Block cipher/Catalogs/Cipher table: Difference between revisions
< Block cipher | Catalogs
Jump to navigation
Jump to search
imported>Sandy Harris No edit summary |
imported>Sandy Harris No edit summary |
||
Line 54: | Line 54: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>[[FROG (cipher)|FROG]]</td><td></td><td>variable</td><td>variable</td><td></td><td></td><td></td><td>candidate</td><td></td> | <td>[[FROG (cipher)|FROG]]</td><td></td><td>variable</td><td>variable</td><td></td><td></td><td></td><td>candidate</td><td>uses key as program, not just as data</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
Line 69: | Line 69: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>[[Hasty Pudding (cipher)|Hasty Pudding]]</td><td></td><td>variable</td><td>variable</td><td></td><td></td><td></td><td>candidate</td><td></td> | <td>[[Hasty Pudding (cipher)|Hasty Pudding]]</td><td></td><td>variable</td><td>variable</td><td></td><td></td><td></td><td>candidate</td><td>[[Block cipher#Whitening and tweaking|Tweakable]]</td> | ||
</tr> | </tr> | ||
</table> | </table> |
Revision as of 04:28, 9 August 2009
Cipher | Type | Block size | Key size | Rounds | S-boxes | Standard in | AES competition | Comment |
---|---|---|---|---|---|---|---|---|
Advanced Encryption Standard | SP network | 128 | 128,192,256 | 10 to 14 | one 8*8 | US, 2002 onward | Winner | current US standard, widely used |
Data Encryption Standard | Feistel | 64 | 56 | 16 | 8 6*4 | US, 1976-2002 | obsolete, key too short against brute force | |
Blowfish | Feistel | 64 | up to 556 | 16 | 4 8*32, key-dependent | widely used | ||
CAST-128 | Feistel | 64 | 40 to 128 | 16 | 4 8*32, using bent functions | widely used, including PGP | ||
GOST | Feistel | 64 | 256 | 32 | 8 4*4 | Soviet Union | ||
International Data Encryption Algorithm, IDEA | 64 | 128 | 8 | none | Europe | uses modular multiplication | ||
Tiny Encryption Algorithm, TEA | Feistel | 64 | 128 | 32 | none | only shift, XOR, addition | ||
SAFER SK-128 | SP network | 64 | 128 | 8 | Singapore | uses pseudo-Hadamard transformation | ||
SAFER+ | SP network | 128 | 128,192,256 | candidate | uses pseudo-Hadamard transformation | |||
Serpent | SP network | 128 | 128,192,256 | 32 | 8 4*4 | finalist | ||
MARS | Feistel-like | 128 | 128,192,256 | 16 | one 9*32 | finalist | designed at IBM | |
CAST-256 | Feistel-like | 128 | 128,192,256 | 48 | 4 8*32, using bent functions | candidate | ||
Twofish | 128 | 128,192,256 | 16 | key-dependent | finalist | uses pseudo-Hadamard transformation | ||
RC5 | Feistel | 64 | 128 | uses data-dependent rotations | ||||
RC6 | 128 | 128,192,256 | finalist | uses data-dependent rotations | ||||
DFC | 128 | 128,192,256 | candidate | |||||
FROG | variable | variable | candidate | uses key as program, not just as data | ||||
E2 | 128 | 128,192,256 | candidate | |||||
DEAL | Feistel | 128 | 128,192,256 | candidate | uses DES as the round function | |||
CRYPTON | SP network | 128 | 128,192,256 | candidate | ||||
MAGENTA | 128 | 128,192,256 | candidate | quickly broken | ||||
Hasty Pudding | variable | variable | candidate | Tweakable |