This article summarizes publicly known
attacks against
block cipher
In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called ''blocks''. Block ciphers are specified cryptographic primitive, elementary components in the design of many cryptographic protocols and ...
s and
stream cipher
stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream ( keystream). In a stream cipher, each plaintext digit is encrypted one at a time with the corresponding digit of the keystream ...
s. Note that there are perhaps attacks that are not publicly known, and not all entries may be up to date.
Table color key
Best attack
This column lists the complexity of the attack:
* If the attack doesn't break the full cipher, "rounds" refers to how many rounds were broken
* "time" —
time complexity
In computer science, the time complexity is the computational complexity that describes the amount of computer time it takes to run an algorithm. Time complexity is commonly estimated by counting the number of elementary operations performed by ...
, number of cipher evaluations for the attacker
* "data" — required known plaintext-ciphertext pairs (if applicable)
* "memory" — how many blocks worth of data needs to be stored (if applicable)
* "related keys" — for
related-key attack
In cryptography, a related-key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different keys whose values are initially unknown, but where some mathematical relationship connecting the k ...
s, how many related key queries are needed
Common ciphers
Key or plaintext recovery attacks
Attacks that lead to disclosure of the
key
Key or The Key may refer to:
Common meanings
* Key (cryptography), a piece of information that controls the operation of a cryptography algorithm
* Key (lock), device used to control access to places or facilities restricted by a lock
* Key (ma ...
or plaintext.
Distinguishing attacks
Attacks that allow distinguishing ciphertext from random data.
Less common ciphers
Key recovery attacks
Attacks that lead to disclosure of the
key
Key or The Key may refer to:
Common meanings
* Key (cryptography), a piece of information that controls the operation of a cryptography algorithm
* Key (lock), device used to control access to places or facilities restricted by a lock
* Key (ma ...
.
Distinguishing attacks
Attacks that allow distinguishing ciphertext from random data.
See also
*
Block cipher
In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called ''blocks''. Block ciphers are specified cryptographic primitive, elementary components in the design of many cryptographic protocols and ...
*
Hash function security summary
This article summarizes publicly known attacks against cryptographic hash functions. Note that not all entries may be up to date. For a summary of other hash function parameters, see comparison of cryptographic hash functions.
Table color key
...
*
Time/memory/data tradeoff attack
*
Transport Layer Security
Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in secu ...
*
Bullrun (decryption program)
Bullrun (stylized BULLRUN) is a clandestine, highly classified program to crack encryption of online communications and data, which is run by the United States National Security Agency (NSA). The British Government Communications Headquarters ...
— a secret anti-encryption program run by the U.S. National Security Agency
References
{{cryptography navbox , block
*
Cryptography lists and comparisons