Theoretical Analysis of χ2 Attack on RC6

Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba

Research output: Contribution to journalArticle

3 Citations (Scopus)


In this paper, we give a theoretical analysis of χ2 attack proposed by Knudsen and Meier on the RC6 block cipher. To this end, we propose a method of security evaluation against χ2 attack precisely including key dependency by introducing a method "Transition Matrix Computing." Previously, no theoretical security evaluation against χ2 attack was known, it has been done by computer experiments. We should note that it is the first result concerning the way of security evaluation against χ2 attack is shown theoretically.

Original languageEnglish
Pages (from-to)28-36
Number of pages9
JournalIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Issue number1
Publication statusPublished - 2004 Jan
Externally publishedYes


  • RC6
  • Transition matrix
  • χ attack

ASJC Scopus subject areas

  • Signal Processing
  • Computer Graphics and Computer-Aided Design
  • Electrical and Electronic Engineering
  • Applied Mathematics

Fingerprint Dive into the research topics of 'Theoretical Analysis of χ<sup>2</sup> Attack on RC6'. Together they form a unique fingerprint.

  • Cite this