Whatsapp Telegram Youtube
Service

About the encryption algorithms used

1. GOST 28147—89 - Soviet and

According to some

Since

Advantages of GOST
futility of a force attack (XSL attacks are not taken into account, because they
implementation efficiency and correspondingly high performance on modern

Cryptanalysis

There are attacks

Domestic

In 2004 the group

Criticism of GOST

Basic
it is impossible to determine the cryptographic strength of an algorithm without knowing the substitution table in advance;
implementations of the algorithm from different manufacturers may use different
ability to provide weak replacement tables containing
potential possibility (no prohibition in the standard) of using tables

2. DES - symmetric algorithm

Story

In 1972, after

March 17, 1975

Part of the suspicions

3. Advanced , also known as Rijndael - symmetric algorithm

Story

Need for

Start of the competition

January 2, 1997
block cipher
block length equal to 128 bits
keys with lengths of 128, 192 and 256 bits.

Similar ciphers
use operations that are easily implemented both in hardware (in microchips) and
target 32-bit processors
do not unnecessarily complicate the structure of the cipher so that everything

Besides,

1st and 2nd rounds

August 20, 1998

Third

Third

4.

The algorithm is described

Uses

Algorithm

5. RC4 is a stream cipher

RC4 algorithm

US Length

In 1995 in

The core of the algorithm consists of a key stream generation function.

RC4 - actually

Algorithm

6. RC5 (Ron's Code 5 or Rivest's is a block cipher developed by Ron Rivest from

RC5 algorithm

For effective

For stimulation

7. RC6 - symmetrical

RC6 supports

8. Tiny Encryption Algorithm (TEA) - block encryption algorithm of the “Feistel Network” type, introduced in 1994
XTEA and XXTEA are modified versions of the TEA algorithm, designed to

9. Twofish

Distinctive

Twofish algorithm

10. Serpent

During development

The Serpent cipher is not

eleven. Blowfish (pronounced [blow-fish]) is a cryptographic algorithm that implements

Designed by

Characteristics:
Block size: 64 bits.
Key length: variable, up to 448 bits.
Number of rounds: 16.

According to the application
speed;
simplicity;
compactness;
customizable durability.

12. 3-DES

In 3-DES there was

13. Camellia — symmetric block encryption algorithm (block size 128 bits, key
The structure of the algorithm is based on the classical Feistel chain with preliminary and

14. LOKI97 - This
At the moment it is not widely used, because it has
When developing LOKI97, the features of existing at that time
The LOKI97 cipher is not patented, free for use, positioned by the author
The predecessors are the LOKI89 and LOKI91 algorithms

15. Bass-O-Matic -
The algorithm is based on working with blocks of 256 bytes (2048 bits).
The key schedule uses permutation tables, each permutation contains

16. KolchCrypt III — prototype of a new

17. VigerePlus TEA II - another prototype

18. Cartman - a family of block ciphers.

On the reliability of some of the algorithms used

LUCIFER
In the late 1960s, IBM began a research program on computer cryptography,

DES
DES (Data Encryption Standard) is a symmetric encryption algorithm.

NewDES
NewDES (new DES) was designed in 1985 by Robert Scott

AES
Advanced Encryption Standard (AES), also known as Rijndael -

F.E.A.L.
FEAL was suggested by Akihiro Shimizu and Shoji Miyaguchi

REDOC
REDOC II is a block-based algorithm developed by Michael Wood

REDOC III is a simplified version of REDOC II, also developed

RC5
It is a block cipher developed by Ron Rivest of RSA Security Inc..

IDEA
The first version of the IDEA cipher proposed by Xuejia Lai and James

MMB
Dissatisfaction with IDEA's use of a 64-bit cipher block led to

GOST
GOST 28147-89 - initially Soviet and currently Russian standard

CAST
CAST was developed in Canada by Carlisle Adams and Stafford

BLOWFISH
Blowfish is an algorithm developed by B. Schneier for implementation on large
Blowfish is a 64-bit block cipher with a variable key length.

SAFER
SAFER K-64 stands for Secure And Fast Encryption Routine with a Key of 64 bits -
The algorithm works with a 64-bit block and a 64-bit key.

SAFER K-128
This is a modification of the SAFER algorithm with an alternative way of using the key

The safety of SAFER K-64 remains questionable.

3-WAY
3-Way is a block cipher developed by Joan Daemen.

LOKI97
LOKI97 is a 128-bit 16-round symmetric block cipher with 128-256 -

SEAL
SEAL is a software-efficient stream cipher developed at IBM by Phil

SKIPJACK
Skipjack was developed by the NSA as an encryption algorithm for the Clipper chips and
Full-scale cryptanalysis of Skipjack began after its publication

· In the same year, the authors of the previous work

SQUARE
The Square algorithm is interesting primarily for two reasons.

ENRUPT
An algorithm developed by the talented scientist Marcos el Ruptor.

KHUFU
Khufu is a 64-bit block cipher.

family list tree collection families pedigree cryptographer surnames names phone secret animal genealogical app trees ancestry heritage gallery codes apple microsoft google huawei allsoft xiaomi samsung appstores screenshots amazon linux