class="wikitable" border="1" |
Cipher
! Security claim
! Best attack
! Publish date
! Comment |
---|
style="background: #ffff90; color: black"
| AES128
| 2128
| {{nowrap| 2126.1 time, 288 data, 28 memory }}
| rowspan=3 | 2011-08-17
| rowspan=3 | Independent biclique attack.[{{cite journal|url=https://eprint.iacr.org/2011/449|title=Biclique Cryptanalysis of the Full AES|date=2011-08-17|author1=Andrey Bogdanov|author2=Dmitry Khovratovich|author3=Christian Rechberger|journal=Cryptology ePrint Archive }}] |
style="background: #ffff90; color: black"
| AES192
| 2192
| {{nowrap| 2189.7 time, 280 data, 28 memory }} |
style="background: #ffff90; color: black"
| AES256
| 2256
| {{nowrap| 2254.4 time, 240 data, 28 memory }} |
style="background: #ff9090; color: black"
| Blowfish
| Up to 2448
| 4 of 16 rounds; 64-bit block is vulnerable to SWEET32 attack.
| 2016
| Differential cryptanalysis.[{{cite journal |author=Vincent Rijmen |author-link=Vincent Rijmen |year=1997 |title=Cryptanalysis and Design of Iterated Block Ciphers |journal=Ph.D. Thesis |url=https://www.cosic.esat.kuleuven.be/publications/thesis-4.ps }}] Author of Blowfish (Bruce Schneier) recommends using Twofish instead.[{{cite web|url=https://www.computerworld.com.au/article/46254/bruce_almighty_schneier_preaches_security_linux_faithful/|title=Bruce Almighty: Schneier preaches security to Linux faithful|date=2007-12-27|author=Dahna McConnachie|work=Computerworld|archive-url=https://web.archive.org/web/20120603124940/http://www.computerworld.com.au/article/46254/bruce_almighty_schneier_preaches_security_linux_faithful/|archive-date=2012-06-03|access-date=2014-02-13}}] SWEET32 attack demonstrated birthday attacks to recover plaintext with its 64-bit block size, vulnerable to protocols such as TLS, SSH, IPsec, and OpenVPN, without attacking the cipher itself.[{{cite web]
| url=https://sweet32.info/
| title=On the Practical (In-)Security of 64-bit Block Ciphers — Collision Attacks on HTTP over TLS and OpenVPN
| author=Karthikeyan Bhargavan, Gaëtan Leurent
| date=August 2016
| publisher=ACM CCS 2016}} |
Twofish
| 2128 – 2256
| 6 of 16 rounds (2256 time)
| 1999-10-05
| Impossible differential attack.[{{cite web |author=Niels Ferguson |author-link=Niels Ferguson |date=1999-10-05 |title=Impossible Differentials in Twofish |website=Schneier |url=https://www.schneier.com/paper-twofish-impossible.html }}] |
Serpent-128
| 2128
| 10 of 32 rounds (289 time, 2118 data)
| rowspan=3 | 2002-02-04
| rowspan=3 | Linear cryptanalysis.[{{cite conference |author1=Eli Biham |author2=Orr Dunkelman |author3=Nathan Keller |date=2002-02-04 |title=Linear Cryptanalysis of Reduced Round Serpent |conference=FSE 2002 |doi=10.1007/3-540-45473-X_2 |doi-access=free }}] |
Serpent-192
| 2192
| rowspan=2 | 11 of 32 rounds (2187 time, 2118 data) |
Serpent-256
| 2256 |
style="background: #ff9090; color: black"
| DES
| 256
| 239 – 243 time, 243 known plaintexts
| 2001
| Linear cryptanalysis.[{{cite conference |last=Junod |first=Pascal |url=http://crypto.junod.info/sac01.html |title=On the Complexity of Matsui's Attack |conference=Selected Areas in Cryptography |date=2001 |pages=199–211 |archive-url=https://web.archive.org/web/20090527065754/http://crypto.junod.info/sac01.html |archive-date=2009-05-27 }}] In addition, broken by brute force in 256 time, no later than 1998-07-17, see EFF DES cracker.[{{cite web |url=https://w2.eff.org/Privacy/Crypto/Crypto_misc/DESCracker/HTML/19980716_eff_des_faq.html |quote=On Wednesday, July 17, 1998 the EFF DES Cracker, which was built for less than $250,000, easily won RSA Laboratory's "DES Challenge II" contest and a $10,000 cash prize. |title=DES Cracker Project |work=EFF |access-date=August 26, 2015 |archive-url=https://web.archive.org/web/20170507231657/https://w2.eff.org/Privacy/Crypto/Crypto_misc/DESCracker/HTML/19980716_eff_des_faq.html |archive-date=May 7, 2017 }}] Cracking hardware is available for purchase since 2006.[{{cite web |title=COPACOBANA – Special-Purpose Hardware for Code-Breaking |url=http://www.sciengines.com/copacobana }}] |
style="background: #ff9090; color: black"
| {{nowrap| Triple DES }}
| 2168
| 2113 time, 232 data, 288 memory; 64-bit block is vulnerable to SWEET32 attack.
| 2016
| Extension of the meet-in-the-middle attack. Time complexity is 2113 steps, but along with proposed techniques, it is estimated to be equivalent to 290 single DES encryption steps. The paper also proposes other time–memory tradeoffs.[{{cite conference |author=Stefan Lucks |author-link=Stefan Lucks |book-title=Fast Software Encryption |date=1998-03-23 |volume=1372 |pages=239–253 |publisher=Springer |doi=10.1007/3-540-69710-1_16 |series=Lecture Notes in Computer Science |isbn=978-3-540-64265-7 |title=Attacking Triple Encryption |doi-access=free }}] SWEET32 attack demonstrated birthday attacks to recover plaintext with its 64-bit block size, vulnerable to protocols such as TLS, SSH, IPsec, and OpenVPN. |
style="background: #ff9090; color: black"
| KASUMI
| 2128
| 232 time, 226 data, 230 memory, 4 related keys
| 2010-01-10
| The cipher used in 3G cell phone networks. This attack takes less than two hours on a single PC, but isn't applicable to 3G due to known plaintext and related key requirements.[{{cite journal |author1=Orr Dunkelman |author2=Nathan Keller |author3=Adi Shamir |date=2010-01-10 |title=A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony |journal=Cryptology ePrint Archive |url=https://eprint.iacr.org/2010/013 }}] |
style="background: #ff9090; color: black"
| RC4
| Up to 22048
| {{nowrap|220 time, 216.4 related keys}} {{nowrap|(95% success probability)}}
| 2007
| Commonly known as PTW attack, it can break WEP encryption in Wi-Fi on an ordinary computer in negligible time.[{{cite conference |author=Erik Tews |author2=Ralf-Philipp Weinmann |author3=Andrei Pyshkin |date=2007 |title=Breaking 104 Bit WEP in Less Than 60 Seconds |conference=WISA 2007 |url=https://eprint.iacr.org/2007/120 }}] This is an improvement of the original Fluhrer, Mantin and Shamir attack published in 2001.[{{cite conference |author1=Scott Fluhrer |author2=Itsik Mantin |author3=Adi Shamir |date=2001-12-20 |title=Weaknesses in the Key Scheduling Algorithm of RC4 |conference=Selected Areas in Cryptography 2001 |url=http://www.crypto.com/papers/others/rc4_ksaproc.pdf }}] |