This article summarizes publicly known attacks against block ciphers and stream ciphers. Note that there are perhaps attacks that are not publicly known, and not all entries may be up to date.
Contents
Best attack
This column lists the complexity of the attack:
Key or plaintext recovery attacks
Attacks that lead to disclosure of the key or plaintext.
Distinguishing attacks
Attacks that allow distinguishing ciphertext from random data.
Key recovery attacks
Attacks that lead to disclosure of the key.
Distinguishing attacks
Attacks that allow distinguishing ciphertext from random data.
References
Cipher security summary Wikipedia(Text) CC BY-SA