17 Dec
2003
17 Dec
'03
11:17 p.m.
Forgive this seemingly naive question, but.... Where does RC5 derive its security from? I know about the ROTL stuff and the key expansion methods (I have the RSA Cryptobytes, HAC, AC, etc.) However, I personally can't see how it would work. I know its supposedly secure because of the data-dependent rotations, and other features. Correct me if I'm wrong, but a ROTL assembler command shifts all bits to the LEFT one and moves the "overflow" bits back into the right end of the register: 0100111011 to 0011101101 if it rotates left by 2 How does this make it hard to decrypt? The round function seems MUCH weaker than IDEA's, CAST's, or even GOST and Blowfish. Vincent Carlos
7707
Age (days ago)
7707
Last active (days ago)
0 comments
1 participants
participants (1)
-
vcarlos35@juno.com