1 / 19

Analysis of RC6 Symmetric Encryption Algorithm

Analysis of RC6 Symmetric Encryption Algorithm. Heyan Huang. Overview. History What is RC6 Algorithm Strengths & Weaknesses Demonstration Summary. History of RC6. Developed in 1998 for the Advanced Encryption Standard (AES) competition Derivative of RC5

Download Presentation

Analysis of RC6 Symmetric Encryption Algorithm

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Analysis of RC6 Symmetric Encryption Algorithm Heyan Huang

  2. Overview • History • What is RC6 • Algorithm • Strengths & Weaknesses • Demonstration • Summary

  3. History of RC6 • Developed in 1998 for the Advanced Encryption Standard (AES) competition • Derivative of RC5 • Met all 3 criteria for the competition: “high security, exceptional simplicity, and good performance.” [Robshaw] • AES Competition 5 Finalists: • Rijndael: 86 positive, 10 negative • Serpent: 59 positive, 7 negative • Twofish: 31 positive, 21 negative • RC6: 23 positive, 37 negative • MARS: 13 positive, 84 negative [Wikipedia]

  4. NIST Comments “Each of the finalist algorithms appears to offer adequate security, and each offers a considerable number of advantages. Any of the finalists could serve admirably as the AES. However, each algorithm also has one or more areas where it does not fare quite as well as some other algorithm; none of the finalists is outstandingly superior to the rest.” – Nechvatal, Barker, Bassham, Burr, Dworkin, Foti, Roback

  5. Features of RC6 • Symmetric key block cipher • Combines simplicity with security • 128 bit block size • Key sizes 128, 192 & 256 bits • 20 round iteration • Supports various word-lengths, key sizes and number of rounds • Works well with 32 bit systems

  6. Features of RC6 • Data-dependent rotations, modular addition and XOR operations • Rotation depends on every bit in a word, not the least significant bits.

  7. RC6

  8. Key Setup

  9. Encoding

  10. Decoding

  11. Symmetric

  12. Test Case

  13. Test

  14. Demonstration

  15. Strengths • Most susceptible to brute force attacks, so a key length of 20+ is recommended. [Contini] Figure 3: “Estimates of the Plaintext Requirements to Attack RC6” (Contini 1998)

  16. Weaknesses • Less than 20 rounds would still be susceptible. • Aimed to operate on 32-bit systems, weak on 8-bit processors. • Performance profile on 64-bit machines was volatile.

  17. Summary • History • Algorithm • Encryption • Decryption • Demonstration • Strengths & Weaknesses

  18. Questions?

  19. Bibliography • R.L. pavan, M.J.B. Robshaw, R.Sidney, and Y.L. Yin. The RC6 Block Cipher. v1.1, August 1998. • Wikipedia: http://en.wikipedia.org/wiki/RC6 • M.J.B. Robshaw (2001, Jan 9), “RC6 and the AES”, retrieved from ftp://ftp.rsasecurity.com/pub/rsalabs/rc6/rc6%2Baes.pdf • J. Nechvatal, E. Barker, L. Bassham, W. Burr, M. Dworkin, J. Foti, and E. Roback. Reprot on the Development of the Advanced encryption Standard (AES). October 2, 2000.

More Related