The best attack on RC6 appears to be exhaustive search for the user-supplied encryption key. The data requirements to mount more sophisticated attacks on RC6 such as differential and linear ...