Stream Cipher - Comparison of Stream Ciphers

Comparison of Stream Ciphers

Stream
Cipher
Creation
Date
Speed
(cycles per byte)
(bits) Attack
Effective
Key-Length
Initialization vector Internal
State
Best Known Computational
Complexity
A5/1 1989 Voice (Wphone) 54 114 64 Active KPA OR
KPA Time-Memory Tradeoff
~2 seconds OR
239.91
A5/2 1989 Voice (Wphone) 54 114 64? Active 4.6 milliseconds
Achterbahn-128/80 2006 1 (hardware) 80/128 80/128 297/351 Brute force for frame lengths L ≤ 244. Correlation attack for L ≥ 248. 280 resp. 2128 for L ≤ 244.
CryptMT 2005 Very Fast (Software) Variable up to 19968 19968 N/A (2008) N/A (2008)
FISH 1993 Quite Fast (Wsoft) Variable ? ? Known-plaintext attack 211
Grain Pre-2004 Fast 80 64 160 Key-Derivation 243
HC-256 Pre-2004 4 (WP4) 256 256 65536 ? ?
ISAAC 1996 2.375 (W64-bit) -
4.6875 (W32-bit)
8-8288
usually 40-256
N/A 8288 (2006) First-round
Weak-Internal-State-Derivation
4.67×101240 (2001)
MUGI 1998–2002 ? 128 128 1216 N/A (2002) ~282
PANAMA 1998 2 256 128? 1216? Hash Collisions (2001) 282
Phelix Pre-2004 up to 8 (Wx86) 256 + a 128-bit Nonce 128? ? Differential (2006) 237
Pike 1994 0.9 x FISH (Wsoft) Variable ? ? N/A (2004) N/A (2004)
Py Pre-2004 2.6 8-2048?
usually 40-256?
64 8320 Cryptanalytic Theory (2006) 275
Rabbit 2003-Feb 3.7(WP3)-9.7(WARM7) 128 64 512 N/A (2006) N/A (2006)
RC4 1987 7 WP5 8-2048
usually 40-256
8 2064 Shamir Initial-Bytes Key-Derivation OR KPA 213 OR 233
Salsa20 Pre-2004 4.24 (WG4) -
11.84 (WP4)
256 a 64-bit Nonce + a 64-bit stream position 512 Probabilistic neutral bits method 2251 for 8 rounds (2007)
Scream 2002 4 - 5 (Wsoft) 128 + a 128-bit Nonce 32? 64-bit round function ? ?
SEAL 1997 Very Fast (W32-bit) ? 32? ? ? ?
SNOW Pre-2003 Very Good (W32-bit) 128 OR 256 32 ? ? ?
SOBER-128 2003 ? up to 128 ? ? Message Forge 2−6
SOSEMANUK Pre-2004 Very Good (W32-bit) 128 128 ? ? ?
Trivium Pre-2004 4 (Wx86) - 8 (WLG) 80 80 288 Brute force attack (2006) 2135
Turing 2000–2003 5.5 (Wx86) ? 160 ? ? ?
VEST 2005 42 (WASIC) -
64 (WFPGA)
Variable
usually 80-256
Variable
usually 80-256
256 - 800 N/A (2006) N/A (2006)
WAKE 1993 Fast ? ? 8192 CPA & CCA Vulnerable
Stream
Cipher
Creation
Date
Speed
(cycles per byte)
(bits) Attack
Effective
Key-Length
Initialization vector Internal
State
Best Known Computational
Complexity

Read more about this topic:  Stream Cipher

Famous quotes containing the words comparison and/or stream:

    The comparison between Coleridge and Johnson is obvious in so far as each held sway chiefly by the power of his tongue. The difference between their methods is so marked that it is tempting, but also unnecessary, to judge one to be inferior to the other. Johnson was robust, combative, and concrete; Coleridge was the opposite. The contrast was perhaps in his mind when he said of Johnson: “his bow-wow manner must have had a good deal to do with the effect produced.”
    Virginia Woolf (1882–1941)

    The small force that it takes to launch a boat into the stream should not be confused with the force of the stream that carries it along: but this confusion appears in nearly all biographies.
    Friedrich Nietzsche (1844–1900)