Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Encryption/decryption  





2 Possible use in NSA "implants"  





3 Licensing  





4 References  





5 Bibliography  





6 External links  














RC6






العربية
Čeština
Deutsch
Español
Français

Italiano
עברית
Монгол

Polski
Português
Русский
Simple English
Slovenščina
Svenska
Türkçe
Українська

 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


RC6
The Feistel function of the RC6 algorithm.
General
DesignersRon Rivest, Matt Robshaw, Ray Sidney, Yiqun Lisa Yin
First published1998
Derived fromRC5
CertificationAES finalist
Cipher detail
Key sizes128, 192, or 256 bits
Block sizes128 bits
StructureFeistel network (Type 2)[1]
Rounds20

Incryptography, RC6 (Rivest cipher 6) is a symmetric key block cipher derived from RC5. It was designed by Ron Rivest, Matt Robshaw, Ray Sidney, and Yiqun Lisa Yin to meet the requirements of the Advanced Encryption Standard (AES) competition. The algorithm was one of the five finalists, and also was submitted to the NESSIE and CRYPTREC projects. It was a proprietary algorithm, patented by RSA Security.

RC6 proper has a block size of 128 bits and supports key sizes of 128, 192, and 256 bits up to 2040-bits, but, like RC5, it may be parameterised to support a wide variety of word-lengths, key sizes, and number of rounds. RC6 is very similar to RC5 in structure, using data-dependent rotations, modular addition, and XOR operations; in fact, RC6 could be viewed as interweaving two parallel RC5 encryption processes, although RC6 does use an extra multiplication operation not present in RC5 in order to make the rotation dependent on every bit in a word, and not just the least significant few bits.

Encryption/decryption

[edit]

Note that the key expansion algorithm is practically identical to that of RC5. The only difference is that for RC6, more words are derived from the user-supplied key.

// Encryption/Decryption with RC6-w/r/b
// 
// Input:   Plaintext stored in four w-bit input registers A, B, C &D
//  r is the number of rounds
//  w-bit round keys S[0, ... , 2r + 3]
// 
// Output: Ciphertext stored in A, B, C, D
// 
// '''Encryption Procedure:'''

 B = B + S[0]
 D = D + S[1]
 for i = 1 to r do
 {
  t = (B * (2B + 1)) <<< lg w
  u = (D * (2D + 1)) <<< lg w
  A = ((A ^ t) <<< u) + S[2i]
  C = ((C ^ u) <<< t) + S[2i + 1] 
  (A, B, C, D)  =  (B, C, D, A)
 }
 A = A + S[2r + 2]
 C = C + S[2r + 3]

// '''Decryption Procedure:'''

 C = C - S[2r + 3]
 A = A - S[2r + 2]
 for i = r downto 1 do
 {
  (A, B, C, D) = (D, A, B, C)
  u = (D * (2D + 1)) <<< lg w
  t = (B * (2B + 1)) <<< lg w
  C = ((C - S[2i + 1]) >>> t) ^ u
  A = ((A - S[2i]) >>> u) ^ t
 }
 D = D - S[1]
 B = B - S[0]

Possible use in NSA "implants"

[edit]

In August 2016, code reputed to be Equation GrouporNSA "implants" for various network security devices was disclosed.[2] The accompanying instructions revealed that some of these programs use RC6 for confidentiality of network communications.[3]

Licensing

[edit]

As RC6 was not selected for the AES, it was not guaranteed that RC6 is royalty-free. As of January 2017, a web page on the official web site of the designers of RC6, RSA Laboratories, states the following:[4]

"We emphasize that if RC6 is selected for the AES, RSA Security will not require any licensing or royalty payments for products using the algorithm".

The emphasis on the word "if" suggests that RSA Security Inc. may have required licensing and royalty payments for any products using the RC6 algorithm. RC6 was a patented encryption algorithm (U.S. patent 5,724,428 and U.S. patent 5,835,600); however, the patents expired between 2015 and 2017.

References

[edit]
  1. ^ Hoang, Viet Tung; Rogaway, Phillip (2010). "On Generalized Feistel Networks". LNCS 6223. CRYPTO 2010. USA: Springer. pp. 613–630. doi:10.1007/978-3-642-14623-7_33.
  • ^ "Confirmed: hacking tool leak came from "omnipotent" NSA-tied group". Ars Technica. August 16, 2016.
  • ^ "These instructions guide the INSTALLATION of BLATSTING using ELIGIBLEBACHELOR via NOPEN tunnel". GitHub. Retrieved 2016-08-16.
  • ^ "3.6.4 What are RC5 and RC6?". RSA Laboratories. Archived from the original on 2017-07-06. Retrieved 2015-08-02.
  • Bibliography

    [edit]
    • Pavan, R.L.; Robshaw, M.J.B.; Sidney, R.; Yin., Y.L. (1998-08-20). "The RC6 Block Cipher" (PDF). v1.1. Archived from the original (PDF) on 2018-12-23. Retrieved 2015-08-02.
    [edit]
    Retrieved from "https://en.wikipedia.org/w/index.php?title=RC6&oldid=1183383364"

    Category: 
    Block ciphers
    Hidden categories: 
    Articles with short description
    Short description is different from Wikidata
    Articles lacking in-text citations from March 2009
    All articles lacking in-text citations
    Articles containing potentially dated statements from January 2017
    All articles containing potentially dated statements
     



    This page was last edited on 3 November 2023, at 23:39 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki