Block cipher/Catalogs/Cipher list: Difference between revisions
imported>Sandy Harris No edit summary |
imported>Sandy Harris |
||
(4 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
{{subpages}} | |||
{{TOC|right}} | {{TOC|right}} | ||
== 64-bit blocks== | == 64-bit blocks== | ||
Ciphers of the [[Data Encryption Standard]] generation, all with 64-bit block size, include: | Ciphers of the [[Data Encryption Standard]] generation, all with 64-bit block size, include: | ||
Line 10: | Line 12: | ||
* [[Blowfish (cipher)| Blowfish]], another widely used 16-round Feistel cipher with 8 by 32 S-boxes. | * [[Blowfish (cipher)| Blowfish]], another widely used 16-round Feistel cipher with 8 by 32 S-boxes. | ||
* The [[Tiny Encryption Algorithm]], or '''TEA''', designed to be very small and fast but still secure, a 32-round Feistel cipher without S-boxes. | * The [[Tiny Encryption Algorithm]], or '''TEA''', designed to be very small and fast but still secure, a 32-round Feistel cipher without S-boxes. | ||
* [[Skipjack]], an algorithm designed by the [[NSA]] for use in the [[Clipper chip]], a 32-round unbalanced Feistel cipher. | * [[Skipjack (cipher)|Skipjack]], an algorithm designed by the [[NSA]] for use in the [[Clipper chip]], a 32-round unbalanced Feistel cipher. | ||
* [[SAFER (cipher)|SAFER]] and [[LOKI (cipher)|LOKI]], two families of ciphers which each included an original version against which [[Lars Knudsen]] found an attack and a revised version to block that attack. Each had a descendant which was an [[AES competition|AES candidate]]. | * [[SAFER (cipher)|SAFER]] and [[LOKI (cipher)|LOKI]], two families of ciphers which each included an original version against which [[Lars Knudsen]] found an attack and a revised version to block that attack. Each had a descendant which was an [[AES competition|AES candidate]]. | ||
Line 41: | Line 43: | ||
== Large fixed block size== | == Large fixed block size== | ||
Ciphers with large fixed block size are: | Ciphers with large fixed block size are: | ||
* the | * the 512-bit AES-like block cipher used in the [[Hash_(cryptography)#Whirlpool|Whirlpool]] hash algorithm, called the Whirlpool or W cipher | ||
* the [[Threefish]] cipher, with 256, 512 and 1024-bit versions, used in the [[Hash_(cryptography)#Skein|Skein]] hash algorithm | * the [[Threefish]] cipher, with 256, 512 and 1024-bit versions, used in the [[Hash_(cryptography)#Skein|Skein]] hash algorithm |
Latest revision as of 11:36, 13 April 2016
The metadata subpage is missing. You can start it via filling in this form or by following the instructions that come up after clicking on the [show] link to the right. | |||
---|---|---|---|
|
64-bit blocks
Ciphers of the Data Encryption Standard generation, all with 64-bit block size, include:
- The Data Encryption Standard itself, the first well-known Feistel cipher, using 16 rounds and eight 6 by 4 S-boxes.
- The GOST cipher, a Soviet standard similar in design to DES, a 32-round Feistel cipher using eight 4 by 4 S-boxes.
- IDEA, the International Data Encryption Algorithm, a European standard, not a Feistel cipher, with only 8 rounds and no S-boxes.
- RC2, a Feistel cipher from RSA Security which was approved for easy export from the US (provided it was used with only a 40-bit key), so widely deployed.
- RC5, a Feistel cipher from RSA security. This was fairly widely deployed, often replacing RC2 in applications.
- CAST-128, a widely used 16-round Feistel cipher, with 8 by 32 S-boxes.
- Blowfish, another widely used 16-round Feistel cipher with 8 by 32 S-boxes.
- The Tiny Encryption Algorithm, or TEA, designed to be very small and fast but still secure, a 32-round Feistel cipher without S-boxes.
- Skipjack, an algorithm designed by the NSA for use in the Clipper chip, a 32-round unbalanced Feistel cipher.
- SAFER and LOKI, two families of ciphers which each included an original version against which Lars Knudsen found an attack and a revised version to block that attack. Each had a descendant which was an AES candidate.
96-bit blocks
The 3-Way cipher used 96-bit blocks.
128-bit blocks
Ciphers of the Advanced Encryption Standard generation, all with 128-bit block size, include:
- AES itself, formerly known as Rijndael, an SP network, from two Belgian designers
- Twofish, a cipher with key-dependent S-boxes, from a team at Bruce Schneier's company Counterpane
- MARS, a variant of Feistel cipher using data-dependent rotations, from IBM
- Serpent, an SP network, from an international group of well-known players
- RC6, a cipher using data-dependent rotations, from a team led by Ron Rivest
- CAST-256, based on CAST-128 and with the same theoretical advantages
- DFC, based on another theoretical analysis proving resistance to various attacks.
- DEAL, a Feistel cipher using DES as the round function
- E2, from Japan
- CRYPTON, a Korean cipher with some design similarities to AES
- MAGENTA, Deutsche Telekom's candidate, quickly broken
- LOKI97, one of the LOKI family of ciphers, from Australia
- SAFER+, one of the SAFER family of ciphers, from Cylink Corporation
- Camellia, an 18-round Feistel cipher widely used in Japan and one of the standard ciphers for the NESSIE (New European Schemes for Signatures, Integrity and Encryption) project.
- SEED, developed by the Korean Information Security Agency (KISA) and widely used in Korea.
Variable block size
Ciphers with variable block size, whose 128-bit variants were AES candidates, are:
- Hasty Pudding, a variable block size tweakable cipher
- FROG, an innovative cipher; interesting but weak
Large fixed block size
Ciphers with large fixed block size are: