77:
31:
Note that most cryptanalytic attacks against ciphers are still too complex to apply in practice. Widely cryptanalysed ciphers like
465:
231:
131:
56:
32:
35:
are considered stronger than un-cryptanalysed ciphers even if there are impractical attacks against them.
407:
168:
460:
24:. "Broken" here means that there is a published attack that is computationally faster than a
8:
219:
302:
156:
25:
136:
102:
285:
253:
441:
344:
60:
312:
454:
334:
151:
21:
317:
17:
297:
417:
390:
361:
270:
119:
395:
322:
258:
146:
114:
412:
307:
339:
280:
248:
243:
185:
141:
76:
The following 46 pages are in this category, out of 46 total.
429:
197:
173:
90:
349:
275:
214:
202:
378:
373:
44:This category has only the following subcategory.
452:
78:This list may not reflect recent changes
73:Pages in category "Broken block ciphers"
232:International Data Encryption Algorithm
453:
132:Cellular Message Encryption Algorithm
39:
13:
82:
46:
38:
14:
477:
466:Broken cryptography algorithms
1:
71:
33:Advanced Encryption Standard
7:
10:
482:
408:Tiny Encryption Algorithm
169:Data Encryption Standard
57:Data Encryption Standard
16:This is a category for
220:GOST (block cipher)
303:MacGuffin (cipher)
157:Cryptomeria cipher
26:brute force attack
137:Churning (cipher)
103:Akelarre (cipher)
473:
286:Lucifer (cipher)
254:Khufu and Khafre
62:
481:
480:
476:
475:
474:
472:
471:
470:
451:
450:
449:
448:
447:
446:
442:Zodiac (cipher)
434:
422:
400:
383:
366:
354:
345:Nimbus (cipher)
327:
290:
263:
236:
224:
207:
190:
178:
161:
124:
107:
95:
70:
69:
68:
67:
64:
63:
37:
20:that have been
12:
11:
5:
479:
469:
468:
463:
445:
444:
438:
435:
433:
432:
426:
423:
421:
420:
415:
410:
404:
401:
399:
398:
393:
387:
384:
382:
381:
376:
370:
367:
365:
364:
358:
355:
353:
352:
347:
342:
337:
331:
328:
326:
325:
320:
315:
313:Mercy (cipher)
310:
305:
300:
294:
291:
289:
288:
283:
278:
273:
267:
264:
262:
261:
256:
251:
246:
240:
237:
235:
234:
228:
225:
223:
222:
217:
211:
208:
206:
205:
200:
194:
191:
189:
188:
182:
179:
177:
176:
171:
165:
162:
160:
159:
154:
149:
144:
139:
134:
128:
125:
123:
122:
117:
111:
108:
106:
105:
99:
96:
94:
93:
87:
84:
83:
74:
66:
65:
55:
54:
51:
48:
47:
42:
9:
6:
4:
3:
2:
478:
467:
464:
462:
461:Block ciphers
459:
458:
456:
443:
440:
439:
436:
431:
428:
427:
424:
419:
416:
414:
411:
409:
406:
405:
402:
397:
394:
392:
389:
388:
385:
380:
377:
375:
372:
371:
368:
363:
360:
359:
356:
351:
348:
346:
343:
341:
338:
336:
335:New Data Seal
333:
332:
329:
324:
321:
319:
316:
314:
311:
309:
306:
304:
301:
299:
296:
295:
292:
287:
284:
282:
279:
277:
274:
272:
269:
268:
265:
260:
257:
255:
252:
250:
247:
245:
242:
241:
238:
233:
230:
229:
226:
221:
218:
216:
213:
212:
209:
204:
201:
199:
196:
195:
192:
187:
184:
183:
180:
175:
172:
170:
167:
166:
163:
158:
155:
153:
152:Crab (cipher)
150:
148:
145:
143:
140:
138:
135:
133:
130:
129:
126:
121:
118:
116:
113:
112:
109:
104:
101:
100:
97:
92:
89:
88:
85:
81:
79:
72:
58:
53:
52:
49:
45:
41:Subcategories
40:
36:
34:
29:
27:
23:
19:
18:block ciphers
318:MMB (cipher)
75:
43:
30:
15:
298:M6 (cipher)
455:Categories
418:Triple DES
391:Spectr-H64
362:Q (cipher)
271:Ladder-DES
120:BassOmatic
396:SXAL/MBAL
323:MultiSwap
259:KN-Cipher
147:COCONUT98
115:BaseKing
413:Treyfer
308:Madryga
340:NewDES
281:LOKI97
249:KeeLoq
244:KASUMI
186:EnRUPT
142:CIKS-1
61:(14 P)
22:broken
430:XXTEA
198:FEA-M
174:DES-X
91:3-Way
350:NUSH
276:LOKI
215:GDES
203:FEAL
379:RC5
374:RC2
86:0–9
457::
80:.
59:
28:.
437:Z
425:X
403:T
386:S
369:R
357:Q
330:N
293:M
266:L
239:K
227:I
210:G
193:F
181:E
164:D
127:C
110:B
98:A
50:D
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.