Block cipher/Catalogs/Cipher table: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
No edit summary
imported>Sandy Harris
(abbreviate to save table space; article & links have full names)
Line 5: Line 5:


<tr>
<tr>
   <td>AES, [[Advanced Encryption Standard]]</td><td>SP network</td><td>128</td><td>128,192,256</td><td>10 to 14</td><td>one 8*8</td><td></td><td>US, 2002 onward</td><td>Winner</td><td>current US standard, widely used</td>
   <td>[[Advanced Encryption Standard|AES]]</td><td>SP network</td><td>128</td><td>128,192,256</td><td>10 to 14</td><td>one 8*8</td><td></td><td>US, 2002 onward</td><td>Winner</td><td>current US standard, widely used</td>
</tr>
</tr>


<tr>
<tr>
   <td>DES, [[Data Encryption Standard]]</td><td>Feistel</td><td>64</td><td>56</td><td>16</td><td>8 6*4</td><td>bit permutation</td><td>US, 1976-2002</td><td></td><td>obsolete, key too short against [[brute force]]</td>
   <td>[[Data Encryption Standard|DES]]</td><td>Feistel</td><td>64</td><td>56</td><td>16</td><td>8 6*4</td><td>bit permutation</td><td>US, 1976-2002</td><td></td><td>obsolete, key too short against [[brute force]]</td>
</tr>
</tr>
<tr>
<tr>
Line 24: Line 24:
</tr>
</tr>
<tr>
<tr>
   <td>IDEA, [[International Data Encryption Algorithm]]</td><td></td><td>64</td><td>128</td><td>8</td><td>none</td><td>modular multiplication</td><td>Europe</td><td></td><td></td>
   <td>[[International Data Encryption Algorithm|IDEA]]</td><td></td><td>64</td><td>128</td><td>8</td><td>none</td><td>modular multiplication</td><td>Europe</td><td></td><td></td>
</tr>
</tr>
<tr>
<tr>

Revision as of 05:55, 9 August 2009

CipherTypeBlock sizeKey sizeRoundsS-boxesRound function hasStandard inAES competitionComment
AESSP network128128,192,25610 to 14one 8*8US, 2002 onwardWinnercurrent US standard, widely used
DESFeistel6456168 6*4bit permutationUS, 1976-2002obsolete, key too short against brute force
BlowfishFeistel64up to 556164 8*32, key-dependentwidely used
CAST-128Feistel6440 to 128164 8*32, using bent functionskey-dependent rotationwidely used, including PGP
GOST cipherFeistel64256328 4*4rotationSoviet Union
SkipjackFeistel, unbalanced648032designed by NSA for Clipper chip phones
IDEA641288nonemodular multiplicationEurope
TEA, Tiny Encryption AlgorithmFeistel6412832noneonly shift, XOR, addition
SAFER SK-128SP network641288pseudo-Hadamard transformSingapore
SAFER+SP network128128,192,256pseudo-Hadamard transformcandidate
LOKI97Feistel128128,192,25616two SP network roundscandidate
SerpentSP network128128,192,256328 4*4finalist
MARSFeistel-like128128,192,25616one 9*32data-dependent rotationfinalistdesigned at IBM
CAST-256Feistel-like128128,192,256484 8*32, using bent functionskey-dependent rotationcandidate
Twofish128128,192,25616key-dependentpseudo-Hadamard transformfinalist
RC2Feistel6418often used with 40-bit key, for export
RC5Feistel64128data-dependent rotation
RC6128128,192,256data-dependent rotationfinalist
DFC, Decorrelated Fast CipherFeistel128128,192,2566one 6*32candidate
FROGvariablevariable8candidateuses key as program, not just as data
E2128128,192,256candidate
DEALFeistel128128,192,2566 or 8DES as the round functioncandidate
CRYPTONSP network128128,192,256candidate
MAGENTA128128,192,256candidatequickly broken
Hasty Puddingvariablevariablecandidatetweakable