Block cipher/Catalogs/Cipher table: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
No edit summary
imported>Sandy Harris
No edit summary
Line 49: Line 49:
<tr>
<tr>
   <td>[[Rivest ciphers#RC6|RC6]]</td><td></td><td>128</td><td>128,192,256</td><td></td><td></td><td></td><td>finalist</td><td>uses data-dependent rotations</td>
   <td>[[Rivest ciphers#RC6|RC6]]</td><td></td><td>128</td><td>128,192,256</td><td></td><td></td><td></td><td>finalist</td><td>uses data-dependent rotations</td>
</tr>
<tr>
  <td>[[DFC (cipher)|DFC]]</td><td></td><td>128</td><td>128,192,256</td><td></td><td></td><td></td><td>candidate</td><td></td>
</tr>
<tr>
  <td>[[FROG (cipher)|FROG]]</td><td></td><td>128</td><td>128,192,256</td><td></td><td></td><td></td><td>candidate</td><td></td>
</tr>
<tr>
  <td>[[E2 (cipher)|E2]]</td><td></td><td>128</td><td>128,192,256</td><td></td><td></td><td></td><td>candidate</td><td></td>
</tr>
<tr>
  <td>[[DEAL (cipher)|DEAL]]</td><td>Feistel</td><td>128</td><td>128,192,256</td><td></td><td></td><td></td><td>candidate</td><td>uses DES as the round function</td>
</tr>
<tr>
  <td>[[CRYPTON (cipher)|CRYPTON]]</td><td>SP network</td><td>128</td><td>128,192,256</td><td></td><td></td><td></td><td>candidate</td><td></td>
</tr>
<tr>
  <td>[[MAGENTA (cipher)|MAGENTA]]</td><td></td><td>128</td><td>128,192,256</td><td></td><td></td><td></td><td>candidate</td><td>quickly broken</td>
</tr>
<tr>
  <td>[[ (cipher)| (cipher)]]</td><td></td><td>128</td><td>128,192,256</td><td></td><td></td><td></td><td>candidate</td><td></td>
</tr>
<tr>
  <td>[[ (cipher)| (cipher)]]</td><td></td><td>128</td><td>128,192,256</td><td></td><td></td><td></td><td>candidate</td><td></td>
</tr>
</tr>
</table>
</table>

Revision as of 04:22, 9 August 2009

CipherTypeBlock sizeKey sizeRoundsS-boxesStandard inAES competitionComment
Advanced Encryption StandardSP network128128,192,25610 to 14one 8*8US, 2002 onwardWinnercurrent US standard, widely used
Data Encryption StandardFeistel6456168 6*4US, 1976-2002obsolete, key too short against brute force
BlowfishFeistel64up to 556164 8*32, key-dependentwidely used
CAST-128Feistel6440 to 128164 8*32, using bent functionswidely used, including PGP
GOSTFeistel64256328 4*4Soviet Union
International Data Encryption Algorithm, IDEA641288noneEuropeuses modular multiplication
Tiny Encryption Algorithm, TEAFeistel6412832noneonly shift, XOR, addition
SAFER SK-128SP network641288Singaporeuses pseudo-Hadamard transformation
SAFER+SP network128128,192,256candidateuses pseudo-Hadamard transformation
SerpentSP network128128,192,256328 4*4finalist
MARSFeistel-like128128,192,25616one 9*32finalistdesigned at IBM
CAST-256Feistel-like128128,192,256484 8*32, using bent functionscandidate
Twofish128128,192,25616key-dependentfinalistuses pseudo-Hadamard transformation
RC5Feistel64128uses data-dependent rotations
RC6128128,192,256finalistuses data-dependent rotations
DFC128128,192,256candidate
FROG128128,192,256candidate
E2128128,192,256candidate
DEALFeistel128128,192,256candidateuses DES as the round function
CRYPTONSP network128128,192,256candidate
MAGENTA128128,192,256candidatequickly broken
(cipher)128128,192,256candidate
(cipher)128128,192,256candidate