Comparison of Stream Ciphers
Stream Cipher |
Creation Date |
Speed (cycles per byte) |
(bits) | Attack | |||
---|---|---|---|---|---|---|---|
Effective Key-Length |
Initialization vector | Internal State |
Best Known | Computational Complexity |
|||
A5/1 | 1989 | Voice (Wphone) | 54 | 114 | 64 | Active KPA OR KPA Time-Memory Tradeoff |
~2 seconds OR 239.91 |
A5/2 | 1989 | Voice (Wphone) | 54 | 114 | 64? | Active | 4.6 milliseconds |
Achterbahn-128/80 | 2006 | 1 (hardware) | 80/128 | 80/128 | 297/351 | Brute force for frame lengths L ≤ 244. Correlation attack for L ≥ 248. | 280 resp. 2128 for L ≤ 244. |
CryptMT | 2005 | Very Fast (Software) | Variable | up to 19968 | 19968 | N/A (2008) | N/A (2008) |
FISH | 1993 | Quite Fast (Wsoft) | Variable | ? | ? | Known-plaintext attack | 211 |
Grain | Pre-2004 | Fast | 80 | 64 | 160 | Key-Derivation | 243 |
HC-256 | Pre-2004 | 4 (WP4) | 256 | 256 | 65536 | ? | ? |
ISAAC | 1996 | 2.375 (W64-bit) - 4.6875 (W32-bit) |
8-8288 usually 40-256 |
N/A | 8288 | (2006) First-round Weak-Internal-State-Derivation |
4.67×101240 (2001) |
MUGI | 1998–2002 | ? | 128 | 128 | 1216 | N/A (2002) | ~282 |
PANAMA | 1998 | 2 | 256 | 128? | 1216? | Hash Collisions (2001) | 282 |
Phelix | Pre-2004 | up to 8 (Wx86) | 256 + a 128-bit Nonce | 128? | ? | Differential (2006) | 237 |
Pike | 1994 | 0.9 x FISH (Wsoft) | Variable | ? | ? | N/A (2004) | N/A (2004) |
Py | Pre-2004 | 2.6 | 8-2048? usually 40-256? |
64 | 8320 | Cryptanalytic Theory (2006) | 275 |
Rabbit | 2003-Feb | 3.7(WP3)-9.7(WARM7) | 128 | 64 | 512 | N/A (2006) | N/A (2006) |
RC4 | 1987 | 7 WP5 | 8-2048 usually 40-256 |
8 | 2064 | Shamir Initial-Bytes Key-Derivation OR KPA | 213 OR 233 |
Salsa20 | Pre-2004 | 4.24 (WG4) - 11.84 (WP4) |
256 | a 64-bit Nonce + a 64-bit stream position | 512 | Probabilistic neutral bits method | 2251 for 8 rounds (2007) |
Scream | 2002 | 4 - 5 (Wsoft) | 128 + a 128-bit Nonce | 32? | 64-bit round function | ? | ? |
SEAL | 1997 | Very Fast (W32-bit) | ? | 32? | ? | ? | ? |
SNOW | Pre-2003 | Very Good (W32-bit) | 128 OR 256 | 32 | ? | ? | ? |
SOBER-128 | 2003 | ? | up to 128 | ? | ? | Message Forge | 2−6 |
SOSEMANUK | Pre-2004 | Very Good (W32-bit) | 128 | 128 | ? | ? | ? |
Trivium | Pre-2004 | 4 (Wx86) - 8 (WLG) | 80 | 80 | 288 | Brute force attack (2006) | 2135 |
Turing | 2000–2003 | 5.5 (Wx86) | ? | 160 | ? | ? | ? |
VEST | 2005 | 42 (WASIC) - 64 (WFPGA) |
Variable usually 80-256 |
Variable usually 80-256 |
256 - 800 | N/A (2006) | N/A (2006) |
WAKE | 1993 | Fast | ? | ? | 8192 | CPA & CCA | Vulnerable |
Stream Cipher |
Creation Date |
Speed (cycles per byte) |
(bits) | Attack | |||
Effective Key-Length |
Initialization vector | Internal State |
Best Known | Computational Complexity |
Read more about this topic: Stream Cipher
Famous quotes containing the words comparison of, comparison and/or stream:
“When we reflect on our past sentiments and affections, our thought is a faithful mirror, and copies its objects truly; but the colours which it employs are faint and dull, in comparison of those in which our original perceptions were clothed.”
—David Hume (17111776)
“Envy and jealousy are the private parts of the human soul. Perhaps the comparison can be extended.”
—Friedrich Nietzsche (18441900)
“A self is, by its very essence, a being with a past. One must look lengthwise backwards in the stream of time in order to see the self, or its shadow, now moving with the stream, now eddying in the currents from bank to bank of its channel, and now strenuously straining onwards in the pursuit of its chosen good.”
—Josiah Royce (18551916)