-R97943158-1.pdf
Size
23.32 KB
Format
Adobe PDF
Checksum
(MD5):6399b5c4009b6c14e8f3acd3760aee0e
