Block cipher/Catalogs/Cipher table: Difference between revisions
< Block cipher | Catalogs
Jump to navigation
Jump to search
imported>Sandy Harris mNo edit summary |
imported>Sandy Harris No edit summary |
||
Line 1: | Line 1: | ||
<table border="1" cellpadding="2" cellspacing="0" class="sortable wikitable"> | <table border="1" cellpadding="2" cellspacing="0" class="sortable wikitable"> | ||
<tr> | <tr> | ||
<th>Cipher</th><th>Type</th><th>Block size</th><th>Key size</th><th>Rounds</th><th>S-boxes</th><th>Standard in</th><th>Comment</th> | <th>Cipher</th><th>Type</th><th>Block size</th><th>Key size</th><th>Rounds</th><th>S-boxes</th><th>Standard in</th><th>[[AES competition]]</th><th>Comment</th> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>[[Advanced Encryption Standard]]</td><td>SP network</td><td>128</td><td>128,192,256</td><td>10 to 14</td><td>one 8*8</td><td>US, 2002 onward</td><td>current US standard, widely used</td> | <td>[[Advanced Encryption Standard]]</td><td>SP network</td><td>128</td><td>128,192,256</td><td>10 to 14</td><td>one 8*8</td><td>US, 2002 onward</td><td>Winner</td><td>current US standard, widely used</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>[[Data Encryption Standard]]</td><td>Feistel</td><td>64</td><td>56</td><td>16</td><td>8 6*4</td><td>US, 1976-2002</td><td>obsolete, key too short against [[brute force]]</td> | <td>[[Data Encryption Standard]]</td><td>Feistel</td><td>64</td><td>56</td><td>16</td><td>8 6*4</td><td>US, 1976-2002</td><td></td><td>obsolete, key too short against [[brute force]]</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>[[Blowfish]]</td><td>Feistel</td><td>64</td><td>up to 556</td><td>16</td><td>4 8*32, key-dependent</td><td></td><td>widely used</td> | <td>[[Blowfish]]</td><td>Feistel</td><td>64</td><td>up to 556</td><td>16</td><td>4 8*32, key-dependent</td><td></td><td></td><td>widely used</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>[[CAST cipher#CAST-128|CAST-128]]</td><td>Feistel</td><td>64</td><td>40 to 128</td><td>16</td><td>4 8*32, using [[bent function]]s</td><td></td><td>widely used, including [[PGP]]</td> | <td>[[CAST cipher#CAST-128|CAST-128]]</td><td>Feistel</td><td>64</td><td>40 to 128</td><td>16</td><td>4 8*32, using [[bent function]]s</td><td></td><td></td><td>widely used, including [[PGP]]</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>[[GOST cipher|GOST]]</td><td>Feistel</td><td>64</td><td>256</td><td>32</td><td>8 4*4</td><td>Soviet Union</td><td></td> | <td>[[GOST cipher|GOST]]</td><td>Feistel</td><td>64</td><td>256</td><td>32</td><td>8 4*4</td><td>Soviet Union</td><td></td><td></td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>[[International Data Encryption Algorithm]]</td><td></td><td>64</td><td>128</td><td>8</td><td>none</td><td>Europe</td><td>uses modular multiplication</td> | <td>[[International Data Encryption Algorithm]]</td><td></td><td>64</td><td>128</td><td>8</td><td>none</td><td>Europe</td><td></td><td>uses modular multiplication</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>[[SAFER (cipher)|SAFER SK-128]]</td><td>SP network</td><td>64</td><td>128</td><td>8</td><td></td><td>Singapore</td><td>uses pseudo-Hadamard transformation</td> | <td>[[SAFER (cipher)|SAFER SK-128]]</td><td>SP network</td><td>64</td><td>128</td><td>8</td><td></td><td>Singapore</td><td></td><td>uses pseudo-Hadamard transformation</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>[[Serpent (cipher)|Serpent]]</td><td>SP network</td><td>128</td><td>128,192,256</td><td>32</td><td>8 4*4</td><td></td><td>finalist | <td>[[Serpent (cipher)|Serpent]]</td><td>SP network</td><td>128</td><td>128,192,256</td><td>32</td><td>8 4*4</td><td></td><td>finalist</td><td></td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>[[MARS (cipher)|MARS]]</td><td>Feistel-like</td><td>128</td><td>128,192,256</td><td>16</td><td>one 9*32</td><td></td><td>finalist | <td>[[MARS (cipher)|MARS]]</td><td>Feistel-like</td><td>128</td><td>128,192,256</td><td>16</td><td>one 9*32</td><td></td><td>finalist</td><td>designed at IBM</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>[[CAST (cipher)#CAST-256|CAST-256]]</td><td>Feistel-like</td><td>128</td><td>128,192,256</td><td>48</td><td>4 8*32, using [[bent function]]s</td><td></td><td>candidate | <td>[[CAST (cipher)#CAST-256|CAST-256]]</td><td>Feistel-like</td><td>128</td><td>128,192,256</td><td>48</td><td>4 8*32, using [[bent function]]s</td><td></td><td>candidate</td><td></td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>[[Twofish]]</td><td></td><td>128</td><td>128,192,256</td><td>16</td><td>key-dependent</td><td></td><td>finalist | <td>[[Twofish]]</td><td></td><td>128</td><td>128,192,256</td><td>16</td><td>key-dependent</td><td></td><td>finalist</td><td>uses pseudo-Hadamard transformation</td> | ||
</tr> | </tr> | ||
</table> | </table> |
Revision as of 02:26, 9 August 2009
Cipher | Type | Block size | Key size | Rounds | S-boxes | Standard in | AES competition | Comment |
---|---|---|---|---|---|---|---|---|
Advanced Encryption Standard | SP network | 128 | 128,192,256 | 10 to 14 | one 8*8 | US, 2002 onward | Winner | current US standard, widely used |
Data Encryption Standard | Feistel | 64 | 56 | 16 | 8 6*4 | US, 1976-2002 | obsolete, key too short against brute force | |
Blowfish | Feistel | 64 | up to 556 | 16 | 4 8*32, key-dependent | widely used | ||
CAST-128 | Feistel | 64 | 40 to 128 | 16 | 4 8*32, using bent functions | widely used, including PGP | ||
GOST | Feistel | 64 | 256 | 32 | 8 4*4 | Soviet Union | ||
International Data Encryption Algorithm | 64 | 128 | 8 | none | Europe | uses modular multiplication | ||
SAFER SK-128 | SP network | 64 | 128 | 8 | Singapore | uses pseudo-Hadamard transformation | ||
Serpent | SP network | 128 | 128,192,256 | 32 | 8 4*4 | finalist | ||
MARS | Feistel-like | 128 | 128,192,256 | 16 | one 9*32 | finalist | designed at IBM | |
CAST-256 | Feistel-like | 128 | 128,192,256 | 48 | 4 8*32, using bent functions | candidate | ||
Twofish | 128 | 128,192,256 | 16 | key-dependent | finalist | uses pseudo-Hadamard transformation |