Comparison of Stream Ciphers
Stream Cipher |
Creation Date |
Speed (cycles per byte) |
(bits) | Attack | |||
---|---|---|---|---|---|---|---|
Effective Key-Length |
Initialization vector | Internal State |
Best Known | Computational Complexity |
|||
A5/1 | 1989 | Voice (Wphone) | 54 | 114 | 64 | Active KPA OR KPA Time-Memory Tradeoff |
~2 seconds OR 239.91 |
A5/2 | 1989 | Voice (Wphone) | 54 | 114 | 64? | Active | 4.6 milliseconds |
Achterbahn-128/80 | 2006 | 1 (hardware) | 80/128 | 80/128 | 297/351 | Brute force for frame lengths L ≤ 244. Correlation attack for L ≥ 248. | 280 resp. 2128 for L ≤ 244. |
CryptMT | 2005 | Very Fast (Software) | Variable | up to 19968 | 19968 | N/A (2008) | N/A (2008) |
FISH | 1993 | Quite Fast (Wsoft) | Variable | ? | ? | Known-plaintext attack | 211 |
Grain | Pre-2004 | Fast | 80 | 64 | 160 | Key-Derivation | 243 |
HC-256 | Pre-2004 | 4 (WP4) | 256 | 256 | 65536 | ? | ? |
ISAAC | 1996 | 2.375 (W64-bit) - 4.6875 (W32-bit) |
8-8288 usually 40-256 |
N/A | 8288 | (2006) First-round Weak-Internal-State-Derivation |
4.67×101240 (2001) |
MUGI | 1998–2002 | ? | 128 | 128 | 1216 | N/A (2002) | ~282 |
PANAMA | 1998 | 2 | 256 | 128? | 1216? | Hash Collisions (2001) | 282 |
Phelix | Pre-2004 | up to 8 (Wx86) | 256 + a 128-bit Nonce | 128? | ? | Differential (2006) | 237 |
Pike | 1994 | 0.9 x FISH (Wsoft) | Variable | ? | ? | N/A (2004) | N/A (2004) |
Py | Pre-2004 | 2.6 | 8-2048? usually 40-256? |
64 | 8320 | Cryptanalytic Theory (2006) | 275 |
Rabbit | 2003-Feb | 3.7(WP3)-9.7(WARM7) | 128 | 64 | 512 | N/A (2006) | N/A (2006) |
RC4 | 1987 | 7 WP5 | 8-2048 usually 40-256 |
8 | 2064 | Shamir Initial-Bytes Key-Derivation OR KPA | 213 OR 233 |
Salsa20 | Pre-2004 | 4.24 (WG4) - 11.84 (WP4) |
256 | a 64-bit Nonce + a 64-bit stream position | 512 | Probabilistic neutral bits method | 2251 for 8 rounds (2007) |
Scream | 2002 | 4 - 5 (Wsoft) | 128 + a 128-bit Nonce | 32? | 64-bit round function | ? | ? |
SEAL | 1997 | Very Fast (W32-bit) | ? | 32? | ? | ? | ? |
SNOW | Pre-2003 | Very Good (W32-bit) | 128 OR 256 | 32 | ? | ? | ? |
SOBER-128 | 2003 | ? | up to 128 | ? | ? | Message Forge | 2−6 |
SOSEMANUK | Pre-2004 | Very Good (W32-bit) | 128 | 128 | ? | ? | ? |
Trivium | Pre-2004 | 4 (Wx86) - 8 (WLG) | 80 | 80 | 288 | Brute force attack (2006) | 2135 |
Turing | 2000–2003 | 5.5 (Wx86) | ? | 160 | ? | ? | ? |
VEST | 2005 | 42 (WASIC) - 64 (WFPGA) |
Variable usually 80-256 |
Variable usually 80-256 |
256 - 800 | N/A (2006) | N/A (2006) |
WAKE | 1993 | Fast | ? | ? | 8192 | CPA & CCA | Vulnerable |
Stream Cipher |
Creation Date |
Speed (cycles per byte) |
(bits) | Attack | |||
Effective Key-Length |
Initialization vector | Internal State |
Best Known | Computational Complexity |
Read more about this topic: Stream Cipher
Famous quotes containing the words comparison and/or stream:
“The difference between human vision and the image perceived by the faceted eye of an insect may be compared with the difference between a half-tone block made with the very finest screen and the corresponding picture as represented by the very coarse screening used in common newspaper pictorial reproduction. The same comparison holds good between the way Gogol saw things and the way average readers and average writers see things.”
—Vladimir Nabokov (18991977)
“Is there not
An art, a music, and a stream of words
That shalt be life, the acknowledged voice of life?”
—William Wordsworth (17701850)