Abstract
This paper describes a timing attack on the RC5 block encryption algorithm. The analysis is motivated by the possibility that some implementations of RC5 could result in the data-dependent rotations taking a time that is a function of the data. Assuming that encryption timing measurements can be made which enable the cryptanalyst to deduce the total amount of rotations carried out during an encryption, it is shown that, for the nominal version of RC5, only a few thousand ciphertexts are required to determine 5 bits of the last half-round subkey with high probability. Further, it is shown that it is practical to determine the whole secret key with about 220 encryption timings with a time complexity that can be as low as 228.
Chapter PDF
Similar content being viewed by others
References
R. L. Rivest. The RC5 Encryption Algorithm. In Fast Software Encryption-Second International Workshop, Leuven, Belgium, LNCS 1008, pages 86–96, Springer-Verlag, 1995.
B. S. Kaliski and Y. L. Yin. On Differential and Linear Cryptanalysis of the RC5 Encryption Algorithm. In Advances in Cryptology-Crypto’95, LNCS 963, pages 171–184. Springer-Verlag, 1995.
L. R. Knudsen and W. Meier. Improved Differential Attacks on RC5. In Advances in Cryptology-Crypto’96, LNCS 1109, pages 216–228, Springer-Verlag, 1996.
Biryukov and Kushilevitz. Improved Cryptanalysis of RC5. In Advances in Cryptology-Eurocrypt’98, LNCS, pages 85–99, Springer-Verlag, 1998.
A. A. Selcuk. New results in linear cryptanalysis of RC5. In Fast Software Encryption-Fifth International Workshop, Paris, France, LNCS, pages 1–16, Springer-Verlag, 1998.
H.M. Heys, Linearly Weak Keys of RC5. IEE Electronics Letters, vol. 33, no. 10, pp. 836–837, 1997.
Paul C. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Advances in Cryptology-Crypto’96, LNCS 1109, pages 104–113, Springer-Verlag, 1996.
H. Handschuh, A Timing Attack on RC5. In Workshop Record of SAC’ 98, Queen’s University, Kingston,Canada, pages 318–329, 1998.
H.M. Heys, A Timing Attack on RC5. In Workshop Record of SAC’ 98, Queen’s University, Kingston,Canada, pages 330–343, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Handschuh, H., Heys, H.M. (1999). A Timing Attack on RC5. In: Tavares, S., Meijer, H. (eds) Selected Areas in Cryptography. SAC 1998. Lecture Notes in Computer Science, vol 1556. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48892-8_24
Download citation
DOI: https://doi.org/10.1007/3-540-48892-8_24
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65894-8
Online ISBN: 978-3-540-48892-7
eBook Packages: Springer Book Archive