Formation of an Improved RC6 (IRC6) Cryptographic Algorithm

Edward Onyebueke Agu, Michael O. Ogar, Anthony O. Okwori


IRC6 cryptosystem is an improvement on RC6 which was developed in the course of this research to guard against crypto-analytical attack. This is achieved by doubling its security at little or no computational cost. RC6 is an improvement on RC5, and RC5 was an improvement on RC4. IRC6 is designed to meet the requirements of increased security and better performance.

Object-oriented analysis and design methodology (OOADM) together with Java programming and Development technologies were used to implement both Normal RC6 algorithm and improved RC6 (IRC6) cryptographic algorithm in this research in order to achieve the research goal which is to show the significant improvement of IRC6 over normal RC6 by carrying out performance evaluations of the two algorithms. The developed IRC6 was also evaluated to have transparent cipher-text and thereby found to survive any crypto-analytical attack.


NRC6; IRC6; Cryptography; Algorithm; Data Security; cipher text

Full Text:



E. Biham and A. Shamir, “Differential Cryptanalysis of the Data Encryption Standard”.

Springer-Verlag, New York, zbMATH/Google Scholar. 1993

S. Contini, R. L. Rivest, M. J. B. Robshaw and Y. L. Yin, “The Security of the RC6 Block

Cipher”. v1.0. Available at Scholar, 1998.

A. Biryukov and E. Kushilevitz, “Improved cryptanalysis of RC5”. In K. Nyberg, editor,

Advances in Cryptology-Eurocrypt, vol. 1403 Lecture Notes in Computer Science, pages 85–99, Springer Verlag.Google Scholar, 1998

B. S. Kaliski and Y. L. Yin, “On differential and linear cryptanalysis of the RC5 encryption

Algorithm”. In D. Coppersmith, editor, Advances in Cryptology-Crypto, Vol. 963 of Lecture Notes in Computer Science, pages 171–184, Springer Verlag.Google Scholar, 1995.

R. L. Rivest, “The RC5 encryption algorithm. In B. Preneel, editor, Fast Software

Encryption”, Vol. 1008 of Lecture Notes in Computer Science, pages 86-96. Springer Verlag. 1995.

H. H. Jian and L. Yang, “A block encryption algorithm combined with the Logistic

mapping and SPN structure”. 2nd International Conference on Industrial and Information Systems (IIS), Vol. 2. 2010.

L. R. Ronald, M.J.B Robshaw, R. Sidney and Y.L. Yin, “The RC6 Block Cipher, Version 1.1. 1998.

K. Aggarwal and H. K. Verma “Hash RC6 Variable length Hash algorithm using RC6”,

International Conference on Computer Engineering and Applications (ICACEA). 2015

T. Gunasundari and K. Elangovan, “A Comparative Survey on Symmetric Key Encryption Algorithms”, International Journal of Computer Science and Mobile Applications, Vol.2 Issue. 2, 2014.

H. K. Gil, N. K. Jong, Y. C. Gyeong, “An improved RC6 algorithm with the same

structure of encryption and decryption, 11th International Conference on Advanced Communication Technology, ICACT2009, Vol. 2. 2009.



  • There are currently no refbacks.

Copyright (c) 2019 International Journal of Advanced Research in Computer Science