Block cipher/Catalogs/Cipher table: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
mNo edit summary
imported>Sandy Harris
No edit summary
Line 1: Line 1:
<table border="1" cellpadding="2" cellspacing="0" class="sortable wikitable">
<table border="1" cellpadding="2" cellspacing="0" class="sortable wikitable">
<tr>
<tr>
   <th>Cipher</th><th>Type</th><th>Block size</th><th>Key size</th><th>Rounds</th><th>S-boxes</th><th>Standard in</th><th>Comment</th>
   <th>Cipher</th><th>Type</th><th>Block size</th><th>Key size</th><th>Rounds</th><th>S-boxes</th><th>Standard in</th><th>[[AES competition]]</th><th>Comment</th>
</tr>
</tr>


<tr>
<tr>
   <td>[[Advanced Encryption Standard]]</td><td>SP network</td><td>128</td><td>128,192,256</td><td>10 to 14</td><td>one 8*8</td><td>US, 2002 onward</td><td>current US standard, widely used</td>
   <td>[[Advanced Encryption Standard]]</td><td>SP network</td><td>128</td><td>128,192,256</td><td>10 to 14</td><td>one 8*8</td><td>US, 2002 onward</td><td>Winner</td><td>current US standard, widely used</td>
</tr>
</tr>


<tr>
<tr>
   <td>[[Data Encryption Standard]]</td><td>Feistel</td><td>64</td><td>56</td><td>16</td><td>8 6*4</td><td>US, 1976-2002</td><td>obsolete, key too short against [[brute force]]</td>
   <td>[[Data Encryption Standard]]</td><td>Feistel</td><td>64</td><td>56</td><td>16</td><td>8 6*4</td><td>US, 1976-2002</td><td></td><td>obsolete, key too short against [[brute force]]</td>
</tr>
</tr>
<tr>
<tr>
   <td>[[Blowfish]]</td><td>Feistel</td><td>64</td><td>up to 556</td><td>16</td><td>4 8*32, key-dependent</td><td></td><td>widely used</td>
   <td>[[Blowfish]]</td><td>Feistel</td><td>64</td><td>up to 556</td><td>16</td><td>4 8*32, key-dependent</td><td></td><td></td><td>widely used</td>
</tr>
</tr>
<tr>
<tr>
   <td>[[CAST cipher#CAST-128|CAST-128]]</td><td>Feistel</td><td>64</td><td>40 to 128</td><td>16</td><td>4 8*32, using [[bent function]]s</td><td></td><td>widely used, including [[PGP]]</td>
   <td>[[CAST cipher#CAST-128|CAST-128]]</td><td>Feistel</td><td>64</td><td>40 to 128</td><td>16</td><td>4 8*32, using [[bent function]]s</td><td></td><td></td><td>widely used, including [[PGP]]</td>
</tr>
</tr>
<tr>
<tr>
   <td>[[GOST cipher|GOST]]</td><td>Feistel</td><td>64</td><td>256</td><td>32</td><td>8 4*4</td><td>Soviet Union</td><td></td>
   <td>[[GOST cipher|GOST]]</td><td>Feistel</td><td>64</td><td>256</td><td>32</td><td>8 4*4</td><td>Soviet Union</td><td></td><td></td>
</tr>
</tr>
<tr>
<tr>
   <td>[[International Data Encryption Algorithm]]</td><td></td><td>64</td><td>128</td><td>8</td><td>none</td><td>Europe</td><td>uses modular multiplication</td>
   <td>[[International Data Encryption Algorithm]]</td><td></td><td>64</td><td>128</td><td>8</td><td>none</td><td>Europe</td><td></td><td>uses modular multiplication</td>
</tr>
</tr>
<tr>
<tr>
   <td>[[SAFER (cipher)|SAFER SK-128]]</td><td>SP network</td><td>64</td><td>128</td><td>8</td><td></td><td>Singapore</td><td>uses pseudo-Hadamard transformation</td>
   <td>[[SAFER (cipher)|SAFER SK-128]]</td><td>SP network</td><td>64</td><td>128</td><td>8</td><td></td><td>Singapore</td><td></td><td>uses pseudo-Hadamard transformation</td>
</tr>
</tr>
<tr>
<tr>
   <td>[[Serpent (cipher)|Serpent]]</td><td>SP network</td><td>128</td><td>128,192,256</td><td>32</td><td>8 4*4</td><td></td><td>finalist in [[AES competition]]</td>
   <td>[[Serpent (cipher)|Serpent]]</td><td>SP network</td><td>128</td><td>128,192,256</td><td>32</td><td>8 4*4</td><td></td><td>finalist</td><td></td>
</tr>
</tr>
<tr>
<tr>
   <td>[[MARS (cipher)|MARS]]</td><td>Feistel-like</td><td>128</td><td>128,192,256</td><td>16</td><td>one 9*32</td><td></td><td>finalist in [[AES competition]]</td>
   <td>[[MARS (cipher)|MARS]]</td><td>Feistel-like</td><td>128</td><td>128,192,256</td><td>16</td><td>one 9*32</td><td></td><td>finalist</td><td>designed at IBM</td>
</tr>
</tr>
<tr>
<tr>
   <td>[[CAST (cipher)#CAST-256|CAST-256]]</td><td>Feistel-like</td><td>128</td><td>128,192,256</td><td>48</td><td>4 8*32, using [[bent function]]s</td><td></td><td>candidate in [[AES competition]]</td>
   <td>[[CAST (cipher)#CAST-256|CAST-256]]</td><td>Feistel-like</td><td>128</td><td>128,192,256</td><td>48</td><td>4 8*32, using [[bent function]]s</td><td></td><td>candidate</td><td></td>
</tr>
</tr>
<tr>
<tr>
   <td>[[Twofish]]</td><td></td><td>128</td><td>128,192,256</td><td>16</td><td>key-dependent</td><td></td><td>finalist in [[AES competition]], uses pseudo-Hadamard transformation</td>
   <td>[[Twofish]]</td><td></td><td>128</td><td>128,192,256</td><td>16</td><td>key-dependent</td><td></td><td>finalist</td><td>uses pseudo-Hadamard transformation</td>
</tr>
</tr>
</table>
</table>

Revision as of 02:26, 9 August 2009

CipherTypeBlock sizeKey sizeRoundsS-boxesStandard inAES competitionComment
Advanced Encryption StandardSP network128128,192,25610 to 14one 8*8US, 2002 onwardWinnercurrent US standard, widely used
Data Encryption StandardFeistel6456168 6*4US, 1976-2002obsolete, key too short against brute force
BlowfishFeistel64up to 556164 8*32, key-dependentwidely used
CAST-128Feistel6440 to 128164 8*32, using bent functionswidely used, including PGP
GOSTFeistel64256328 4*4Soviet Union
International Data Encryption Algorithm641288noneEuropeuses modular multiplication
SAFER SK-128SP network641288Singaporeuses pseudo-Hadamard transformation
SerpentSP network128128,192,256328 4*4finalist
MARSFeistel-like128128,192,25616one 9*32finalistdesigned at IBM
CAST-256Feistel-like128128,192,256484 8*32, using bent functionscandidate
Twofish128128,192,25616key-dependentfinalistuses pseudo-Hadamard transformation