Cost-Effective Architectures for RC5 Brute Force Cracking
DOI:
https://doi.org/10.14311/690Keywords:
RC5 cipher, decryption, brute-force cracking, FPGA, ASICAbstract
In this paper, we discuss the options for brute-force cracking of the RC5 block cipher, that is, for revealing the unknown secret key, given a sample ciphertext and a portion of the corresponding plaintext. First, we summarize the methods employed by the current cracking efforts. Then, we present two hardware architectures for finding the secret key using the “brute force” method. We implement the hardware in FPGA and ASIC and, based on the results, we discuss the cost and time needed to crack the cipher using today’s technology and suggest a minimum key length that can be considered secure.Downloads
Downloads
Published
2005-01-02
Issue
Section
Articles
How to Cite
Buček, J., Hlaváč, J., Matušková, M., & Lórencz, R. (2005). Cost-Effective Architectures for RC5 Brute Force Cracking. Acta Polytechnica, 45(2). https://doi.org/10.14311/690