Top Qs
Timeline
Chat
Perspective
Cipher security summary
Attacks against common ciphers From Wikipedia, the free encyclopedia
Remove ads
This article summarizes publicly known attacks against block ciphers and stream ciphers. Note that there are perhaps attacks that are not publicly known, and not all entries may be up to date.
Table color key
No known successful attacks — attack only breaks a reduced version of the cipher
Theoretical break — attack breaks all rounds and has lower complexity than security claim
Attack demonstrated in practice
Best attack
This column lists the complexity of the attack:
- If the attack doesn't break the full cipher, "rounds" refers to how many rounds were broken
- "time" — time complexity, number of cipher evaluations for the attacker
- "data" — required known plaintext-ciphertext pairs (if applicable)
- "memory" — how many blocks worth of data needs to be stored (if applicable)
- "related keys" — for related-key attacks, how many related key queries are needed
Remove ads
Common ciphers
Summarize
Perspective
Key or plaintext recovery attacks
Attacks that lead to disclosure of the key or plaintext.
Distinguishing attacks
Attacks that allow distinguishing ciphertext from random data.
Remove ads
Less-common ciphers
Summarize
Perspective
Key recovery attacks
Attacks that lead to disclosure of the key.
Distinguishing attacks
Attacks that allow distinguishing ciphertext from random data.
Remove ads
See also
- Block cipher
- Hash function security summary
- Time/memory/data tradeoff attack
- Transport Layer Security
- Bullrun (decryption program) — a secret anti-encryption program run by the U.S. National Security Agency
References
Wikiwand - on
Seamless Wikipedia browsing. On steroids.
Remove ads