Top Qs
Timeline
Chat
Perspective

Cipher security summary

Attacks against common ciphers From Wikipedia, the free encyclopedia

Remove ads

This article summarizes publicly known attacks against block ciphers and stream ciphers. Note that there are perhaps attacks that are not publicly known, and not all entries may be up to date.

Table color key

  No known successful attacks attack only breaks a reduced version of the cipher
  Theoretical break attack breaks all rounds and has lower complexity than security claim
  Attack demonstrated in practice

Best attack

This column lists the complexity of the attack:

  • If the attack doesn't break the full cipher, "rounds" refers to how many rounds were broken
  • "time" time complexity, number of cipher evaluations for the attacker
  • "data" required known plaintext-ciphertext pairs (if applicable)
  • "memory" how many blocks worth of data needs to be stored (if applicable)
  • "related keys" for related-key attacks, how many related key queries are needed
Remove ads

Common ciphers

Summarize
Perspective

Key or plaintext recovery attacks

Attacks that lead to disclosure of the key or plaintext.

More information Security claim, Best attack ...

Distinguishing attacks

Attacks that allow distinguishing ciphertext from random data.

More information Security claim, Best attack ...
Remove ads

Less-common ciphers

Summarize
Perspective

Key recovery attacks

Attacks that lead to disclosure of the key.

More information Security claim, Best attack ...

Distinguishing attacks

Attacks that allow distinguishing ciphertext from random data.

More information Security claim, Best attack ...
Remove ads

See also

References

Loading related searches...

Wikiwand - on

Seamless Wikipedia browsing. On steroids.

Remove ads