Trisha Shetty (Editor)

Cipher security summary

Updated on
Edit
Like
Comment
Share on FacebookTweet on TwitterShare on LinkedInShare on Reddit

This article summarizes publicly known attacks against block ciphers and stream ciphers. Note that there are perhaps attacks that are not publicly known, and not all entries may be up to date.

Contents

Best attack

This column lists the complexity of the attack:

  • If the attack doesn't break the full cipher, "rounds" refers to how many rounds were broken
  • "time" — time complexity, number of cipher evaluations for the attacker
  • "data" — required known plaintext-ciphertext pairs (if applicable)
  • "memory" — how many blocks worth of data needs to be stored (if applicable)
  • "related keys" — for related-key attacks, how many related key queries are needed
  • Key or plaintext recovery attacks

    Attacks that lead to disclosure of the key or plaintext.

    Distinguishing attacks

    Attacks that allow distinguishing ciphertext from random data.

    Key recovery attacks

    Attacks that lead to disclosure of the key.

    Distinguishing attacks

    Attacks that allow distinguishing ciphertext from random data.

    References

    Cipher security summary Wikipedia