Stream password table

Source: Internet
Author: User

The most common traffic passwords are RC4. Others include A5/1, A5/2, chameleon, fish, helix, Isaac, mugi, Panama, phelix, Pike, seal, sober, sober-128 and wake.

 

 

 

 

Stream
Cipher
Creation
Date
Speed
(Cycles per byte)
(BITs) Attack
Valid
Key-length
Initialization Vector Internal
State
Best known Computational
Complexity
A5/1 1989 Voice (wphone) 54 114 64 Active kPa or
KPA time-memory tradeoff
~ 2 seconds or
239.91
A5/2 1989 Voice (wphone) 54 114 64? Active 4.6 milliseconds
Fish 1993 Quite fast (wsoft) Huge ? ? Known-plaintext attack 211
Grain Pre-2004 Fast 80 64 160 Key-Derivation 243
HC-256 Pre-2004 4 (WP4) 256 256 65536 ? ?
Isaac 1996 2.375 (W64-bit )-
4.6875 (W32-bit)
8-8288
Usually 40-256
N/ 8288 (2006) first-round
Weak-Internal-state-Derivation
4.67 × 101240 (2001)
Mugi 1998-2002 ? 128 128 1216 N/A (2002) ~ 282
Panama 1998 2 256 128? 1216? Hash collisions (2001) 282
Phelix Pre-2004 Up to 8 (wx86) 256 + A 128-bit Nonce 128? ? Differential (0, 2006) 237
Pike 1994 0.9 x fish (wsoft) Huge ? ? N/A (2004) N/A (2004)
PY Pre-2004 2.6 8-2048?
Usually 40-256?
64 8320 Cryptanalytic theory (2006) 275
Rabbit 2003-feb 3.7 (WP3)-9.7 (warm7) 128 64 512 N/A (2006) N/A (2006)
RC4 1987 Impressive 8-2048
Usually 40-256
8 2064 Shamir initial-bytes key-Derivation or kPa 213 or 233
Salsa20 Pre-2004 4.24 (WG4 )-
11.84 (WP4)
128 + a 64-bit Nonce 512 512 + 384 (Key + iv + index) Differential (0, 2005) N/A (2005)
Scream 2002 4-5 (wsoft) 128 + A 128-bit Nonce 32? 64-bit Round Function ? ?
Seal 1997 Very fast (W32-bit) ? 32? ? ? ?
Snow Pre-2003 Very good (W32-bit) 128 or 256 32 ? ? ?
Sober-128 2003 ? Up to 128 ? ? Message forge 2-6
Sosemanuk Pre-2004 Very good (W32-bit) 128 128 ? ? ?
Trivium Pre-2004 4 (wx86)-8 (wlg) 80 80 288 Brute force attack (2006) 2135
Turing 2000-2003 5.5 (wx86) ? 160 ? ? ?
Vest 2005 42 (wasic )-
64 (wfpga)
Variable
Usually 80-256
Variable
Usually 80-256
256-800 N/A (2006) N/A (2006)
Wake 1993 Fast ? ? 8192 CPA & CCA Vulnerable
Stream
Cipher
Creation
Date
Speed
(Cycles per byte)
(BITs) Attack
Valid
Key-length
Initialization Vector Internal
State
Best known Computational
Complexity

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.