Cost-Effective Architectures for RC5 Brute Force Cracking

Authors

  • J. Buček
  • J. Hlaváč
  • M. Matušková
  • R. Lórencz

DOI:

https://doi.org/10.14311/690

Keywords:

RC5 cipher, decryption, brute-force cracking, FPGA, ASIC

Abstract

In this paper, we discuss the options for brute-force cracking of the RC5 block cipher, that is, for revealing the unknown secret key, given a sample ciphertext and a portion of the corresponding plaintext. First, we summarize the methods employed by the current cracking efforts. Then, we present two hardware architectures for finding the secret key using the “brute force” method. We implement the hardware in FPGA and ASIC and, based on the results, we discuss the cost and time needed to crack the cipher using today’s technology and suggest a minimum key length that can be considered secure. 

Downloads

Download data is not yet available.

Author Biographies

J. Buček

J. Hlaváč

M. Matušková

R. Lórencz

Downloads

Published

2005-01-02

How to Cite

Buček, J., Hlaváč, J., Matušková, M., & Lórencz, R. (2005). Cost-Effective Architectures for RC5 Brute Force Cracking. Acta Polytechnica, 45(2). https://doi.org/10.14311/690

Issue

Section

Articles