The most common traffic passwords are RC4. Others include A5/1, A5/2, chameleon, fish, helix, Isaac, mugi, Panama, phelix, Pike, seal, sober, sober-128 and wake.
Stream Cipher |
Creation Date |
Speed (Cycles per byte) |
(BITs) |
Attack |
Valid Key-length |
Initialization Vector |
Internal State |
Best known |
Computational Complexity |
A5/1 |
1989 |
Voice (wphone) |
54 |
114 |
64 |
Active kPa or KPA time-memory tradeoff |
~ 2 seconds or 239.91 |
A5/2 |
1989 |
Voice (wphone) |
54 |
114 |
64? |
Active |
4.6 milliseconds |
Fish |
1993 |
Quite fast (wsoft) |
Huge |
? |
? |
Known-plaintext attack |
211 |
Grain |
Pre-2004 |
Fast |
80 |
64 |
160 |
Key-Derivation |
243 |
HC-256 |
Pre-2004 |
4 (WP4) |
256 |
256 |
65536 |
? |
? |
Isaac |
1996 |
2.375 (W64-bit )- 4.6875 (W32-bit) |
8-8288 Usually 40-256 |
N/ |
8288 |
(2006) first-round Weak-Internal-state-Derivation |
4.67 × 101240 (2001) |
Mugi |
1998-2002 |
? |
128 |
128 |
1216 |
N/A (2002) |
~ 282 |
Panama |
1998 |
2 |
256 |
128? |
1216? |
Hash collisions (2001) |
282 |
Phelix |
Pre-2004 |
Up to 8 (wx86) |
256 + A 128-bit Nonce |
128? |
? |
Differential (0, 2006) |
237 |
Pike |
1994 |
0.9 x fish (wsoft) |
Huge |
? |
? |
N/A (2004) |
N/A (2004) |
PY |
Pre-2004 |
2.6 |
8-2048? Usually 40-256? |
64 |
8320 |
Cryptanalytic theory (2006) |
275 |
Rabbit |
2003-feb |
3.7 (WP3)-9.7 (warm7) |
128 |
64 |
512 |
N/A (2006) |
N/A (2006) |
RC4 |
1987 |
Impressive |
8-2048 Usually 40-256 |
8 |
2064 |
Shamir initial-bytes key-Derivation or kPa |
213 or 233 |
Salsa20 |
Pre-2004 |
4.24 (WG4 )- 11.84 (WP4) |
128 + a 64-bit Nonce |
512 |
512 + 384 (Key + iv + index) |
Differential (0, 2005) |
N/A (2005) |
Scream |
2002 |
4-5 (wsoft) |
128 + A 128-bit Nonce |
32? |
64-bit Round Function |
? |
? |
Seal |
1997 |
Very fast (W32-bit) |
? |
32? |
? |
? |
? |
Snow |
Pre-2003 |
Very good (W32-bit) |
128 or 256 |
32 |
? |
? |
? |
Sober-128 |
2003 |
? |
Up to 128 |
? |
? |
Message forge |
2-6 |
Sosemanuk |
Pre-2004 |
Very good (W32-bit) |
128 |
128 |
? |
? |
? |
Trivium |
Pre-2004 |
4 (wx86)-8 (wlg) |
80 |
80 |
288 |
Brute force attack (2006) |
2135 |
Turing |
2000-2003 |
5.5 (wx86) |
? |
160 |
? |
? |
? |
Vest |
2005 |
42 (wasic )- 64 (wfpga) |
Variable Usually 80-256 |
Variable Usually 80-256 |
256-800 |
N/A (2006) |
N/A (2006) |
Wake |
1993 |
Fast |
? |
? |
8192 |
CPA & CCA |
Vulnerable |
Stream Cipher |
Creation Date |
Speed (Cycles per byte) |
(BITs) |
Attack |
Valid Key-length |
Initialization Vector |
Internal State |
Best known |
Computational Complexity |