Block cipher/Catalogs/Cipher table: Difference between revisions
< Block cipher | Catalogs
Jump to navigation
Jump to search
imported>Sandy Harris No edit summary |
imported>Sandy Harris No edit summary |
||
Line 5: | Line 5: | ||
<tr> | <tr> | ||
<td>[[Advanced Encryption Standard]]</td><td>SP network</td><td>128</td><td>128,192,256</td><td>10 to 14</td><td>one 8*8</td><td>US, 2002 onward</td><td>Winner</td><td>current US standard, widely used</td> | <td>AES, [[Advanced Encryption Standard]]</td><td>SP network</td><td>128</td><td>128,192,256</td><td>10 to 14</td><td>one 8*8</td><td>US, 2002 onward</td><td>Winner</td><td>current US standard, widely used</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>[[Data Encryption Standard]]</td><td>Feistel</td><td>64</td><td>56</td><td>16</td><td>8 6*4</td><td>US, 1976-2002</td><td></td><td>obsolete, key too short against [[brute force]]</td> | <td>DES, [[Data Encryption Standard]]</td><td>Feistel</td><td>64</td><td>56</td><td>16</td><td>8 6*4</td><td>US, 1976-2002</td><td></td><td>obsolete, key too short against [[brute force]]</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
Line 18: | Line 18: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>[[GOST cipher | <td>[[GOST cipher]]</td><td>Feistel</td><td>64</td><td>256</td><td>32</td><td>8 4*4</td><td>Soviet Union</td><td></td><td></td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>[[International Data Encryption Algorithm]] | <td>IDEA, [[International Data Encryption Algorithm]]</td><td></td><td>64</td><td>128</td><td>8</td><td>none</td><td>Europe</td><td></td><td>uses modular multiplication</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>[[Tiny Encryption Algorithm]] | <td>TEA, [[Tiny Encryption Algorithm]]</td><td>Feistel</td><td>64</td><td>128</td><td>32</td><td>none</td><td></td><td></td><td>only shift, XOR, addition</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
Line 54: | Line 54: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
<td>[[DFC (cipher)| | <td>DFC, [[DFC (cipher)|Decorrelated Fast Cipher]]</td><td>Feistel</td><td>128</td><td>128,192,256</td><td>6</td><td>one 6*32</td><td></td><td>candidate</td><td></td> | ||
</tr> | </tr> | ||
<tr> | <tr> |
Revision as of 04:36, 9 August 2009
Cipher | Type | Block size | Key size | Rounds | S-boxes | Standard in | AES competition | Comment |
---|---|---|---|---|---|---|---|---|
AES, Advanced Encryption Standard | SP network | 128 | 128,192,256 | 10 to 14 | one 8*8 | US, 2002 onward | Winner | current US standard, widely used |
DES, Data Encryption Standard | Feistel | 64 | 56 | 16 | 8 6*4 | US, 1976-2002 | obsolete, key too short against brute force | |
Blowfish | Feistel | 64 | up to 556 | 16 | 4 8*32, key-dependent | widely used | ||
CAST-128 | Feistel | 64 | 40 to 128 | 16 | 4 8*32, using bent functions | widely used, including PGP | ||
GOST cipher | Feistel | 64 | 256 | 32 | 8 4*4 | Soviet Union | ||
IDEA, International Data Encryption Algorithm | 64 | 128 | 8 | none | Europe | uses modular multiplication | ||
TEA, Tiny Encryption Algorithm | Feistel | 64 | 128 | 32 | none | only shift, XOR, addition | ||
SAFER SK-128 | SP network | 64 | 128 | 8 | Singapore | uses pseudo-Hadamard transformation | ||
SAFER+ | SP network | 128 | 128,192,256 | candidate | uses pseudo-Hadamard transformation | |||
LOKI97 | 128 | 128,192,256 | candidate | |||||
Serpent | SP network | 128 | 128,192,256 | 32 | 8 4*4 | finalist | ||
MARS | Feistel-like | 128 | 128,192,256 | 16 | one 9*32 | finalist | designed at IBM | |
CAST-256 | Feistel-like | 128 | 128,192,256 | 48 | 4 8*32, using bent functions | candidate | ||
Twofish | 128 | 128,192,256 | 16 | key-dependent | finalist | uses pseudo-Hadamard transformation | ||
RC5 | Feistel | 64 | 128 | uses data-dependent rotations | ||||
RC6 | 128 | 128,192,256 | finalist | uses data-dependent rotations | ||||
DFC, Decorrelated Fast Cipher | Feistel | 128 | 128,192,256 | 6 | one 6*32 | candidate | ||
FROG | variable | variable | candidate | uses key as program, not just as data | ||||
E2 | 128 | 128,192,256 | candidate | |||||
DEAL | Feistel | 128 | 128,192,256 | candidate | uses DES as the round function | |||
CRYPTON | SP network | 128 | 128,192,256 | candidate | ||||
MAGENTA | 128 | 128,192,256 | candidate | quickly broken | ||||
Hasty Pudding | variable | variable | candidate | Tweakable |