Browse > Article
http://dx.doi.org/10.6109/JKIICE.2009.13.4.675

Symmetry structured RC6 block cipher algorithm  

Kim, Gil-Ho (부경대학교 컴퓨터공학과)
Park, Chang-Soo (부경대학교 컴퓨터공학과)
Kim, Jong-Nam (부경대학교 컴퓨터공학과)
Cho, Gyeong-Yeon (부경대학교 컴퓨터공학과)
Abstract
RC6 which has different algorithm of encryption and decryption has been proposed to have the same algorithm between encryption and decryption through inserting symmetry layer using simple rotate and logical operation. That means the half of whole RC6 round uses encryption algorithm and the rest of it uses decryption one and symmetry layer has been put into the middle of encryption and decryption. The proposed RC6 algorithm has no difference with the original one in the speed of process. However it is quite safe because by inserting symmetry layer the path of high probability which is needed for differential and linear analysis is cut off so that it is hard to be analyzed. The proposed symmetry layer algorithm can be easily applied to the algorithm which has different encryption and decryption and make it same, and it can be good idea to be used to design a new block cipher algorithm.
Keywords
RC6; Feistel; SPN; Symmetry layer; CBC mode;
Citations & Related Records
연도 인용수 순위
  • Reference
1 "New European Schemes for Signatures. Integrity. and Encryption(NESSIE)," http://cryptonessie.org/
2 SEED, http://http://www.kisa.or.kr/seed/
3 E. Biham and A. Shamir, 'Differential cryptanalysis for DES-like cryptosystem,' Journal of Cryptlogy 4(1): 3-17, 1991   DOI
4 L. R. Knudsen, "Truncated and higher order differential," Fast Software Encryption-Second International Workshop, LNCS Vol.1008, pp. 196- 211, 1995
5 C. E. Shannon, "Communication theory of secrecy system," Bell System Technical Journal, Vol.28, No.4, pp. 656-715, 1949   DOI
6 "Report on the Development of the Advanced Encryption Standard(AES)," http://www.csrc.nist.gov/encryption/aes/
7 J. Daemen, L. Knudsan, and V. Rijmen, "The block cipher square," Proceeding of FSE`97 LNCS Vol.1267, pp. 149-165, 1997
8 ARIA, http://www.nsri.re.kr/ARIA/
9 S. Contini, R.L. Rivest, M.J.B. Robshaw, and Y.L. Yin, "The security of RC6," http://www.rsasecurity. com/rsalabs/aes
10 "Cryptography Research and Evaluation Committees (CRYPTREC)," http://www.cryptrec.go.jp/
11 M. Matsui, "Linear cryptanalysis method for DES cipher," In Tor Helleseth, editor, Advances in Cryptology-Eurocrypt `93, LNCS Vol.765, pp. 386- 397, 1994
12 H. Feistel, "Cryptography and Computer Privacy," Scientific American, Vol.228, No.5, pp. 15-23, 1973   DOI   PUBMED   ScienceOn