Input: Plaintext stored in four w-bit input registers A,B,C,D; Number r of rounds ...
The best attack on RC6 appears to be exhaustive search for the user-supplied encryption key. The data requirements to mount more sophisticated attacks on RC6 such as differential and linear ...