Block cipher/Catalogs/Cipher table: Difference between revisions
< Block cipher | Catalogs
Jump to navigation
Jump to search
imported>Sandy Harris No edit summary |
imported>Sandy Harris No edit summary |
||
Line 49: | Line 49: | ||
<tr> | <tr> | ||
<td>[[Rivest ciphers#RC6|RC6]]</td><td></td><td>128</td><td>128,192,256</td><td></td><td></td><td></td><td>finalist</td><td>uses data-dependent rotations</td> | <td>[[Rivest ciphers#RC6|RC6]]</td><td></td><td>128</td><td>128,192,256</td><td></td><td></td><td></td><td>finalist</td><td>uses data-dependent rotations</td> | ||
</tr> | |||
<tr> | |||
<td>[[DFC (cipher)|DFC]]</td><td></td><td>128</td><td>128,192,256</td><td></td><td></td><td></td><td>candidate</td><td></td> | |||
</tr> | |||
<tr> | |||
<td>[[FROG (cipher)|FROG]]</td><td></td><td>128</td><td>128,192,256</td><td></td><td></td><td></td><td>candidate</td><td></td> | |||
</tr> | |||
<tr> | |||
<td>[[E2 (cipher)|E2]]</td><td></td><td>128</td><td>128,192,256</td><td></td><td></td><td></td><td>candidate</td><td></td> | |||
</tr> | |||
<tr> | |||
<td>[[DEAL (cipher)|DEAL]]</td><td>Feistel</td><td>128</td><td>128,192,256</td><td></td><td></td><td></td><td>candidate</td><td>uses DES as the round function</td> | |||
</tr> | |||
<tr> | |||
<td>[[CRYPTON (cipher)|CRYPTON]]</td><td>SP network</td><td>128</td><td>128,192,256</td><td></td><td></td><td></td><td>candidate</td><td></td> | |||
</tr> | |||
<tr> | |||
<td>[[MAGENTA (cipher)|MAGENTA]]</td><td></td><td>128</td><td>128,192,256</td><td></td><td></td><td></td><td>candidate</td><td>quickly broken</td> | |||
</tr> | |||
<tr> | |||
<td>[[ (cipher)| (cipher)]]</td><td></td><td>128</td><td>128,192,256</td><td></td><td></td><td></td><td>candidate</td><td></td> | |||
</tr> | |||
<tr> | |||
<td>[[ (cipher)| (cipher)]]</td><td></td><td>128</td><td>128,192,256</td><td></td><td></td><td></td><td>candidate</td><td></td> | |||
</tr> | </tr> | ||
</table> | </table> |
Revision as of 04:22, 9 August 2009
Cipher | Type | Block size | Key size | Rounds | S-boxes | Standard in | AES competition | Comment |
---|---|---|---|---|---|---|---|---|
Advanced Encryption Standard | SP network | 128 | 128,192,256 | 10 to 14 | one 8*8 | US, 2002 onward | Winner | current US standard, widely used |
Data Encryption Standard | Feistel | 64 | 56 | 16 | 8 6*4 | US, 1976-2002 | obsolete, key too short against brute force | |
Blowfish | Feistel | 64 | up to 556 | 16 | 4 8*32, key-dependent | widely used | ||
CAST-128 | Feistel | 64 | 40 to 128 | 16 | 4 8*32, using bent functions | widely used, including PGP | ||
GOST | Feistel | 64 | 256 | 32 | 8 4*4 | Soviet Union | ||
International Data Encryption Algorithm, IDEA | 64 | 128 | 8 | none | Europe | uses modular multiplication | ||
Tiny Encryption Algorithm, TEA | Feistel | 64 | 128 | 32 | none | only shift, XOR, addition | ||
SAFER SK-128 | SP network | 64 | 128 | 8 | Singapore | uses pseudo-Hadamard transformation | ||
SAFER+ | SP network | 128 | 128,192,256 | candidate | uses pseudo-Hadamard transformation | |||
Serpent | SP network | 128 | 128,192,256 | 32 | 8 4*4 | finalist | ||
MARS | Feistel-like | 128 | 128,192,256 | 16 | one 9*32 | finalist | designed at IBM | |
CAST-256 | Feistel-like | 128 | 128,192,256 | 48 | 4 8*32, using bent functions | candidate | ||
Twofish | 128 | 128,192,256 | 16 | key-dependent | finalist | uses pseudo-Hadamard transformation | ||
RC5 | Feistel | 64 | 128 | uses data-dependent rotations | ||||
RC6 | 128 | 128,192,256 | finalist | uses data-dependent rotations | ||||
DFC | 128 | 128,192,256 | candidate | |||||
FROG | 128 | 128,192,256 | candidate | |||||
E2 | 128 | 128,192,256 | candidate | |||||
DEAL | Feistel | 128 | 128,192,256 | candidate | uses DES as the round function | |||
CRYPTON | SP network | 128 | 128,192,256 | candidate | ||||
MAGENTA | 128 | 128,192,256 | candidate | quickly broken | ||||
(cipher) | 128 | 128,192,256 | candidate | |||||
(cipher) | 128 | 128,192,256 | candidate |