Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

RC2

From Wikipedia, the free encyclopedia
Block cipher
For other uses, seeRC2 (disambiguation).
RC2
The MIX transformation of RC2; four of these comprise a MIXING round
General
DesignersRon Rivest
First publishedLeaked in 1996, designed in 1987, officially published in 1998
Cipher detail
Key sizes1–128 bytes
Block sizes64 bits
StructureSource-heavy unbalancedFeistel network
Rounds16 of type MIXING, 2 of type MASHING
Best publiccryptanalysis
Arelated-key attack is possible requiring 234chosen plaintexts (Kelsey et al., 1997).

Incryptography,RC2 (also known asARC2) is asymmetric-keyblock cipher designed byRon Rivest in 1987. "RC" stands for "Ron's Code"[1] (see alsoRC2,RC5 andRC6), but generally called simply RC2. Other ciphers designed by Ron Rivest includeRC4,RC5, andRC6.

The development of RC2 was sponsored byLotus, who were seeking a customcipher that, after evaluation by theNSA, could be exported as part of theirLotus Notes software. The NSA suggested a few changes, which Rivest incorporated. After further negotiations, the cipher was approved for export in 1989. Along with RC4, RC2 with a40-bitkey size was treated favourably under USexport regulations for cryptography.

Initially, the details of the algorithm were kept secret — proprietary toRSA Security — but on 29 January 1996, source code for RC2 was anonymously posted to the Internet on theUsenet forumsci.crypt. Mentions ofCodeView andSoftICE (populardebuggers) suggest that it had beenreverse engineered. A similar disclosure had occurred earlier with RC4.

In March 1998, Ron Rivest authored anRFC publicly describing RC2 himself.[2]

RC2 is a64-bit block cipher with a variable sizekey. Its 18 rounds are arranged as a source-heavy unbalancedFeistel network, with 16 rounds of one type (MIXING) punctuated by two rounds of another type (MASHING). A MIXING round consists of four applications of the MIX transformation, as shown in the diagram.

RC2 is vulnerable to arelated-key attack using 234chosen plaintexts.[3]

References

[edit]
  1. ^"Rivest FAQ at csail.mit.edu".
  2. ^RFC 2268.doi:10.17487/RFC2268.
  3. ^Kelsey, Schneier & Wagner 1997.

Bibliography

[edit]

External links

[edit]
Common
algorithms
Less common
algorithms
Other
algorithms
Design
Attack
(cryptanalysis)
Standardization
Utilization
General
Mathematics
Retrieved from "https://en.wikipedia.org/w/index.php?title=RC2&oldid=1337196234"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp