1631:
1659:
25:
224:
The algorithm uses a key length between 0 and 128 bits (length must be a multiple of 8 bits). By default, the cipher uses 128 bits. It operates on blocks of 64 bits using an 8-round
1611:
1441:
1294:
1229:
310:
35:
1056:
412:
1696:
1046:
540:
947:
1209:
1183:
1051:
1024:
1287:
1193:
303:
1072:
1490:
1250:
50:
255:
1280:
340:
93:
1725:
1606:
1561:
1374:
1136:
296:
241:
65:
1485:
1153:
1063:
1041:
354:
1689:
1601:
1158:
1014:
967:
442:
237:
162:
72:
1720:
1591:
1581:
1436:
1224:
1106:
981:
350:
1586:
1576:
1379:
1339:
1332:
1322:
1317:
1163:
952:
323:
229:
79:
1715:
1327:
1255:
1131:
1126:
1078:
233:
927:
1634:
1480:
1426:
1245:
1068:
505:
61:
1682:
1596:
1520:
1148:
1031:
957:
640:
620:
182:
1359:
1111:
1088:
407:
1465:
1449:
1396:
1096:
1004:
716:
645:
615:
560:
1525:
1515:
1386:
816:
515:
475:
470:
437:
397:
345:
1666:
1460:
1188:
1083:
962:
821:
701:
670:
364:
1035:
1019:
1008:
942:
901:
866:
796:
776:
650:
530:
525:
480:
225:
1535:
1455:
1416:
1364:
1349:
1173:
1121:
932:
917:
856:
851:
736:
485:
214:
175:
132:
86:
1709:
1616:
1571:
1530:
1510:
1406:
1369:
1344:
1168:
1116:
995:
977:
766:
741:
731:
555:
545:
392:
210:
128:
1566:
1411:
1401:
1391:
1354:
1303:
1101:
922:
886:
751:
630:
585:
417:
369:
319:
206:
194:
1545:
711:
706:
590:
259:
24:
1505:
1475:
1470:
1431:
1143:
861:
801:
685:
680:
625:
495:
358:
264:
1495:
876:
871:
761:
675:
550:
1658:
1540:
1500:
1214:
1178:
972:
635:
510:
490:
402:
152:
881:
831:
791:
781:
726:
721:
565:
374:
1421:
1219:
841:
836:
771:
756:
746:
691:
665:
660:
655:
535:
520:
218:
937:
896:
846:
826:
811:
600:
580:
500:
465:
786:
695:
610:
605:
595:
575:
447:
432:
1276:
292:
891:
806:
427:
422:
18:
42:
1670:
46:
1442:
Cryptographically secure pseudorandom number generator
280:
1554:
1310:
1238:
1202:
991:
910:
456:
383:
331:
181:
171:
161:
151:
146:
138:
124:
119:
1690:
1288:
304:
8:
114:
51:introducing citations to additional sources
1697:
1683:
1295:
1281:
1273:
311:
297:
289:
285:
281:
41:Relevant discussion may be found on the
1665:This cryptography-related article is a
113:
232:. The round function is based on the
7:
1655:
1653:
1669:. You can help Knowledge (XXG) by
14:
236:and uses the binary expansion of
217:in 1998. It was submitted to the
1657:
1630:
1629:
34:relies largely or entirely on a
23:
221:project, but was not selected.
1491:Information-theoretic security
254:J. Stern, S. Vaudenay (1998).
1:
242:nothing up my sleeve numbers
1607:Message authentication code
1562:Cryptographic hash function
1375:Cryptographic hash function
228:and is optimized for 8-bit
1742:
1652:
1486:Harvest now, decrypt later
1625:
1602:Post-quantum cryptography
1272:
1194:Time/memory/data tradeoff
288:
284:
1592:Quantum key distribution
1582:Authenticated encryption
1437:Random number generation
982:Whitening transformation
1587:Public-key cryptography
1577:Symmetric-key algorithm
1380:Key derivation function
1340:Cryptographic primitive
1333:Authentication protocol
1323:Outline of cryptography
1318:History of cryptography
953:Confusion and diffusion
1328:Cryptographic protocol
234:fast Fourier transform
203:Chiffrement Symétrique
1481:End-to-end encryption
1427:Cryptojacking malware
1246:Initialization vector
1597:Quantum cryptography
1521:Trusted timestamping
1025:3-subset MITM attack
641:Intel Cascade Cipher
621:Hasty Pudding cipher
47:improve this article
1360:Cryptographic nonce
1064:Differential-linear
116:
1726:Cryptography stubs
1466:Subliminal channel
1450:Pseudorandom noise
1397:Key (cryptography)
1137:Differential-fault
355:internal mechanics
1678:
1677:
1647:
1646:
1643:
1642:
1526:Key-based routing
1516:Trapdoor function
1387:Digital signature
1268:
1267:
1264:
1263:
1251:Mode of operation
928:Lai–Massey scheme
191:
190:
112:
111:
97:
1733:
1699:
1692:
1685:
1661:
1654:
1633:
1632:
1461:Insecure channel
1297:
1290:
1283:
1274:
1122:Power-monitoring
963:Avalanche effect
671:Khufu and Khafre
324:security summary
313:
306:
299:
290:
286:
282:
277:
275:
274:
268:
258:. Archived from
240:as a source of "
117:
107:
104:
98:
96:
55:
27:
19:
1741:
1740:
1736:
1735:
1734:
1732:
1731:
1730:
1721:Feistel ciphers
1706:
1705:
1704:
1703:
1650:
1648:
1639:
1621:
1550:
1306:
1301:
1260:
1234:
1203:Standardization
1198:
1127:Electromagnetic
1079:Integral/Square
1036:Piling-up lemma
1020:Biclique attack
1009:EFF DES cracker
993:
987:
918:Feistel network
906:
531:CIPHERUNICORN-E
526:CIPHERUNICORN-A
458:
452:
385:
379:
333:
327:
317:
272:
270:
262:
253:
250:
226:Feistel network
176:Feistel network
139:First published
108:
102:
99:
56:
54:
40:
28:
17:
12:
11:
5:
1739:
1737:
1729:
1728:
1723:
1718:
1708:
1707:
1702:
1701:
1694:
1687:
1679:
1676:
1675:
1662:
1645:
1644:
1641:
1640:
1638:
1637:
1626:
1623:
1622:
1620:
1619:
1614:
1612:Random numbers
1609:
1604:
1599:
1594:
1589:
1584:
1579:
1574:
1569:
1564:
1558:
1556:
1552:
1551:
1549:
1548:
1543:
1538:
1536:Garlic routing
1533:
1528:
1523:
1518:
1513:
1508:
1503:
1498:
1493:
1488:
1483:
1478:
1473:
1468:
1463:
1458:
1456:Secure channel
1453:
1447:
1446:
1445:
1434:
1429:
1424:
1419:
1417:Key stretching
1414:
1409:
1404:
1399:
1394:
1389:
1384:
1383:
1382:
1377:
1367:
1365:Cryptovirology
1362:
1357:
1352:
1350:Cryptocurrency
1347:
1342:
1337:
1336:
1335:
1325:
1320:
1314:
1312:
1308:
1307:
1302:
1300:
1299:
1292:
1285:
1277:
1270:
1269:
1266:
1265:
1262:
1261:
1259:
1258:
1253:
1248:
1242:
1240:
1236:
1235:
1233:
1232:
1227:
1222:
1217:
1212:
1206:
1204:
1200:
1199:
1197:
1196:
1191:
1186:
1181:
1176:
1171:
1166:
1161:
1156:
1151:
1146:
1141:
1140:
1139:
1134:
1129:
1124:
1119:
1109:
1104:
1099:
1094:
1086:
1081:
1076:
1069:Distinguishing
1066:
1061:
1060:
1059:
1054:
1049:
1039:
1029:
1028:
1027:
1022:
1012:
1001:
999:
989:
988:
986:
985:
975:
970:
965:
960:
955:
950:
945:
940:
935:
933:Product cipher
930:
925:
920:
914:
912:
908:
907:
905:
904:
899:
894:
889:
884:
879:
874:
869:
864:
859:
854:
849:
844:
839:
834:
829:
824:
819:
814:
809:
804:
799:
794:
789:
784:
779:
774:
769:
764:
759:
754:
749:
744:
739:
734:
729:
724:
719:
714:
709:
704:
699:
688:
683:
678:
673:
668:
663:
658:
653:
648:
643:
638:
633:
628:
623:
618:
613:
608:
603:
598:
593:
588:
583:
578:
573:
568:
563:
561:Cryptomeria/C2
558:
553:
548:
543:
538:
533:
528:
523:
518:
513:
508:
503:
498:
493:
488:
483:
478:
473:
468:
462:
460:
454:
453:
451:
450:
445:
440:
435:
430:
425:
420:
415:
410:
405:
400:
395:
389:
387:
381:
380:
378:
377:
372:
367:
362:
348:
343:
337:
335:
329:
328:
318:
316:
315:
308:
301:
293:
279:
278:
249:
246:
215:Serge Vaudenay
189:
188:
185:
179:
178:
173:
169:
168:
165:
159:
158:
155:
149:
148:
144:
143:
140:
136:
135:
133:Serge Vaudenay
126:
122:
121:
110:
109:
45:. Please help
31:
29:
22:
15:
13:
10:
9:
6:
4:
3:
2:
1738:
1727:
1724:
1722:
1719:
1717:
1716:Block ciphers
1714:
1713:
1711:
1700:
1695:
1693:
1688:
1686:
1681:
1680:
1674:
1672:
1668:
1663:
1660:
1656:
1651:
1636:
1628:
1627:
1624:
1618:
1617:Steganography
1615:
1613:
1610:
1608:
1605:
1603:
1600:
1598:
1595:
1593:
1590:
1588:
1585:
1583:
1580:
1578:
1575:
1573:
1572:Stream cipher
1570:
1568:
1565:
1563:
1560:
1559:
1557:
1553:
1547:
1544:
1542:
1539:
1537:
1534:
1532:
1531:Onion routing
1529:
1527:
1524:
1522:
1519:
1517:
1514:
1512:
1511:Shared secret
1509:
1507:
1504:
1502:
1499:
1497:
1494:
1492:
1489:
1487:
1484:
1482:
1479:
1477:
1474:
1472:
1469:
1467:
1464:
1462:
1459:
1457:
1454:
1451:
1448:
1443:
1440:
1439:
1438:
1435:
1433:
1430:
1428:
1425:
1423:
1420:
1418:
1415:
1413:
1410:
1408:
1407:Key generator
1405:
1403:
1400:
1398:
1395:
1393:
1390:
1388:
1385:
1381:
1378:
1376:
1373:
1372:
1371:
1370:Hash function
1368:
1366:
1363:
1361:
1358:
1356:
1353:
1351:
1348:
1346:
1345:Cryptanalysis
1343:
1341:
1338:
1334:
1331:
1330:
1329:
1326:
1324:
1321:
1319:
1316:
1315:
1313:
1309:
1305:
1298:
1293:
1291:
1286:
1284:
1279:
1278:
1275:
1271:
1257:
1254:
1252:
1249:
1247:
1244:
1243:
1241:
1237:
1231:
1228:
1226:
1223:
1221:
1218:
1216:
1213:
1211:
1208:
1207:
1205:
1201:
1195:
1192:
1190:
1187:
1185:
1182:
1180:
1177:
1175:
1172:
1170:
1167:
1165:
1162:
1160:
1157:
1155:
1152:
1150:
1149:Interpolation
1147:
1145:
1142:
1138:
1135:
1133:
1130:
1128:
1125:
1123:
1120:
1118:
1115:
1114:
1113:
1110:
1108:
1105:
1103:
1100:
1098:
1095:
1093:
1092:
1087:
1085:
1082:
1080:
1077:
1074:
1070:
1067:
1065:
1062:
1058:
1055:
1053:
1050:
1048:
1045:
1044:
1043:
1040:
1037:
1033:
1030:
1026:
1023:
1021:
1018:
1017:
1016:
1013:
1010:
1006:
1003:
1002:
1000:
997:
996:cryptanalysis
990:
983:
979:
978:Key whitening
976:
974:
971:
969:
966:
964:
961:
959:
956:
954:
951:
949:
946:
944:
941:
939:
936:
934:
931:
929:
926:
924:
921:
919:
916:
915:
913:
909:
903:
900:
898:
895:
893:
890:
888:
885:
883:
880:
878:
875:
873:
870:
868:
865:
863:
860:
858:
855:
853:
850:
848:
845:
843:
840:
838:
835:
833:
830:
828:
825:
823:
820:
818:
815:
813:
810:
808:
805:
803:
800:
798:
795:
793:
790:
788:
785:
783:
780:
778:
775:
773:
770:
768:
767:New Data Seal
765:
763:
760:
758:
755:
753:
750:
748:
745:
743:
740:
738:
735:
733:
730:
728:
725:
723:
720:
718:
715:
713:
710:
708:
705:
703:
700:
697:
693:
689:
687:
684:
682:
679:
677:
674:
672:
669:
667:
664:
662:
659:
657:
654:
652:
649:
647:
644:
642:
639:
637:
634:
632:
629:
627:
624:
622:
619:
617:
614:
612:
609:
607:
604:
602:
599:
597:
594:
592:
589:
587:
584:
582:
579:
577:
574:
572:
569:
567:
564:
562:
559:
557:
554:
552:
549:
547:
544:
542:
539:
537:
534:
532:
529:
527:
524:
522:
519:
517:
514:
512:
509:
507:
506:BEAR and LION
504:
502:
499:
497:
494:
492:
489:
487:
484:
482:
479:
477:
474:
472:
469:
467:
464:
463:
461:
455:
449:
446:
444:
441:
439:
436:
434:
431:
429:
426:
424:
421:
419:
416:
414:
411:
409:
406:
404:
401:
399:
396:
394:
391:
390:
388:
382:
376:
373:
371:
368:
366:
363:
360:
356:
352:
349:
347:
344:
342:
339:
338:
336:
330:
325:
321:
320:Block ciphers
314:
309:
307:
302:
300:
295:
294:
291:
287:
283:
269:on 2004-11-27
266:
261:
257:
252:
251:
247:
245:
243:
239:
235:
231:
227:
222:
220:
216:
212:
211:Jacques Stern
208:
204:
200:
196:
186:
184:
180:
177:
174:
170:
166:
164:
160:
156:
154:
150:
147:Cipher detail
145:
141:
137:
134:
130:
129:Jacques Stern
127:
123:
118:
106:
95:
92:
88:
85:
81:
78:
74:
71:
67:
64: –
63:
59:
58:Find sources:
52:
48:
44:
38:
37:
36:single source
32:This article
30:
26:
21:
20:
1671:expanding it
1664:
1649:
1567:Block cipher
1412:Key schedule
1402:Key exchange
1392:Kleptography
1355:Cryptosystem
1304:Cryptography
1154:Partitioning
1112:Side-channel
1090:
1057:Higher-order
1042:Differential
923:Key schedule
570:
271:. Retrieved
260:the original
223:
209:invented by
207:block cipher
202:
198:
195:cryptography
192:
100:
90:
83:
76:
69:
57:
33:
16:Block cipher
1555:Mathematics
1546:Mix network
1239:Utilization
1225:NSA Suite B
1210:AES process
1159:Rubber-hose
1097:Related-key
1005:Brute-force
384:Less common
256:"CS-Cipher"
163:Block sizes
62:"CS-Cipher"
1710:Categories
1506:Ciphertext
1476:Decryption
1471:Encryption
1432:Ransomware
1189:Chi-square
1107:Rotational
1047:Impossible
968:Block size
862:Spectr-H64
686:Ladder-DES
681:Kuznyechik
626:Hierocrypt
496:BassOmatic
459:algorithms
386:algorithms
359:Triple DES
334:algorithms
273:2007-02-15
265:PostScript
248:References
230:processors
103:April 2024
73:newspapers
1496:Plaintext
1164:Black-bag
1084:Boomerang
1073:Known-key
1052:Truncated
877:Threefish
872:SXAL/MBAL
762:MultiSwap
717:MacGuffin
676:KN-Cipher
616:Grand Cru
571:CS-Cipher
551:COCONUT98
199:CS-Cipher
172:Structure
153:Key sizes
125:Designers
115:CS-Cipher
43:talk page
1635:Category
1541:Kademlia
1501:Codetext
1444:(CSPRNG)
1215:CRYPTREC
1179:Weak key
1132:Acoustic
973:Key size
817:Red Pike
636:IDEA NXT
516:Chiasmus
511:CAST-256
491:BaseKing
476:Akelarre
471:Adiantum
438:Skipjack
403:CAST-128
398:Camellia
346:Blowfish
157:128 bits
1311:General
1256:Padding
1174:Rebound
882:Treyfer
832:SAVILLE
792:PRESENT
782:NOEKEON
727:MAGENTA
722:Madryga
702:Lucifer
566:CRYPTON
375:Twofish
365:Serpent
205:) is a
167:64 bits
120:General
87:scholar
1422:Keygen
1220:NESSIE
1169:Davies
1117:Timing
1032:Linear
992:Attack
911:Design
902:Zodiac
867:Square
842:SHACAL
837:SC2000
797:Prince
777:Nimbus
772:NewDES
757:MULTI2
747:MISTY1
690:LOKI (
666:KHAZAD
661:KeeLoq
656:KASUMI
651:Kalyna
536:CLEFIA
521:CIKS-1
481:Anubis
332:Common
219:NESSIE
183:Rounds
89:
82:
75:
68:
60:
1452:(PRN)
1102:Slide
958:Round
943:P-box
938:S-box
897:XXTEA
857:Speck
852:Simon
847:SHARK
827:SAFER
812:REDOC
737:Mercy
696:89/91
646:Iraqi
611:G-DES
601:FEA-M
581:DES-X
546:Cobra
501:BATON
486:Ascon
466:3-Way
457:Other
201:(for
94:JSTOR
80:books
1667:stub
1230:CNSA
1089:Mod
1015:MITM
787:NUSH
742:MESH
732:MARS
606:FROG
596:FEAL
576:DEAL
556:Crab
541:CMEA
448:XTEA
433:SEED
413:IDEA
408:GOST
393:ARIA
213:and
142:1998
131:and
66:news
1184:Tau
1144:XSL
948:SPN
892:xmx
887:UES
822:S-1
807:RC2
752:MMB
631:ICE
586:DFC
443:TEA
428:RC6
423:RC5
418:LEA
370:SM4
351:DES
341:AES
244:".
193:In
49:by
1712::
712:M8
707:M6
694:,
692:97
591:E2
357:,
197:,
1698:e
1691:t
1684:v
1673:.
1296:e
1289:t
1282:v
1091:n
1075:)
1071:(
1038:)
1034:(
1011:)
1007:(
998:)
994:(
984:)
980:(
802:Q
698:)
361:)
353:(
326:)
322:(
312:e
305:t
298:v
276:.
267:)
263:(
238:e
187:8
105:)
101:(
91:·
84:·
77:·
70:·
53:.
39:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.