This preview shows page 1. Sign up to view the full content.
Unformatted text preview: e n is the maximum of 2(r + 1) and c): A = Si = (Si + A + B) <<< 3 B = Lj = (Lj + A + B) <<< (A + B) i = (i + 1) mod 2(r + 1) j = (j + 1) mod c Previous Table of Contents Next Products  Contact Us  About Us  Privacy  Ad Info  Home Use of this site is subject to certain Terms & Conditions, Copyright © 19962000 EarthWeb Inc. All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is prohibited. Read EarthWeb's privacy statement. To access the contents, click the chapter and section titles. Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth)
Go!
Keyword
Brief Full Advanced Search Search Tips (Publisher: John Wiley & Sons, Inc.) Author(s): Bruce Schneier ISBN: 0471128457 Publication Date: 01/01/96 Search this book:
Go! Previous Table of Contents Next
 RC5 is actually a family of algorithms. We just defined RC5 with a 32bit word size and 64bit block; there’s no reason why the same algorithm can’t have a 64bit word size and 128bit block size. For w = 64, P and Q are 0xb7e151628aed2a6b and 0x9e3779b97f4a7c15, respectively. Rivest designates particular implementations of RC5 as RC5w/r/b, where w is the word size, r is the number of rounds, and b is the length of the key in bytes. RC5 is new, but RSA Laboratories has spent considerable time analyzing it with a 64bit block. After 5 rounds, the statistics look very good. After 8 rounds, every plaintext bit affects at least one rotation. There is a differential attack that requires 224 chosen plaintexts for 5 rounds, 245 for 10 rounds, 253 for 12 rounds, and 268 for 15 rounds. Of course, there are only 264 possible chosen plaintexts, so this attack won’t work for 15 or more rounds. Linear cryptanalysis estimates indicate that it is secure after 6 rounds. Rivest recommends at least 12 rounds, and possibly 16 [1325]. This number may change. RSADSI is in the process of patenting RC5, and the name is trademarked. The company clai...
View
Full
Document
 Fall '10
 ALIULGER
 Cryptography

Click to edit the document details