Algebraic Cryptanalysis of RC6 with Side Channel Information

碩士 === 國立臺灣大學 === 電子工程學研究所 === 102 === This paper details a novel chosen ciphertext attack on RC6 cipher which has been chosen as one of the finalists for AES competition (March 1999) and has been declared to be resistant to all known cryptanalysis since then. In this paper, it’ll be shown that with...

Full description

Bibliographic Details
Main Authors: Chen-Chi Lin, 林珍綺
Other Authors: 鄭振牟
Format: Others
Language:zh-TW
Published: 2014
Online Access:http://ndltd.ncl.edu.tw/handle/71482685932075775195
id ndltd-TW-102NTU05428066
record_format oai_dc
spelling ndltd-TW-102NTU054280662016-03-09T04:24:20Z http://ndltd.ncl.edu.tw/handle/71482685932075775195 Algebraic Cryptanalysis of RC6 with Side Channel Information 利用旁道資訊對RC6進行的代數攻擊分析 Chen-Chi Lin 林珍綺 碩士 國立臺灣大學 電子工程學研究所 102 This paper details a novel chosen ciphertext attack on RC6 cipher which has been chosen as one of the finalists for AES competition (March 1999) and has been declared to be resistant to all known cryptanalysis since then. In this paper, it’ll be shown that with the aid of side channel information and algebraic analysis the attacker can recover all round keys and whitening keys by using at most 2^43 ciphertext pairs and 2^78 computations. Moreover, this paper also provides theoretic analysis of the trade-off between different oracles and the general assumption (without any side channel information given), and then proves that the distribution of round key candidates may not be uniformly random. 鄭振牟 2014 學位論文 ; thesis 73 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立臺灣大學 === 電子工程學研究所 === 102 === This paper details a novel chosen ciphertext attack on RC6 cipher which has been chosen as one of the finalists for AES competition (March 1999) and has been declared to be resistant to all known cryptanalysis since then. In this paper, it’ll be shown that with the aid of side channel information and algebraic analysis the attacker can recover all round keys and whitening keys by using at most 2^43 ciphertext pairs and 2^78 computations. Moreover, this paper also provides theoretic analysis of the trade-off between different oracles and the general assumption (without any side channel information given), and then proves that the distribution of round key candidates may not be uniformly random.
author2 鄭振牟
author_facet 鄭振牟
Chen-Chi Lin
林珍綺
author Chen-Chi Lin
林珍綺
spellingShingle Chen-Chi Lin
林珍綺
Algebraic Cryptanalysis of RC6 with Side Channel Information
author_sort Chen-Chi Lin
title Algebraic Cryptanalysis of RC6 with Side Channel Information
title_short Algebraic Cryptanalysis of RC6 with Side Channel Information
title_full Algebraic Cryptanalysis of RC6 with Side Channel Information
title_fullStr Algebraic Cryptanalysis of RC6 with Side Channel Information
title_full_unstemmed Algebraic Cryptanalysis of RC6 with Side Channel Information
title_sort algebraic cryptanalysis of rc6 with side channel information
publishDate 2014
url http://ndltd.ncl.edu.tw/handle/71482685932075775195
work_keys_str_mv AT chenchilin algebraiccryptanalysisofrc6withsidechannelinformation
AT línzhēnqǐ algebraiccryptanalysisofrc6withsidechannelinformation
AT chenchilin lìyòngpángdàozīxùnduìrc6jìnxíngdedàishùgōngjīfēnxī
AT línzhēnqǐ lìyòngpángdàozīxùnduìrc6jìnxíngdedàishùgōngjīfēnxī
_version_ 1718201026096398336