In
cryptography
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
, M6 is a
block cipher proposed by
Hitachi
() is a Japanese Multinational corporation, multinational Conglomerate (company), conglomerate founded in 1910 and headquartered in Chiyoda, Tokyo. The company is active in various industries, including digital systems, power and renewable ener ...
in 1997 for use in the IEEE 1394
FireWire
IEEE 1394 is an interface standard for a serial bus for high-speed communications and isochronous real-time data transfer. It was developed in the late 1980s and early 1990s by Apple in cooperation with a number of companies, primarily Sony a ...
standard. The design allows some freedom in choosing a few of the cipher's operations, so M6 is considered a family of ciphers. Due to export controls, M6 has not been fully published; nevertheless, a partial description of the algorithm based on a draft standard is given by Kelsey, et al. in their cryptanalysis of this family of ciphers.
The algorithm operates on blocks of 64 bits using a 10-round
Feistel network
structure. The
key size
In cryptography, key size or key length refers to the number of bits in a key used by a cryptographic algorithm (such as a cipher).
Key length defines the upper-bound on an algorithm's security (i.e. a logarithmic measure of the fastest known a ...
is 40 bits by default, but can be up to 64 bits. The
key schedule
In cryptography, the so-called product ciphers are a certain kind of cipher, where the (de-)ciphering of data is typically done as an iteration of '' rounds''. The setup for each round is generally the same, except for round-specific fixed va ...
is very simple, producing two 32-bit subkeys: the high 32 bits of the
key, and the sum mod 2
32 of this and the low 32 bits.
Because its round function is based on rotation and addition, M6 was one of the first ciphers
attacked by
mod n cryptanalysis.
Mod 5, about 100 known plaintexts suffice to
distinguish the output from a
pseudorandom permutation. Mod 257, information about the secret key itself is revealed. One known plaintext reduces the complexity of a
brute force attack
In cryptography, a brute-force attack or exhaustive key search is a cryptanalytic attack that consists of an attacker submitting many possible Key (cryptography), keys or passwords with the hope of eventually guessing correctly. This strategy can ...
to about 2
35 trial encryptions; "a few dozen" known plaintexts lowers this number to about 2
31. Due to its simple key schedule, M6 is also vulnerable to a
slide attack, which requires more known plaintext but less computation.
References
1997 introductions
Broken block ciphers
Feistel ciphers
{{crypto-stub