Encryption by date

Last updated

This is a timeline of the public releases or introductions of computer encryption algorithms.

CipherYearKey sizeBlock sizeRounds
Lucifer 197148various
New Data Seal 1975204812816
DES-X 1976184
DES 1977566416
GDES 198132
Madryga 1984
NewDES 19851206417
Multi2 19886464various
Khufu 19895126416
LOKI97 1989646416
FEAL 19906464"4,8,32"
Redoc 1990160160?
IDEA 1991128648.5
BassOmatic 19918 to 204820481 to 8
CMEA 19916416-643
Blowfish 19931-4486416
Crab 1993808192
MMB 19931281286
SAFER 199364128?
SXAL/MBAL 199364648
RC5 19940-204032/64/1281-255
TEA 199412864"64,32"
3-Way 1994969611
BaseKing 199419219211
GOST 19942566432
Ladder-DES 19942241284
MacGuffin 19941286432
RC4 199442-482064256
BATON 199532096128
KN-Cipher 1995198646
Misty1 1995128644*n
S-1 1995hoaxhoaxhoax
CAST-128 199640/1286412 or 16
RC2 19968-1286416
Akelarre 19961281284
Shark 1996128646
Red Pike 19966464?
XTEA 199712864"64,32"
ICE 19976464"16,8"
M6 199740-646410
Square 19971281288
Treyfer 1997646432
xmx 1997variablekey sizevariable even
AES 1998128/192/25612810/12/2014
Triple DES 1998168/112/566448
Serpent 1998128/192/25612832
Twofish 1998128/192/25612816
SEED 199812812816
Skipjack 1998806432
CAST-256 1998"128,160,192,224,256"12848
CIPHERUNICORN-E 19981286416
Coconut98 1998256648
Crypton 1998128,192,25612812
CS-Cipher 1998128648
DEAL 1998128/192/256128"6,8"
DFC1998128/192/2561288
E2 1998128/192/25612812
FROG 1998128/192/2561288
LOKI97 1998128/192/25612816
Magenta 1998128/192/256128"6,8"
MARS 1998128/192/25612832
RC6 1998128/192/25612820
xxtea 199812864various
M8 19996410
MultiSwap 199937464
UES 1999128/192/25612848
Camellia 2000128/192/25612818 or 24
Anubis 200012832012812+
CIPHERUNICORN-A 2000128/192/25612816
Hierocrypt 2000128646.5
Kasumi 2000
Khazad 2000128648
Mercy 200012840966
Nimbus 2000128645
Noekeon 2000128128128
NUSH 2000128/192/25664128256"9,17,33"
Q 2000128/192/2561288 or 9
SC2000 2000128/192/256128"6.5,7.5"
Zodiac 2000128/192/25612816
FEA-M 2001409440961
Shacal 2001128 to 512"160, 256"80
Spectr-H64 20012566412
ABC 200251225617
CIKS-1 2002256648
MESH 2002128/192/256"64, 96,128""8.5,10.5,12.5"
ARIA 2003128/192/256128"12,14,16"
Cryptomeria cipher 2003566410
Idea NXT 20030-2566412816
SMS4 200612812832
CLEFIA (Sony) 2007128/192/256128"18,22,26"
Threefish 2008"256,512,1024""256,512,1024"72
BEAR/LION ?2^13 to 2^233
Libelle ?64160"1,8,16,32,64"
KeeLoq 1990s
Hasty Pudding Cipher 1998–20060-513+varies
Saville 1999?128??
Intel Cascade Cipher 2005?128128"10,32"
Cobra 2007????

Related Research Articles

Data Encryption Standard Early unclassified symmetric-key block cipher

The Data Encryption Standard is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for applications, it has been highly influential in the advancement of cryptography.

In cryptography, 3-Way is a block cipher designed in 1994 by Joan Daemen. It is closely related to BaseKing; the two are variants of the same general cipher technique.

In cryptography, Camellia is a symmetric key block cipher with a block size of 128 bits and key sizes of 128, 192 and 256 bits. It was jointly developed by Mitsubishi Electric and NTT of Japan. The cipher has been approved for use by the ISO/IEC, the European Union's NESSIE project and the Japanese CRYPTREC project. The cipher has security levels and processing abilities comparable to the Advanced Encryption Standard.

In cryptography, KHAZAD is a block cipher designed by Paulo S. L. M. Barreto together with Vincent Rijmen, one of the designers of the Advanced Encryption Standard (Rijndael). KHAZAD is named after Khazad-dûm, the fictional dwarven realm in the writings of J. R. R. Tolkien. KHAZAD was presented at the first NESSIE workshop in 2000, and, after some small changes, was selected as a finalist in the project.

In cryptography, SHARK is a block cipher identified as one of the predecessors of Rijndael.

DES-X

In cryptography, DES-X is a variant on the DES symmetric-key block cipher intended to increase the complexity of a brute-force attack using a technique called key whitening.

In cryptography, Khufu and Khafre are two block ciphers designed by Ralph Merkle in 1989 while working at Xerox's Palo Alto Research Center. Along with Snefru, a cryptographic hash function, the ciphers were named after the Egyptian Pharaohs Khufu, Khafre and Sneferu.

In cryptography, LOKI89 and LOKI91 are symmetric-key block ciphers designed as possible replacements for the Data Encryption Standard (DES). The ciphers were developed based on a body of work analysing DES, and are very similar to DES in structure. The LOKI algorithms were named for Loki, the god of mischief in Norse mythology.

DEAL

In cryptography, DEAL is a symmetric block cipher derived from the Data Encryption Standard (DES). The design was proposed in a report by Lars Knudsen in 1998, and was submitted to the AES contest by Richard Outerbridge.

MacGuffin (cipher)

In cryptography, MacGuffin is a block cipher created in 1994 by Bruce Schneier and Matt Blaze at a Fast Software Encryption workshop. It was intended as a catalyst for analysis of a new cipher structure, known as Generalized Unbalanced Feistel Networks (GUFNs). The cryptanalysis proceeded very quickly, so quickly that the cipher was broken at the same workshop by Vincent Rijmen and Bart Preneel.

Boomerang attack

In cryptography, the boomerang attack is a method for the cryptanalysis of block ciphers based on differential cryptanalysis. The attack was published in 1999 by David Wagner, who used it to break the COCONUT98 cipher.

In cryptography, impossible differential cryptanalysis is a form of differential cryptanalysis for block ciphers. While ordinary differential cryptanalysis tracks differences that propagate through the cipher with greater than expected probability, impossible differential cryptanalysis exploits differences that are impossible at some intermediate state of the cipher algorithm.

In cryptography, integral cryptanalysis is a cryptanalytic attack that is particularly applicable to block ciphers based on substitution–permutation networks. It was originally designed by Lars Knudsen as a dedicated attack against Square, so it is commonly known as the Square attack. It was also extended to a few other ciphers related to Square: CRYPTON, Rijndael, and SHARK. Stefan Lucks generalized the attack to what he called a saturation attack and used it to attack Twofish, which is not at all similar to Square, having a radically different Feistel network structure. Forms of integral cryptanalysis have since been applied to a variety of ciphers, including Hierocrypt, IDEA, Camellia, Skipjack, MISTY1, MISTY2, SAFER++, KHAZAD, and FOX.

In cryptography, BaseKing is a block cipher designed in 1994 by Joan Daemen. It is very closely related to 3-Way, as the two are variants of the same general cipher technique.

In cryptography, M6 is a block cipher proposed by Hitachi in 1997 for use in the IEEE 1394 FireWire standard. The design allows some freedom in choosing a few of the cipher's operations, so M6 is considered a family of ciphers.

In cryptography, KN-Cipher is a block cipher created by Kaisa Nyberg and Lars Knudsen in 1995. One of the first ciphers designed to be provably secure against ordinary differential cryptanalysis, KN-Cipher was later broken using higher order differential cryptanalysis.

In cryptography, truncated differential cryptanalysis is a generalization of differential cryptanalysis, an attack against block ciphers. Lars Knudsen developed the technique in 1994. Whereas ordinary differential cryptanalysis analyzes the full difference between two texts, the truncated variant considers differences that are only partially determined. That is, the attack makes predictions of only some of the bits instead of the full block. This technique has been applied to SAFER, IDEA, Skipjack, E2, Twofish, Camellia, CRYPTON, and even the stream cipher Salsa20.

In cryptography, M8 is a block cipher designed by Hitachi in 1999. The algorithm negotiates introduced in 1997 M6, with the modified key length, which is enlarged to 64 bits or more. This cipher operates with Feistel network and designed to reach high performance on small implementation or 32 bits devices. For instance, by using round numbers = 10 it present encryption speed at 32 Mbps for dedicated hardware of 6K gates and 25 MHz clock or 208 Mbps for program, that uses C-language and Pentium-I 266 MHz. Due to the openness of description, it should not be used in open or multivendor software.

In cryptography, decorrelation theory is a system developed by Serge Vaudenay in 1998 for designing block ciphers to be provably secure against differential cryptanalysis, linear cryptanalysis, and even undiscovered cryptanalytic attacks meeting certain broad criteria. Ciphers designed using these principles include COCONUT98 and the AES candidate DFC, both of which have been shown to be vulnerable to some forms of cryptanalysis not covered by the theory.

In cryptography, MultiSwap is a block cipher/MAC created by Microsoft in 1999 as part of its Windows Media DRM service (WMDRM). Microsoft's internal name for the algorithm is not publicly known; it was dubbed MultiSwap in a 2001 report on WMDRM under the pseudonym "Beale Screamer".

References