This article will be permanently flagged as inappropriate and made unaccessible to everyone. Are you certain this article is inappropriate? Excessive Violence Sexual Content Political / Social
Email Address:
Article Id: WHEBN0000632592 Reproduction Date:
In cryptography, RC2 (also known as ARC2) is a symmetric-key block cipher designed by Ron Rivest in 1987. "RC" stands for "Ron's Code" or "Rivest Cipher"; other ciphers designed by Rivest include RC4, RC5, and RC6.
The development of RC2 was sponsored by Lotus, who were seeking a custom cipher that, after evaluation by the NSA, could be exported as part of their Lotus Notes software. The NSA suggested a couple of changes, which Rivest incorporated. After further negotiations, the cipher was approved for export in 1989. Along with RC4, RC2 with a 40-bit key size was treated favourably under US export regulations for cryptography.
Initially, the details of the algorithm were kept secret — proprietary to RSA Security — but on 29 January 1996, source code for RC2 was anonymously posted to the Internet on the Usenet forum, sci.crypt. Mentions of CodeView and SoftICE (popular debuggers) suggest that it had been reverse engineered. A similar disclosure had occurred earlier with RC4.
In March 1998 Ron Rivest authored an RFC publicly describing RC2 himself.
RC2 is a 64-bit block cipher with a variable size key. Its 18 rounds are arranged as a source-heavy unbalanced Feistel network, with 16 rounds of one type (MIXING) punctuated by two rounds of another type (MASHING). A MIXING round consists of four applications of the MIX transformation, as shown in the diagram.
RC2 is vulnerable to a related-key attack using 234 chosen plaintexts (Kelsey et al., 1997).
World War II, Steganography, Espionage, Internet, Germany
Cryptography, Elliptic curve cryptography, Advanced Encryption Standard, Open source, Claude Shannon
Cryptography, Block cipher, Cipher, Stream cipher, Data Encryption Standard
World War II, E, World War I, Enigma machine, Bletchley Park
Cryptography, Advanced Encryption Standard, Rc6, Key size, Block size (cryptography)
Cryptography, Block cipher, Advanced Encryption Standard, Data Encryption Standard, Seed
Cryptography, Transport Layer Security, Stream cipher, Wired Equivalent Privacy, Internet
Cryptography, Block cipher, Magenta, Block size (cryptography), Ciks-1
Secure shell, Transport Layer Security, SSH File Transfer Protocol, File Transfer Protocol, FTP over SSH