Block cipher/Catalogs/Cipher table: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
No edit summary
imported>Sandy Harris
No edit summary
Line 34: Line 34:
</tr>
</tr>
<tr>
<tr>
   <td>[[SAFER (cipher)|SAFER SK-128]]</td><td>SP network</td><td>64</td><td>128</td><td>8</td><td></td><td>PHT</td><td>Singapore</td><td></td><td></td>
   <td>[[SAFER (cipher)|SAFER SK-128]]</td><td>SP network</td><td>64</td><td>128</td><td>8</td><td></td><td>[[pseudo-Hadamard transform]]</td><td>Singapore</td><td></td><td></td>
</tr>
</tr>
<tr>
<tr>
   <td>[[SAFER (cipher)|SAFER+]]</td><td>SP network</td><td>128</td><td>128,192,256</td><td>8,12 or 15</td><td></td><td>PHT</td><td></td><td>candidate</td><td></td>
   <td>[[SAFER (cipher)|SAFER+]]</td><td>SP network</td><td>128</td><td>128,192,256</td><td>8,12 or 15</td><td></td><td>[[pseudo-Hadamard transform]]</td><td></td><td>candidate</td><td></td>
</tr>
</tr>
<tr>
<tr>
Line 55: Line 55:
</tr>
</tr>
<tr>
<tr>
   <td>[[Twofish]]</td><td>Feistel</td><td>128</td><td>128,192,256</td><td>16</td><td>4 8*8, key-dependent</td><td>rotation and PHT</td><td></td><td>finalist</td><td></td>
   <td>[[Twofish]]</td><td>Feistel</td><td>128</td><td>128,192,256</td><td>16</td><td>4 8*8, key-dependent</td><td>[[pseudo-Hadamard transform]], rotation</td><td></td><td>finalist</td><td></td>
</tr>
</tr>
<tr>
<tr>
Line 100: Line 100:
</tr>
</tr>
</table>
</table>
* "PHT" indicates a [[pseudo-Hadamard transform]].

Revision as of 07:59, 9 August 2009

Block ciphers
CipherTypeBlock sizeKey sizeRoundsS-boxesRound function hasStandard inAES competitionComment
AESSP network128128,192,25610, 12 or 14one 8*8US, 2002 onwardwinnerextremely widely used
DESFeistel6456168 6*4bit permutationUS, 1976-2002obsolete, key too short against brute force
Triple DESFeistel64112 or 16848 (3*16)8 6*4bit permutationwidely used, but being replaced by AES
BlowfishFeistel64up to 556164 8*32, key-dependentwidely used
CAST-128Feistel6440 to 128164 8*32, using bent functionskey-dependent rotationwidely used, including PGP
GOST cipherFeistel64256328 4*4rotationSoviet Union
SkipjackFeistel, unbalanced648032designed by NSA for Clipper chip phones
IDEA641288nonemodular multiplicationEurope
TEAFeistel6412832noneonly shift, XOR, additionsmall, fast & simple
SAFER SK-128SP network641288pseudo-Hadamard transformSingapore
SAFER+SP network128128,192,2568,12 or 15pseudo-Hadamard transformcandidate
LOKIFeistel646416
LOKI97Feistel128128,192,25616two SP network roundscandidate
SerpentSP network128128,192,256328 4*4finalist
MARSFeistel-like128128,192,25616one 9*32data-dependent rotationfinalistdesigned at IBM
CAST-256Feistel-like128128,192,256484 8*32, using bent functionskey-dependent rotationcandidate
TwofishFeistel128128,192,256164 8*8, key-dependentpseudo-Hadamard transform, rotationfinalist
RC2Feistel64variable18often used with 40-bit key, for export
RC5Feistel64 or 128up to 2040variabledata-dependent rotation
RC6128128,192,256data-dependent rotationfinalist
DFCFeistel128128,192,2566one 6*32candidate
FROGvariablevariable8candidateuses key as program, not just as data
E2Feistel128128,192,25612one 8*8candidate
DEALFeistel128128,192,2566 or 8DES as the round functioncandidate
CamelliaFeistel128128,192,25618 or 24Japanese
SEEDFeistel128128162 8*8Korean
CRYPTONSP network128128,192,25612candidate
MAGENTAFeistel128128,192,2566 or 8candidatequickly broken
Hasty Puddingvariablevariablecandidatetweakable
ThreefishSP network256,512,1024256,512,102472 or 80tweakable, used in Skein hash
Whirlpool cipherSP network51251210AES-like, used in Whirlpool hash