Block cipher/Catalogs/Cipher table: Difference between revisions
imported>Sandy Harris (add column for usage in hashes) |
imported>Sandy Harris No edit summary |
||
Line 8: | Line 8: | ||
<tr> | <tr> | ||
<td>[[Advanced Encryption Standard|AES]]</td><td>SP network</td><td>128</td><td>128,192,256</td><td>10, 12 or 14</td><td>one 8*8</td><td></td><td>US, 2002 | <td>[[Advanced Encryption Standard|AES]]</td><td>SP network</td><td>128</td><td>128,192,256</td><td>10, 12 or 14</td><td>one 8*8</td><td></td><td>US, 2002 on</td><td>winner</td><td></td><td>extremely widely used</td> | ||
</tr> | </tr> | ||
Revision as of 22:23, 4 September 2009
The metadata subpage is missing. You can start it via filling in this form or by following the instructions that come up after clicking on the [show] link to the right. | |||
---|---|---|---|
|
Cipher | Type | Block size | Key size | Rounds | S-boxes | Round function has | Standard in | AES competition | Used in hash | Comment |
---|---|---|---|---|---|---|---|---|---|---|
AES | SP network | 128 | 128,192,256 | 10, 12 or 14 | one 8*8 | US, 2002 on | winner | extremely widely used | ||
DES | Feistel | 64 | 56 | 16 | 8 6*4 | bit permutation | US, 1976-2002 | obsolete, key too short against brute force | ||
Triple DES | Feistel | 64 | 112 or 168 | 48 (3*16) | 8 6*4 | bit permutation | widely used, but being replaced by AES | |||
Blowfish | Feistel | 64 | up to 556 | 16 | 4 8*32, key-dependent | widely used | ||||
CAST-128 | Feistel | 64 | 40 to 128 | 16 | 4 8*32, using bent functions | key-dependent rotation | widely used, including PGP | |||
GOST cipher | Feistel | 64 | 256 | 32 | 8 4*4 | rotation | Soviet Union | |||
Skipjack | Feistel, unbalanced | 64 | 80 | 32 | designed by NSA for Clipper chip phones | |||||
IDEA | 64 | 128 | 8 | none | modular multiplication | Europe | ||||
TEA | Feistel | 64 | 128 | 32 | none | only shift, XOR, addition | small, fast & simple | |||
SAFER SK-128 | SP network | 64 | 128 | 8 | pseudo-Hadamard transform | Singapore | ||||
SAFER+ | SP network | 128 | 128,192,256 | 8,12 or 15 | pseudo-Hadamard transform | candidate | ||||
LOKI | Feistel | 64 | 64 | 16 | ||||||
LOKI97 | Feistel | 128 | 128,192,256 | 16 | two SP network rounds | candidate | ||||
Serpent | SP network | 128 | 128,192,256 | 32 | 8 4*4 | finalist | ||||
MARS | Feistel-like | 128 | 128,192,256 | 16 | one 9*32 | data-dependent rotation | finalist | designed at IBM | ||
CAST-256 | Feistel-like | 128 | 128,192,256 | 48 | 4 8*32, using bent functions | key-dependent rotation | candidate | |||
Twofish | Feistel | 128 | 128,192,256 | 16 | 4 8*8, key-dependent | pseudo-Hadamard transform, rotation | finalist | |||
RC2 | Feistel | 64 | variable | 18 | often used with 40-bit key, for export | |||||
RC5 | Feistel | 64 or 128 | up to 2040 | variable | data-dependent rotation | |||||
RC6 | 128 | 128,192,256 | data-dependent rotation | finalist | ||||||
DFC | Feistel | 128 | 128,192,256 | 6 | one 6*32 | candidate | ||||
FROG | variable | variable | 8 | candidate | uses key as program, not just as data | |||||
E2 | Feistel | 128 | 128,192,256 | 12 | one 8*8 | candidate | replaced by Camellia | |||
DEAL | Feistel | 128 | 128,192,256 | 6 or 8 | DES as the round function | candidate | ||||
Camellia | Feistel | 128 | 128,192,256 | 18 or 24 | Japanese | |||||
SEED | Feistel | 128 | 128 | 16 | 2 8*8 | Korean | ||||
CRYPTON | SP network | 128 | 128,192,256 | 12 | candidate | |||||
MAGENTA | Feistel | 128 | 128,192,256 | 6 or 8 | candidate | quickly broken | ||||
Hasty Pudding | variable | variable | candidate | tweakable | ||||||
Threefish | SP network | 256,512,1024 | 256,512,1024 | 72 or 80 | Skein | tweakable | ||||
Whirlpool cipher | SP network | 512 | 512 | 10 | Whirlpool | AES-like | ||||
3-Way | SP network | 96 | 96 | 11 | an ancestor of AES | |||||
Square | SP network | 128 | 128 | 8 | an ancestor of AES |