Knowledge

Category:Broken block ciphers

Source 📝

77: 31:
Note that most cryptanalytic attacks against ciphers are still too complex to apply in practice. Widely cryptanalysed ciphers like
465: 231: 131: 56: 32: 35:
are considered stronger than un-cryptanalysed ciphers even if there are impractical attacks against them.
407: 168: 460: 24:. "Broken" here means that there is a published attack that is computationally faster than a 8: 219: 302: 156: 25: 136: 102: 285: 253: 441: 344: 60: 312: 454: 334: 151: 21: 317: 17: 297: 417: 390: 361: 270: 119: 395: 322: 258: 146: 114: 412: 307: 339: 280: 248: 243: 185: 141: 76:
The following 46 pages are in this category, out of 46 total.
429: 197: 173: 90: 349: 275: 214: 202: 378: 373: 44:This category has only the following subcategory. 452: 78:This list may not reflect recent changes 73:Pages in category "Broken block ciphers" 232:International Data Encryption Algorithm 453: 132:Cellular Message Encryption Algorithm 39: 13: 82: 46: 38: 14: 477: 466:Broken cryptography algorithms 1: 71: 33:Advanced Encryption Standard 7: 10: 482: 408:Tiny Encryption Algorithm 169:Data Encryption Standard 57:Data Encryption Standard 16:This is a category for 220:GOST (block cipher) 303:MacGuffin (cipher) 157:Cryptomeria cipher 26:brute force attack 137:Churning (cipher) 103:Akelarre (cipher) 473: 286:Lucifer (cipher) 254:Khufu and Khafre 62: 481: 480: 476: 475: 474: 472: 471: 470: 451: 450: 449: 448: 447: 446: 442:Zodiac (cipher) 434: 422: 400: 383: 366: 354: 345:Nimbus (cipher) 327: 290: 263: 236: 224: 207: 190: 178: 161: 124: 107: 95: 70: 69: 68: 67: 64: 63: 37: 20:that have been 12: 11: 5: 479: 469: 468: 463: 445: 444: 438: 435: 433: 432: 426: 423: 421: 420: 415: 410: 404: 401: 399: 398: 393: 387: 384: 382: 381: 376: 370: 367: 365: 364: 358: 355: 353: 352: 347: 342: 337: 331: 328: 326: 325: 320: 315: 313:Mercy (cipher) 310: 305: 300: 294: 291: 289: 288: 283: 278: 273: 267: 264: 262: 261: 256: 251: 246: 240: 237: 235: 234: 228: 225: 223: 222: 217: 211: 208: 206: 205: 200: 194: 191: 189: 188: 182: 179: 177: 176: 171: 165: 162: 160: 159: 154: 149: 144: 139: 134: 128: 125: 123: 122: 117: 111: 108: 106: 105: 99: 96: 94: 93: 87: 84: 83: 74: 66: 65: 55: 54: 51: 48: 47: 42: 9: 6: 4: 3: 2: 478: 467: 464: 462: 461:Block ciphers 459: 458: 456: 443: 440: 439: 436: 431: 428: 427: 424: 419: 416: 414: 411: 409: 406: 405: 402: 397: 394: 392: 389: 388: 385: 380: 377: 375: 372: 371: 368: 363: 360: 359: 356: 351: 348: 346: 343: 341: 338: 336: 335:New Data Seal 333: 332: 329: 324: 321: 319: 316: 314: 311: 309: 306: 304: 301: 299: 296: 295: 292: 287: 284: 282: 279: 277: 274: 272: 269: 268: 265: 260: 257: 255: 252: 250: 247: 245: 242: 241: 238: 233: 230: 229: 226: 221: 218: 216: 213: 212: 209: 204: 201: 199: 196: 195: 192: 187: 184: 183: 180: 175: 172: 170: 167: 166: 163: 158: 155: 153: 152:Crab (cipher) 150: 148: 145: 143: 140: 138: 135: 133: 130: 129: 126: 121: 118: 116: 113: 112: 109: 104: 101: 100: 97: 92: 89: 88: 85: 81: 79: 72: 58: 53: 52: 49: 45: 41:Subcategories 40: 36: 34: 29: 27: 23: 19: 18:block ciphers 318:MMB (cipher) 75: 43: 30: 15: 298:M6 (cipher) 455:Categories 418:Triple DES 391:Spectr-H64 362:Q (cipher) 271:Ladder-DES 120:BassOmatic 396:SXAL/MBAL 323:MultiSwap 259:KN-Cipher 147:COCONUT98 115:BaseKing 413:Treyfer 308:Madryga 340:NewDES 281:LOKI97 249:KeeLoq 244:KASUMI 186:EnRUPT 142:CIKS-1 61:(14 P) 22:broken 430:XXTEA 198:FEA-M 174:DES-X 91:3-Way 350:NUSH 276:LOKI 215:GDES 203:FEAL 379:RC5 374:RC2 86:0–9 457:: 80:. 59:‎ 28:. 437:Z 425:X 403:T 386:S 369:R 357:Q 330:N 293:M 266:L 239:K 227:I 210:G 193:F 181:E 164:D 127:C 110:B 98:A 50:D

Index

block ciphers
broken
brute force attack
Advanced Encryption Standard
Data Encryption Standard
This list may not reflect recent changes
3-Way
Akelarre (cipher)
BaseKing
BassOmatic
Cellular Message Encryption Algorithm
Churning (cipher)
CIKS-1
COCONUT98
Crab (cipher)
Cryptomeria cipher
Data Encryption Standard
DES-X
EnRUPT
FEA-M
FEAL
GDES
GOST (block cipher)
International Data Encryption Algorithm
KASUMI
KeeLoq
Khufu and Khafre
KN-Cipher
Ladder-DES
LOKI

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.