HOME

TheInfoList



OR:

This article summarizes publicly known attacks against
block cipher In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called ''blocks''. Block ciphers are specified cryptographic primitive, elementary components in the design of many cryptographic protocols and ...
s and
stream cipher stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream ( keystream). In a stream cipher, each plaintext digit is encrypted one at a time with the corresponding digit of the keystream ...
s. Note that there are perhaps attacks that are not publicly known, and not all entries may be up to date.


Table color key


Best attack

This column lists the complexity of the attack: * If the attack doesn't break the full cipher, "rounds" refers to how many rounds were broken * "time" —
time complexity In computer science, the time complexity is the computational complexity that describes the amount of computer time it takes to run an algorithm. Time complexity is commonly estimated by counting the number of elementary operations performed by ...
, number of cipher evaluations for the attacker * "data" — required known plaintext-ciphertext pairs (if applicable) * "memory" — how many blocks worth of data needs to be stored (if applicable) * "related keys" — for
related-key attack In cryptography, a related-key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different keys whose values are initially unknown, but where some mathematical relationship connecting the k ...
s, how many related key queries are needed


Common ciphers


Key or plaintext recovery attacks

Attacks that lead to disclosure of the
key Key or The Key may refer to: Common meanings * Key (cryptography), a piece of information that controls the operation of a cryptography algorithm * Key (lock), device used to control access to places or facilities restricted by a lock * Key (ma ...
or plaintext.


Distinguishing attacks

Attacks that allow distinguishing ciphertext from random data.


Less common ciphers


Key recovery attacks

Attacks that lead to disclosure of the
key Key or The Key may refer to: Common meanings * Key (cryptography), a piece of information that controls the operation of a cryptography algorithm * Key (lock), device used to control access to places or facilities restricted by a lock * Key (ma ...
.


Distinguishing attacks

Attacks that allow distinguishing ciphertext from random data.


See also

*
Block cipher In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called ''blocks''. Block ciphers are specified cryptographic primitive, elementary components in the design of many cryptographic protocols and ...
*
Hash function security summary This article summarizes publicly known attacks against cryptographic hash functions. Note that not all entries may be up to date. For a summary of other hash function parameters, see comparison of cryptographic hash functions. Table color key ...
* Time/memory/data tradeoff attack *
Transport Layer Security Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in secu ...
*
Bullrun (decryption program) Bullrun (stylized BULLRUN) is a clandestine, highly classified program to crack encryption of online communications and data, which is run by the United States National Security Agency (NSA). The British Government Communications Headquarters ...
— a secret anti-encryption program run by the U.S. National Security Agency


References

{{cryptography navbox , block * Cryptography lists and comparisons