Factbites
 Where results make sense
About us   |   Why use us?   |   Reviews   |   PR   |   Contact us  

Topic: RC5


Related Topics
RC2
RC6

In the News (Wed 24 Apr 19)

  
  RFC 2040 (rfc2040) - The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms   (Site not responding. Last check: 2007-10-22)
The RC5 cipher was invented by Professor Ronald L. Rivest of the Massachusetts Institute of Technology in 1994.
When RC5 is used as a 64 bit block cipher, B is 64 and W is 32.
For RC5 with 12 rounds, the key setup time and data encryption time are the same for all key lengths less than 832 bits, so there is no performance reason for choosing short keys.
www.faqs.org /rfcs/rfc2040.html   (4590 words)

  
  RC5 - Wikipedia, the free encyclopedia
RC5 is a block cipher notable for its simplicity.
Unlike many schemes, RC5 has a variable block size (32, 64 or 128 bits), key size (0 to 2040 bits) and number of rounds (0 to 255).
A key feature of RC5 is the use of data-dependent rotations; one of the goals of RC5 was to prompt the study and evaluation of such operations as a cryptographic primitive.
www.wikipedia.org /wiki/RC5_encryption_algorithm   (408 words)

  
 RC5 - Gurupedia
RC5 is a block cipher notable for its simplicity.
Unlike many schemes, RC5 has a variable block size (32, 64 or 128 bits), key size (0 to 2040 bits) and number of rounds (0 to 255).
RC5 makes extensive use of data-dependent rotations, a relatively novel cryptographic operation — they were used previously only in Madryga —; and combines them with modular addition and eXclusive OR (XOR) in a Feistel-like network.
www.gurupedia.com /r/rc/rc5.htm   (272 words)

  
 RSA Laboratories - 3.6.4 What are RC5 and RC6?
RC5 [Riv95] is a fast block cipher designed by Ronald Rivest for RSA Data Security (now RSA Security) in 1994.
In the five years since RC5 was proposed, there have been numerous studies of RC5's security [KY95] [KM96] [BK98] [Sel98].
Like RC5, RC6 is a parameterized algorithm where the block size, the key size, and the number of rounds are variable; again, the upper limit on the key size is 2040 bits.
www.rsa.com /rsalabs/node.asp?id=2251   (574 words)

  
 RC5 in perl5
RC5 is a symmetric block cipher which encrypts in 8 byte blocks.
RC5 is the subject of research at the moment, it is not a tried and trusted cryptosystem.
RC5 has a variable sized key, and has a variable number of rounds.
www.cypherspace.org /adam/rsa/rc5.html   (816 words)

  
 trakMARX - RC5
RC5 dropped the bomb this summer in the UK in the form of their "Amercian Rock and Roll" lp on 20 Stone Blatt Records.
RC5 - RC5 rose from the ashes of Zipgun, Jesus Christ Superfly and AMA (all Seatle based punk n roll bands).
RC5 - I think all that's left in the art of making music is stealing other people's ideas and putting yer own signature on it.
www.trakmarx.com /2002_01/rc5.htm   (821 words)

  
 Dr. Dobb's | The RC5 Encryption Algorithm | July 22, 2001
RC5 is not intended to be secure for all possible parameter values.
For example, RC5-32/16/7 is an RC5 algorithm with the number of rounds and the length of key equivalent to DES.
A distinguishing feature of RC5 is its heavy use of data-dependent rotations--the amount of rotation performed is dependent on the input data, and is not predetermined.
www.ddj.com /184409480   (807 words)

  
 Ace's Hardware - RC5 Hardware Network   (Site not responding. Last check: 2007-10-22)
The RC5 Hardware Network is a joint effort between Ace's Hardware and other hardware-related websites across the internet to defeat RSA's RC5 encryption and win the contest set forth by RSA.
We are currently utilizing Distributed.Net's RC5 cracking network to accomplish this task.
RC5 Hardware Network uses it's own keyserver to minimize connectivity problems with the larger global network as well as to provide frequently updated, internal statistics for all our users.
www.aceshardware.com:8000 /rc5/join.php   (549 words)

  
 distributed.net - Q/A - RC5-64 FAQ
The main rc5 list is very busy so unless you are willing to contend with 50-100 new mail messages a day the rc5-digest list is probably a better choice.
Both the 48-bit RC5 and the 56-bit DES challenges were cracked by machines not even in the top 20 in the stats.
It is also the main reason why the RC5 client is a poor benchmark to use in determining the speed or performance of a particular CPU.
www.distributed.hu /kliens/rc564_faq.html   (5935 words)

  
 RFC 2040 - The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms
The third cipher, RC5- CBC-Pad, handles plaintext of any length, though the ciphertext will be longer than the plaintext by at most the size of a single RC5 Baldwin and Rivest Informational [Page 1] RFC 2040 RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS October 1996 block.
Baldwin and Rivest Informational [Page 3] RFC 2040 RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS October 1996 b This is the byte length of the secret key.
Baldwin and Rivest Informational [Page 4] RFC 2040 RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS October 1996 4.1 Creating an RC5 Key To create a key, the memory for the key object must be allocated and initialized.
www.packetizer.com /rfc/rfc2040   (4714 words)

  
 RC5 - CryptoDox   (Site not responding. Last check: 2007-10-22)
RC5 is a block cipher designed by Ronald Rivest in 1994, RC stands for "Rivest Cipher".
RC5 is a parameterized algorithm with a variable block size, a variable key size, and a variable number of rounds.
RFC 2040, The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms
cryptodox.com /RC5   (155 words)

  
 RC5
RC5 stands for the Robb Clark Five, they were formed by Robb of Zipgun.
Then he formed RC5 with Todd Ohashi on guitar and John Mack on drums (both of A.M.A.) in 1997.
RC5 broke up for a short period of time but are back together with a few changes in the line up, Mark Wooten has left and replaced by Jason Freeman (of Kent 3 and Hai Karate).
www.angelfire.com /sk/seattlebands/rc5.html   (365 words)

  
 Tri-Cities RC5 Community Cracking Effort
RC5 is a relatively new data encryption algorithm developed by Ron Rivist for RSA Data Security, Inc. (RC5 is purported to be short for "Ron's Code #5" -- I guess anything is possible).
RC5 has several advantages over DES not the least of which is the ability to use larger key sizes.
RSA Data Security is sponsoring a number of contests in which they challenge all comers to try and decode secret messages that they've encrypted using DES and 12 different strengths of RC5.
users.owt.com /chubbard/rc5/oldpage.html   (598 words)

  
 RC5 For Jesus Official Home Page
RC5 For Jesus is a team participating in Distributed.net's RC5-64 Challenge.
RC5 For Jesus would love to have you on our team, if you're not on it already.
In addition to checking statistics, RC5 For Jesus is always in search of new members.
home.hawaii.rr.com /shy24   (801 words)

  
 IR-3 : low-cost IR decoder chip with 10 outputs
The IR-3 is an IR decoder for the RC5, Sharp and TC101 protocols.
The TSOP1736 is recommended for RC5 (Philips, 36 kHz signal), the TSOP1738 is recommended for Sharp and TC101 (38 kHz signal).
As delivered the IR-3 chip is programmed to respond the the keys 0..9 of an RC5, Sharp or TC101 (NEC) IR remote controller.
www.voti.nl /ir-3/index_1.html   (816 words)

  
 RC4, RC5, RC6
It is also used for secure communications, as in the encryption of traffic to and from secure web sites using the SSL (Secure Sockets Layer) Handshake Protocol which was developed by Netscape Communications Corporation to provide security and privacy over the Internet.
RC5 is a fast block cipher designed by Ronald Rivest for RSA Data Security (now RSA Security) in 1994.
The main goal for the inventors has been to meet the requirements of the AES (see AES).
library.thinkquest.org /C0126342/rc.htm   (507 words)

  
 Remote service control center
The program can do some analyzing of proxy logfiles (it can calculate how much RC5 blocks and/or OGR stubs are sent) but for extensive logfile analyzing other programs are better suited.
By default they will be encrypted with RC5 with a fixed key so no password will be asked at program start.
But remember that NT saves this info with a much weaker encryption than RC5 (see http://www.l0pht.com/ for more information on this subject).
www.xs4all.nl /%7Ejohanw/rscc   (900 words)

  
 Roxen Community: RFC 2040 The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms (Informational)   (Site not responding. Last check: 2007-10-22)
The term "word" refers to a string of bits of a particular length that can be operated on as either an unsigned integer or as a bit vector.
This section describes the RC5 block cipher by explaining the steps required to perform an encryption of a single input block.
This step converts input bytes into two unsigned integers called A and B. When RC5 is used as a 64 bit block cipher A and B are 32 bit values.
community.roxen.com /developers/idocs/rfc/rfc2040.html   (5505 words)

  
 Distributed.Net Team Deciphers Message Encrypted in RC5-64 eWEEK - Find Articles
we can say with confidence that RC5 is not an appropriate algorithm to use for data that will still be sensitive in more than several years' time," the team said in a statement.
The RC5 algorithm was designed by renowned cryptographer Ron Rivest, one of the three designers of the original RSA algorithm.
"Yes, I think that their statement is fine," Rivest said, adding that using RC5 with longer key sizes such as 128 bits makes it far more difficult to find a secret key.
www.findarticles.com /p/articles/mi_zdewk/is_200210/ai_ziff32071   (506 words)

  
 CNN - The Netly News - Hey, Buddy, Can You Spare Some Cycles? - Sept. 24, 1997
If the Finland-based RC5 Project organizers win, they plan to split RSA's $10,000 reward with the user who manages to break the key.
The Bovine RC5 Project will give $1,000 to the lucky person or group who finds the number, keep $1,000 to cover its own expenses, and donate the other $8,000 to Project Gutenberg.
One of Bovine's volunteers, who asked to remain nameless since he's running the RC5 cracking client on several of his company's servers, expresses a different purpose.
www.cnn.com /TECH/9709/24/netly.news   (1016 words)

  
 Main
Some details on the new RC5 cores: since RC5-72 uses 3 instead of 2 registers on CPUs with 32 bit register size it would be expected that the calculation gets slower (in addition to the increased keyspace size).
The actual finder of the key is not Distributed Net however, but the Electronic Frontier Foundation, or EFF for short, a non-profit organization which is concerned with privacy and free speech issues on the Internet, amongst others.
Some people noted RC5 core on 060 is slightly slower (~2%), but this should not be a problem for DES II-2.
distributed.amiga.org /RC5-64/fm_pastnews.html   (16631 words)

  
 RC5 team
The UKUUG RC5 team is a team representing UK computer users who wish to participate in the distributed.net RC5 and OGR challenges as well as in any future distributed.net challenges.
If you're already running the distributed.net client and would like to join our team all you need to do is to get your distributed.net password and click here to join our team (your user ID is the email address you used for setting up the distributed.net client).
The RC5 challenge is using the power of thousands of computers across the Internet to solve an encryption challenge and the OGR challenge will help solve a mathematical problem which will have some useful scientific benefits.
www.ukuug.org /rc5   (318 words)

  
 RFC 2040 -- The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms
RFC 2040 -- The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms
W This is the word size for RC5 measured in bits.
This section describes the CBC and CBC-Pad modes of the RC5 cipher.
www.columbia.edu /~ariel/ssleay/rfc2040.html   (5136 words)

  
 distributed.net: Add-Ons and Unsupported Third-Party Utilities
Cruncher, a quick and dirty win32 program that calculates how long it will take you to match or overtake another rc5 participant's stats position, given both of your current blocks completed, and both of your rates, in blocks per day.
WMProxyPer is a Window Maker docking application that displays the current status of your Personal RC5 keyproxy in a much nicer way than 'tail -f proxyper.log'.
RC5 Predictor: Similar to Mduell's dnetc buffer calc, second version (GUI) made under Borland Delph 3, this tiny program allows you to compute needed blocks for 1 or more PCs, the only thing you need is to know the RC5 benchmark (dnetc -benchmark) of this machine or group of machines.
www.distributed.net /download/addon.html   (2738 words)

  
 distributed.net: Project RC5
The "Bovine" RC5 effort was formed to take the responsibilities of coordinating and maintaining the RC5 servers that are needed to distribute key blocks to work on to all of the participating client programs.
We depend heavily (entirely) on the participation of people like yourself, as we intend to solve this project via the use of brute force, trying every possible key there is.
RFC 2040: The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms
www.distributed.net /rc5   (408 words)

  
 RC5 remote control   (Site not responding. Last check: 2007-10-22)
RC5 is a serial protocol used in the TV industry (Philips, Loewe) for infrared remote control units.
RC5 decoding software based on an interrupt driver on Timer 0 input is available for BASIC900 and mCAT.
Matrix to RC5 encoder with infrared and wirebound output.
www.elzet80.com /rc5.htm   (183 words)

  
 Center for Biological Computing -- RC5 Team
It doesn't matter what type of computer you have, there is a RC5 client for your computer.
If you connect to the Internet via modem, configure the client so that it downloads 100-200 blocks at a time (depending on how fast your CPU is); your computer and crack keys while you sleep and you can dump the finished blocks of encryption keys the next time you connect to the Internet.
The RC5 clients are well-behaved and will only use CPU cycles which you are not using.
mama.indstate.edu /rc5.html   (210 words)

  
 [No title]
The third cipher, RC5- CBC-Pad, handles plaintext of any length, though the ciphertext will be longer than the plaintext by at most the size of a single RC5 Baldwin & Rivest Informational [Page 1] RFC 2040 RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS October 1996 block.
I[index] = I[index]; return (pAlg); } 7.2 Destroying cipher objects Destroying the cipher object is the inverse of creating it with care being take to zero memory before returning it to the memory manager.
Baldwin & Rivest Informational [Page 26] RFC 2040 RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS October 1996 The length of the secret key helps determine the cipher's resistance to brute force key searching attacks.
www.ietf.org /rfc/rfc2040.txt   (4163 words)

Try your search on: Qwika (all wikis)

Factbites
  About us   |   Why use us?   |   Reviews   |   Press   |   Contact us  
Copyright © 2005-2007 www.factbites.com Usage implies agreement with terms.