fbpx
Wikipedia

RC2

In cryptography, RC2 (also known as ARC2) is a symmetric-key block cipher designed by Ron Rivest in 1987. "RC" stands for "Ron's Code" or "Rivest Cipher"; other ciphers designed by Rivest include RC4, RC5, and RC6.

RC2
The MIX transformation of RC2; four of these comprise a MIXING round
General
DesignersRon Rivest
First publishedLeaked in 1996, designed in 1987, officially published in 1998
Cipher detail
Key sizes1–128 bits
Block sizes64 bits
StructureSource-heavy unbalanced Feistel network
Rounds16 of type MIXING, 2 of type MASHING
Best public cryptanalysis
A related-key attack is possible requiring 234 chosen plaintexts (Kelsey et al., 1997).

The development of RC2 was sponsored by Lotus, who were seeking a custom cipher that, after evaluation by the NSA, could be exported as part of their Lotus Notes software. The NSA suggested a few changes, which Rivest incorporated. After further negotiations, the cipher was approved for export in 1989. Along with RC4, RC2 with a 40-bit key size was treated favourably under US export regulations for cryptography.

Initially, the details of the algorithm were kept secret — proprietary to RSA Security — but on 29 January 1996, source code for RC2 was anonymously posted to the Internet on the Usenet forum sci.crypt. Mentions of CodeView and SoftICE (popular debuggers) suggest that it had been reverse engineered. A similar disclosure had occurred earlier with RC4.

In March 1998, Ron Rivest authored an RFC publicly describing RC2 himself.[1]

RC2 is a 64-bit block cipher with a variable size key. Its 18 rounds are arranged as a source-heavy unbalanced Feistel network, with 16 rounds of one type (MIXING) punctuated by two rounds of another type (MASHING). A MIXING round consists of four applications of the MIX transformation, as shown in the diagram.

RC2 is vulnerable to a related-key attack using 234 chosen plaintexts.[2]

References Edit

  1. ^ RFC 2268. doi:10.17487/RFC2268.
  2. ^ Kelsey, Schneier & Wagner 1997.

Bibliography Edit

External links Edit

  • RFC 2268 - A Description of the RC2(r) Encryption Algorithm
  • RSA FAQ: What is RC2? 2016-03-03 at the Wayback Machine
  • sci.crypt posting revealing the RC2 algorithm

other, uses, disambiguation, cryptography, also, known, symmetric, block, cipher, designed, rivest, 1987, stands, code, rivest, cipher, other, ciphers, designed, rivest, include, transformation, four, these, comprise, mixing, roundgeneraldesignersron, rivestfi. For other uses see RC2 disambiguation In cryptography RC2 also known as ARC2 is a symmetric key block cipher designed by Ron Rivest in 1987 RC stands for Ron s Code or Rivest Cipher other ciphers designed by Rivest include RC4 RC5 and RC6 RC2The MIX transformation of RC2 four of these comprise a MIXING roundGeneralDesignersRon RivestFirst publishedLeaked in 1996 designed in 1987 officially published in 1998Cipher detailKey sizes1 128 bitsBlock sizes64 bitsStructureSource heavy unbalanced Feistel networkRounds16 of type MIXING 2 of type MASHINGBest public cryptanalysisA related key attack is possible requiring 234 chosen plaintexts Kelsey et al 1997 The development of RC2 was sponsored by Lotus who were seeking a custom cipher that after evaluation by the NSA could be exported as part of their Lotus Notes software The NSA suggested a few changes which Rivest incorporated After further negotiations the cipher was approved for export in 1989 Along with RC4 RC2 with a 40 bit key size was treated favourably under US export regulations for cryptography Initially the details of the algorithm were kept secret proprietary to RSA Security but on 29 January 1996 source code for RC2 was anonymously posted to the Internet on the Usenet forum sci crypt Mentions of CodeView and SoftICE popular debuggers suggest that it had been reverse engineered A similar disclosure had occurred earlier with RC4 In March 1998 Ron Rivest authored an RFC publicly describing RC2 himself 1 RC2 is a 64 bit block cipher with a variable size key Its 18 rounds are arranged as a source heavy unbalanced Feistel network with 16 rounds of one type MIXING punctuated by two rounds of another type MASHING A MIXING round consists of four applications of the MIX transformation as shown in the diagram RC2 is vulnerable to a related key attack using 234 chosen plaintexts 2 References Edit RFC 2268 doi 10 17487 RFC2268 Kelsey Schneier amp Wagner 1997 Bibliography EditKelsey John Schneier Bruce Wagner David 1997 Related key cryptanalysis of 3 WAY Biham DES CAST DES X NewDES RC2 and TEA In Han Y Okamoto T Qing S eds Information and Communications Security Lecture Notes in Computer Science Vol 1334 Springer Berlin Heidelberg pp 233 246 doi 10 1007 BFb0028479 ISBN 978 3 540 63696 0 Retrieved 2018 10 10 Knudsen Lars R Rijmen Vincent Rivest Ronald L Robshaw Matthew J B 1998 08 16 On the Design and Security of RC2 PDF Fast Software Encryption Lecture Notes in Computer Science Vol 1372 Springer Berlin Heidelberg pp 206 221 doi 10 1007 3 540 69710 1 14 ISBN 978 3 540 64265 7 Retrieved 2018 10 10 Levy Steven 2001 Crypto how the code rebels beat the government saving privacy in the digital age Penguin Books ISBN 0 14 024432 8 External links EditRFC 2268 A Description of the RC2 r Encryption Algorithm RSA FAQ What is RC2 Archived 2016 03 03 at the Wayback Machine sci crypt posting revealing the RC2 algorithm Retrieved from https en wikipedia org w index php title RC2 amp oldid 1180505937, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.