226:(Hitachi) as stream ciphers. However, only KCipher-2 has been listed on the "e-Government Recommended Ciphers List". The reason why most Japanese ciphers have not been selected as "Recommended Ciphers" is not that these ciphers are necessarily unsafe, but that these ciphers are not widely used in commercial products, open-source projects, governmental systems, or international standards. There is the possibility that ciphers listed on "Candidate Recommended Ciphers List" will be moved to the "e-Government Recommended Ciphers List" when they are utilized more widely.
3430:
61:
There is some overlap, and some conflict, between the NESSIE selections and the CRYPTREC draft recommendations. Both efforts include some of the best cryptographers in the world therefore conflicts in their selections and recommendations should be examined with care. For instance, CRYPTREC recommends
205:
In the revised release of 2013, the list was divided into three: "e-Government
Recommended Ciphers List", "Candidate Recommended Ciphers List", and "Monitored Ciphers List". Most of the Japanese ciphers listed in the previous list (except for Camellia) have moved from the "Recommended Ciphers List"
121:
It is also the organization that provides technical evaluation and recommendations concerning regulations that implement
Japanese laws. Examples include the Electronic Signatures and Certification Services (Law 102 of FY2000, taking effect as from April 2001), the Basic Law on the Formulation of an
78:
protocols; nevertheless, CRYPTREC recommended that it only be used with 128-bit keys. Essentially the same consideration led to CRYPTREC's inclusion of 160-bit message digest algorithms, despite their suggestion that they be avoided in new system designs. Also, CRYPTREC was unusually careful to
62:
several 64 bit block ciphers while NESSIE selected none, but CRYPTREC was obliged by its terms of reference to take into account existing standards and practices, while NESSIE was not. Similar differences in terms of reference account for CRYPTREC recommending at least one
122:
Advanced
Information and Telecommunications Network Society of 2000 (Law 144 of FY2000), and the Public Individual Certification Law of December 2002. Furthermore, CRYPTEC has responsibilities with regard to the Japanese contribution to the
99:. It was started in May 2000 by combining efforts from several agencies who were investigating methods and techniques for implementing 'e-Government' in Japan. Presently, it is sponsored by
79:
examine variants and modifications of the techniques, or at least to discuss their care in doing so; this resulted in particularly detailed recommendations regarding them.
3410:
3240:
1202:
912:
592:
223:
1330:
123:
47:
3093:
3013:
2340:
1421:
1325:
643:
421:
2401:
812:
2430:
1054:
537:
436:
426:
127:
1233:
1227:
2167:
1523:
473:
3029:
2157:
1651:
1351:
905:
431:
2320:
2294:
2162:
2058:
43:
2790:
2135:
969:
2957:
3086:
1037:
994:
877:
The list of ciphers that should be referred to in the procurement for the e-Government system (CRYPTREC Ciphers List)
332:
959:
2304:
1414:
949:
898:
237:
are listed on "Monitored
Ciphers List". These are unsafe and only permitted to remain compatible with old systems.
138:
In the first release in 2003, many
Japanese ciphers were selected for the "e-Government Recommended Ciphers List":
3458:
2394:
2183:
1113:
1027:
974:
327:
3289:
2998:
2483:
2435:
2361:
1138:
167:
2785:
1022:
3463:
3079:
3003:
1451:
1279:
1212:
355:
3468:
3405:
3360:
3173:
2772:
2414:
2410:
2247:
1407:
1376:
1269:
1118:
1032:
954:
287:
3284:
2387:
2264:
2174:
2152:
1465:
1128:
1017:
999:
3400:
2668:
2269:
2125:
2078:
1553:
1381:
1361:
2473:
1264:
3390:
3380:
3235:
3008:
2844:
2543:
2538:
2335:
2217:
2092:
1461:
1320:
1091:
75:
3385:
3375:
3178:
3138:
3131:
3121:
3116:
2931:
2751:
2274:
2063:
1434:
1274:
921:
3126:
3039:
2425:
2366:
2242:
2237:
2189:
1356:
1207:
1146:
1081:
876:
819:
3433:
3279:
3225:
3054:
2704:
2658:
2548:
2506:
2491:
2356:
2179:
2038:
1616:
1222:
979:
936:
3395:
3319:
2724:
2628:
2578:
2553:
2259:
2142:
2068:
1751:
1731:
1133:
944:
8:
3158:
3049:
2926:
2875:
2814:
2714:
2633:
2593:
2573:
2222:
2199:
1518:
1239:
456:
171:
159:
27:
3264:
3248:
3195:
2983:
2967:
2916:
2501:
2207:
2115:
1827:
1756:
1726:
1671:
1086:
1009:
989:
984:
964:
292:
206:
to the "Candidate
Recommended Ciphers List". There were several new proposals, such as
34:
techniques for government and industrial use. It is comparable in many respects to the
3324:
3314:
3185:
2860:
1927:
1626:
1586:
1581:
1548:
1508:
1456:
1346:
1289:
1217:
1103:
360:
163:
3259:
2947:
2901:
2663:
2299:
2194:
2073:
1932:
1812:
1781:
1475:
1192:
92:
2962:
2911:
2906:
2694:
2409:
2146:
2130:
2119:
2053:
2012:
1977:
1907:
1887:
1761:
1641:
1636:
1591:
843:
572:
552:
175:
139:
106:
the
Ministry of Public Management, Home Affairs and Post and Telecommunications,
3334:
3254:
3215:
3163:
3148:
2952:
2680:
2284:
2232:
2043:
2028:
1967:
1962:
1847:
1596:
35:
74:
that they had not selected any of those considered. RC4 is widely used in the
3452:
3415:
3370:
3329:
3309:
3205:
3168:
3143:
3044:
2921:
2279:
2227:
2106:
2088:
1877:
1852:
1842:
1666:
1656:
1503:
63:
51:
31:
2623:
3365:
3210:
3200:
3190:
3153:
3102:
2212:
2033:
1997:
1862:
1741:
1696:
1528:
1480:
1430:
1386:
1366:
240:
After the revision in 2013, there are several updates such as addition of
3344:
3034:
2880:
2809:
2805:
1822:
1817:
1701:
1284:
1161:
3304:
3274:
3269:
3230:
2254:
1972:
1912:
1796:
1791:
1736:
1606:
1469:
1310:
1042:
738:
710:
582:
557:
257:
179:
147:
96:
869:
3294:
2709:
2588:
1987:
1982:
1872:
1786:
1681:
1661:
1064:
602:
370:
215:
195:
2496:
3339:
3299:
2885:
2870:
2865:
2855:
2819:
2739:
2653:
2533:
2289:
2083:
1746:
1621:
1601:
1513:
1371:
1176:
1171:
1166:
1069:
1047:
487:
483:
451:
441:
245:
241:
88:
2824:
2780:
2558:
1992:
1942:
1902:
1892:
1837:
1832:
1676:
1485:
1197:
1156:
774:
199:
187:
151:
3220:
2993:
2734:
2729:
2699:
2689:
2648:
2643:
2638:
2618:
2613:
2583:
2568:
2528:
2330:
1952:
1947:
1882:
1867:
1857:
1802:
1776:
1771:
1766:
1646:
1631:
1315:
687:
577:
562:
317:
307:
302:
207:
183:
155:
39:
2719:
2608:
2563:
2511:
2468:
2463:
2457:
2048:
2007:
1957:
1937:
1922:
1711:
1691:
1611:
1576:
1151:
1108:
1076:
1059:
743:
396:
382:
297:
253:
249:
234:
2834:
2829:
2800:
2795:
2759:
1897:
1806:
1721:
1716:
1706:
1686:
1558:
1543:
597:
468:
219:
211:
191:
2603:
2598:
2451:
2002:
1917:
1538:
1533:
1244:
1098:
261:
230:
143:
67:
275:
70:, while the NESSIE report specifically said that it was
3241:
Cryptographically secure pseudorandom number generator
509:
1429:
882:
844:"Specifications of e-Government Recommended Ciphers"
109:
3450:
24:Cryptography Research and Evaluation Committees
48:National Institute of Standards and Technology
3087:
2395:
1415:
906:
112:the Information-Technology Promotion Agency.
920:
103:the Ministry of Economy Trade and Industry,
3094:
3080:
2402:
2388:
1422:
1408:
913:
899:
82:
667:
56:
267:
190:) as 128 bit block ciphers, and finally
87:CRYPTREC includes members from Japanese
813:"e-Government recommended ciphers list"
214:) as a 128 bit block cipher as well as
3451:
818:. CRYPTREC. 2003-02-20. Archived from
16:Japanese cryptography research project
3075:
2383:
1403:
894:
276:e-Government Recommended Ciphers List
1234:Naccache–Stern knapsack cryptosystem
44:Advanced Encryption Standard process
260:to Monitored list, and deletion of
130:JTC 1/SC27 standardization effort.
116:
13:
510:Candidate Recommended Ciphers List
14:
3480:
861:
3429:
3428:
3101:
1265:Discrete logarithm cryptography
761:Authenticated encryption modes
630:Authenticated encryption modes
448:Authenticated encryption modes
3290:Information-theoretic security
2999:NIST hash function competition
836:
805:
168:Nippon Telegraph and Telephone
1:
798:
771:Message authentication codes
640:Message authentication codes
465:Message authentication codes
3004:Password Hashing Competition
2415:message authentication codes
2411:Cryptographic hash functions
1280:Non-commutative cryptography
133:
7:
3406:Message authentication code
3361:Cryptographic hash function
3174:Cryptographic hash function
2958:Merkle–Damgård construction
1377:Identity-based cryptography
1270:Elliptic-curve cryptography
162:) as 64 bit block ciphers,
10:
3485:
3285:Harvest now, decrypt later
30:to evaluate and recommend
3424:
3401:Post-quantum cryptography
3353:
3109:
3071:
3022:
2976:
2940:
2894:
2843:
2771:
2748:
2677:
2521:
2482:
2444:
2421:
2379:
2349:
2313:
2305:Time/memory/data tradeoff
2102:
2021:
1567:
1494:
1442:
1399:
1382:Post-quantum cryptography
1339:
1331:Post-Quantum Cryptography
1298:
1257:
1185:
1127:
1008:
935:
928:
890:
886:
781:Authenticated encryption
650:Authenticated encryption
480:Authenticated encryption
3391:Quantum key distribution
3381:Authenticated encryption
3236:Random number generation
2752:key derivation functions
2093:Whitening transformation
3386:Public-key cryptography
3376:Symmetric-key algorithm
3179:Key derivation function
3139:Cryptographic primitive
3132:Authentication protocol
3122:Outline of cryptography
3117:History of cryptography
3030:Hash-based cryptography
2932:Length extension attack
2064:Confusion and diffusion
1275:Hash-based cryptography
922:Public-key cryptography
83:Background and sponsors
3459:Cryptography standards
3127:Cryptographic protocol
3040:Message authentication
846:. CRYPTREC. 2018-07-02
789:Entity authentication
717:128-bit block ciphers
704:Symmetric key ciphers
668:Monitored Ciphers List
658:Entity authentication
569:128-bit block ciphers
546:Symmetric key ciphers
494:Entity authentication
352:128-bit block ciphers
341:Symmetric key ciphers
272:As of March 2023
57:Comparison with NESSIE
3280:End-to-end encryption
3226:Cryptojacking malware
2357:Initialization vector
937:Integer factorization
707:64-bit block ciphers
549:64-bit block ciphers
344:64-bit block ciphers
268:CRYPTREC Ciphers List
229:In addition, 128 bit
202:) as stream ciphers.
3396:Quantum cryptography
3320:Trusted timestamping
2136:3-subset MITM attack
1752:Intel Cascade Cipher
1732:Hasty Pudding cipher
3464:Government research
3159:Cryptographic nonce
2927:Side-channel attack
2175:Differential-linear
1240:Three-pass protocol
750:Modes of operation
673:Public key ciphers
619:Modes of operation
515:Public key ciphers
415:Modes of operation
281:Public key ciphers
172:Mitsubishi Electric
160:Mitsubishi Electric
42:project and to the
28:Japanese Government
3469:Standards of Japan
3265:Subliminal channel
3249:Pseudorandom noise
3196:Key (cryptography)
2984:CAESAR Competition
2968:HAIFA construction
2917:Brute-force attack
2248:Differential-fault
1466:internal mechanics
1010:Discrete logarithm
3446:
3445:
3442:
3441:
3325:Key-based routing
3315:Trapdoor function
3186:Digital signature
3067:
3066:
3063:
3062:
2861:ChaCha20-Poly1305
2678:Password hashing/
2375:
2374:
2362:Mode of operation
2039:Lai–Massey scheme
1395:
1394:
1347:Digital signature
1290:Trapdoor function
1253:
1252:
970:Goldwasser–Micali
753:Encryption modes
622:Encryption modes
418:Encryption modes
308:RSASSA-PKCS1-v1_5
3476:
3432:
3431:
3260:Insecure channel
3096:
3089:
3082:
3073:
3072:
2948:Avalanche effect
2902:Collision attack
2445:Common functions
2404:
2397:
2390:
2381:
2380:
2233:Power-monitoring
2074:Avalanche effect
1782:Khufu and Khafre
1435:security summary
1424:
1417:
1410:
1401:
1400:
1236:
1137:
1132:
1092:signature scheme
995:Okamoto–Uchiyama
933:
932:
915:
908:
901:
892:
891:
888:
887:
884:
883:
873:
872:
870:Official website
855:
854:
852:
851:
840:
834:
833:
831:
830:
824:
817:
809:
711:3-key Triple DES
688:RSAES-PKCS1-v1_5
684:Confidentiality
526:Confidentiality
314:Confidentiality
117:Responsibilities
3484:
3483:
3479:
3478:
3477:
3475:
3474:
3473:
3449:
3448:
3447:
3438:
3420:
3349:
3105:
3100:
3059:
3018:
2977:Standardization
2972:
2963:Sponge function
2936:
2912:Birthday attack
2907:Preimage attack
2890:
2846:
2839:
2767:
2750:
2749:General purpose
2744:
2679:
2673:
2522:Other functions
2517:
2484:SHA-3 finalists
2478:
2440:
2417:
2408:
2371:
2345:
2314:Standardization
2309:
2238:Electromagnetic
2190:Integral/Square
2147:Piling-up lemma
2131:Biclique attack
2120:EFF DES cracker
2104:
2098:
2029:Feistel network
2017:
1642:CIPHERUNICORN-E
1637:CIPHERUNICORN-A
1569:
1563:
1496:
1490:
1444:
1438:
1428:
1391:
1335:
1299:Standardization
1294:
1249:
1232:
1181:
1129:Lattice/SVP/CVP
1123:
1004:
950:Blum–Goldwasser
924:
919:
868:
867:
864:
859:
858:
849:
847:
842:
841:
837:
828:
826:
822:
815:
811:
810:
806:
801:
735:Hash functions
725:Stream ciphers
670:
611:Hash functions
589:Stream ciphers
573:CIPHERUNICORN-A
553:CIPHERUNICORN-E
512:
379:Hash functions
367:Stream ciphers
278:
270:
182:(Toshiba), and
176:CIPHERUNICORN-A
140:CIPHERUNICORN-E
136:
119:
85:
59:
17:
12:
11:
5:
3482:
3472:
3471:
3466:
3461:
3444:
3443:
3440:
3439:
3437:
3436:
3425:
3422:
3421:
3419:
3418:
3413:
3411:Random numbers
3408:
3403:
3398:
3393:
3388:
3383:
3378:
3373:
3368:
3363:
3357:
3355:
3351:
3350:
3348:
3347:
3342:
3337:
3335:Garlic routing
3332:
3327:
3322:
3317:
3312:
3307:
3302:
3297:
3292:
3287:
3282:
3277:
3272:
3267:
3262:
3257:
3255:Secure channel
3252:
3246:
3245:
3244:
3233:
3228:
3223:
3218:
3216:Key stretching
3213:
3208:
3203:
3198:
3193:
3188:
3183:
3182:
3181:
3176:
3166:
3164:Cryptovirology
3161:
3156:
3151:
3149:Cryptocurrency
3146:
3141:
3136:
3135:
3134:
3124:
3119:
3113:
3111:
3107:
3106:
3099:
3098:
3091:
3084:
3076:
3069:
3068:
3065:
3064:
3061:
3060:
3058:
3057:
3052:
3047:
3042:
3037:
3032:
3026:
3024:
3020:
3019:
3017:
3016:
3011:
3006:
3001:
2996:
2991:
2986:
2980:
2978:
2974:
2973:
2971:
2970:
2965:
2960:
2955:
2953:Hash collision
2950:
2944:
2942:
2938:
2937:
2935:
2934:
2929:
2924:
2919:
2914:
2909:
2904:
2898:
2896:
2892:
2891:
2889:
2888:
2883:
2878:
2873:
2868:
2863:
2858:
2852:
2850:
2841:
2840:
2838:
2837:
2832:
2827:
2822:
2817:
2812:
2803:
2798:
2793:
2788:
2783:
2777:
2775:
2769:
2768:
2766:
2765:
2762:
2756:
2754:
2746:
2745:
2743:
2742:
2737:
2732:
2727:
2722:
2717:
2712:
2707:
2702:
2697:
2692:
2686:
2684:
2681:key stretching
2675:
2674:
2672:
2671:
2666:
2661:
2656:
2651:
2646:
2641:
2636:
2631:
2626:
2621:
2616:
2611:
2606:
2601:
2596:
2591:
2586:
2581:
2576:
2571:
2566:
2561:
2556:
2551:
2546:
2541:
2536:
2531:
2525:
2523:
2519:
2518:
2516:
2515:
2509:
2504:
2499:
2494:
2488:
2486:
2480:
2479:
2477:
2476:
2471:
2466:
2461:
2455:
2448:
2446:
2442:
2441:
2439:
2438:
2433:
2428:
2422:
2419:
2418:
2407:
2406:
2399:
2392:
2384:
2377:
2376:
2373:
2372:
2370:
2369:
2364:
2359:
2353:
2351:
2347:
2346:
2344:
2343:
2338:
2333:
2328:
2323:
2317:
2315:
2311:
2310:
2308:
2307:
2302:
2297:
2292:
2287:
2282:
2277:
2272:
2267:
2262:
2257:
2252:
2251:
2250:
2245:
2240:
2235:
2230:
2220:
2215:
2210:
2205:
2197:
2192:
2187:
2180:Distinguishing
2177:
2172:
2171:
2170:
2165:
2160:
2150:
2140:
2139:
2138:
2133:
2123:
2112:
2110:
2100:
2099:
2097:
2096:
2086:
2081:
2076:
2071:
2066:
2061:
2056:
2051:
2046:
2044:Product cipher
2041:
2036:
2031:
2025:
2023:
2019:
2018:
2016:
2015:
2010:
2005:
2000:
1995:
1990:
1985:
1980:
1975:
1970:
1965:
1960:
1955:
1950:
1945:
1940:
1935:
1930:
1925:
1920:
1915:
1910:
1905:
1900:
1895:
1890:
1885:
1880:
1875:
1870:
1865:
1860:
1855:
1850:
1845:
1840:
1835:
1830:
1825:
1820:
1815:
1810:
1799:
1794:
1789:
1784:
1779:
1774:
1769:
1764:
1759:
1754:
1749:
1744:
1739:
1734:
1729:
1724:
1719:
1714:
1709:
1704:
1699:
1694:
1689:
1684:
1679:
1674:
1672:Cryptomeria/C2
1669:
1664:
1659:
1654:
1649:
1644:
1639:
1634:
1629:
1624:
1619:
1614:
1609:
1604:
1599:
1594:
1589:
1584:
1579:
1573:
1571:
1565:
1564:
1562:
1561:
1556:
1551:
1546:
1541:
1536:
1531:
1526:
1521:
1516:
1511:
1506:
1500:
1498:
1492:
1491:
1489:
1488:
1483:
1478:
1473:
1459:
1454:
1448:
1446:
1440:
1439:
1427:
1426:
1419:
1412:
1404:
1397:
1396:
1393:
1392:
1390:
1389:
1384:
1379:
1374:
1369:
1364:
1359:
1354:
1349:
1343:
1341:
1337:
1336:
1334:
1333:
1328:
1323:
1318:
1313:
1308:
1302:
1300:
1296:
1295:
1293:
1292:
1287:
1282:
1277:
1272:
1267:
1261:
1259:
1255:
1254:
1251:
1250:
1248:
1247:
1242:
1237:
1230:
1228:Merkle–Hellman
1225:
1220:
1215:
1210:
1205:
1200:
1195:
1189:
1187:
1183:
1182:
1180:
1179:
1174:
1169:
1164:
1159:
1154:
1149:
1143:
1141:
1125:
1124:
1122:
1121:
1116:
1111:
1106:
1101:
1096:
1095:
1094:
1084:
1079:
1074:
1073:
1072:
1067:
1057:
1052:
1051:
1050:
1045:
1035:
1030:
1025:
1020:
1014:
1012:
1006:
1005:
1003:
1002:
997:
992:
987:
982:
977:
975:Naccache–Stern
972:
967:
962:
957:
952:
947:
941:
939:
930:
926:
925:
918:
917:
910:
903:
895:
881:
880:
874:
863:
862:External links
860:
857:
856:
835:
803:
802:
800:
797:
796:
795:
794:
793:
787:
786:
785:
779:
778:
777:
769:
768:
767:
766:
765:
759:
758:
757:
748:
747:
746:
741:
733:
732:
731:
730:
729:
723:
722:
721:
715:
714:
713:
702:
701:
700:
699:
698:
692:
691:
690:
682:
681:
680:
669:
666:
665:
664:
663:
662:
656:
655:
654:
648:
647:
646:
638:
637:
636:
635:
634:
628:
627:
626:
617:
616:
615:
609:
608:
607:
606:
605:
600:
595:
587:
586:
585:
580:
575:
567:
566:
565:
560:
555:
544:
543:
542:
541:
540:
532:
531:
530:
524:
523:
522:
511:
508:
507:
506:
505:
504:
503:ISO/IEC 9798-4
501:
500:ISO/IEC 9798-3
498:
497:ISO/IEC 9798-2
492:
491:
490:
478:
477:
476:
471:
463:
462:
461:
460:
459:
454:
446:
445:
444:
439:
434:
429:
424:
413:
412:
411:
408:
405:
402:
399:
394:
391:
388:
385:
377:
376:
375:
374:
373:
365:
364:
363:
358:
350:
349:
348:
339:
338:
337:
336:
335:
330:
322:
321:
320:
312:
311:
310:
305:
300:
295:
290:
277:
274:
269:
266:
135:
132:
118:
115:
114:
113:
110:
107:
104:
84:
81:
58:
55:
36:European Union
26:set up by the
15:
9:
6:
4:
3:
2:
3481:
3470:
3467:
3465:
3462:
3460:
3457:
3456:
3454:
3435:
3427:
3426:
3423:
3417:
3416:Steganography
3414:
3412:
3409:
3407:
3404:
3402:
3399:
3397:
3394:
3392:
3389:
3387:
3384:
3382:
3379:
3377:
3374:
3372:
3371:Stream cipher
3369:
3367:
3364:
3362:
3359:
3358:
3356:
3352:
3346:
3343:
3341:
3338:
3336:
3333:
3331:
3330:Onion routing
3328:
3326:
3323:
3321:
3318:
3316:
3313:
3311:
3310:Shared secret
3308:
3306:
3303:
3301:
3298:
3296:
3293:
3291:
3288:
3286:
3283:
3281:
3278:
3276:
3273:
3271:
3268:
3266:
3263:
3261:
3258:
3256:
3253:
3250:
3247:
3242:
3239:
3238:
3237:
3234:
3232:
3229:
3227:
3224:
3222:
3219:
3217:
3214:
3212:
3209:
3207:
3206:Key generator
3204:
3202:
3199:
3197:
3194:
3192:
3189:
3187:
3184:
3180:
3177:
3175:
3172:
3171:
3170:
3169:Hash function
3167:
3165:
3162:
3160:
3157:
3155:
3152:
3150:
3147:
3145:
3144:Cryptanalysis
3142:
3140:
3137:
3133:
3130:
3129:
3128:
3125:
3123:
3120:
3118:
3115:
3114:
3112:
3108:
3104:
3097:
3092:
3090:
3085:
3083:
3078:
3077:
3074:
3070:
3056:
3053:
3051:
3048:
3046:
3045:Proof of work
3043:
3041:
3038:
3036:
3033:
3031:
3028:
3027:
3025:
3021:
3015:
3012:
3010:
3007:
3005:
3002:
3000:
2997:
2995:
2992:
2990:
2987:
2985:
2982:
2981:
2979:
2975:
2969:
2966:
2964:
2961:
2959:
2956:
2954:
2951:
2949:
2946:
2945:
2943:
2939:
2933:
2930:
2928:
2925:
2923:
2922:Rainbow table
2920:
2918:
2915:
2913:
2910:
2908:
2905:
2903:
2900:
2899:
2897:
2893:
2887:
2884:
2882:
2879:
2877:
2874:
2872:
2869:
2867:
2864:
2862:
2859:
2857:
2854:
2853:
2851:
2848:
2845:Authenticated
2842:
2836:
2833:
2831:
2828:
2826:
2823:
2821:
2818:
2816:
2813:
2811:
2807:
2804:
2802:
2799:
2797:
2794:
2792:
2789:
2787:
2784:
2782:
2779:
2778:
2776:
2774:
2773:MAC functions
2770:
2763:
2761:
2758:
2757:
2755:
2753:
2747:
2741:
2738:
2736:
2733:
2731:
2728:
2726:
2723:
2721:
2718:
2716:
2713:
2711:
2708:
2706:
2703:
2701:
2698:
2696:
2693:
2691:
2688:
2687:
2685:
2682:
2676:
2670:
2667:
2665:
2662:
2660:
2657:
2655:
2652:
2650:
2647:
2645:
2642:
2640:
2637:
2635:
2632:
2630:
2627:
2625:
2622:
2620:
2617:
2615:
2612:
2610:
2607:
2605:
2602:
2600:
2597:
2595:
2592:
2590:
2587:
2585:
2582:
2580:
2577:
2575:
2572:
2570:
2567:
2565:
2562:
2560:
2557:
2555:
2552:
2550:
2547:
2545:
2542:
2540:
2537:
2535:
2532:
2530:
2527:
2526:
2524:
2520:
2513:
2510:
2508:
2505:
2503:
2500:
2498:
2495:
2493:
2490:
2489:
2487:
2485:
2481:
2475:
2472:
2470:
2467:
2465:
2462:
2460:(compromised)
2459:
2456:
2454:(compromised)
2453:
2450:
2449:
2447:
2443:
2437:
2436:Known attacks
2434:
2432:
2429:
2427:
2424:
2423:
2420:
2416:
2412:
2405:
2400:
2398:
2393:
2391:
2386:
2385:
2382:
2378:
2368:
2365:
2363:
2360:
2358:
2355:
2354:
2352:
2348:
2342:
2339:
2337:
2334:
2332:
2329:
2327:
2324:
2322:
2319:
2318:
2316:
2312:
2306:
2303:
2301:
2298:
2296:
2293:
2291:
2288:
2286:
2283:
2281:
2278:
2276:
2273:
2271:
2268:
2266:
2263:
2261:
2260:Interpolation
2258:
2256:
2253:
2249:
2246:
2244:
2241:
2239:
2236:
2234:
2231:
2229:
2226:
2225:
2224:
2221:
2219:
2216:
2214:
2211:
2209:
2206:
2204:
2203:
2198:
2196:
2193:
2191:
2188:
2185:
2181:
2178:
2176:
2173:
2169:
2166:
2164:
2161:
2159:
2156:
2155:
2154:
2151:
2148:
2144:
2141:
2137:
2134:
2132:
2129:
2128:
2127:
2124:
2121:
2117:
2114:
2113:
2111:
2108:
2107:cryptanalysis
2101:
2094:
2090:
2089:Key whitening
2087:
2085:
2082:
2080:
2077:
2075:
2072:
2070:
2067:
2065:
2062:
2060:
2057:
2055:
2052:
2050:
2047:
2045:
2042:
2040:
2037:
2035:
2032:
2030:
2027:
2026:
2024:
2020:
2014:
2011:
2009:
2006:
2004:
2001:
1999:
1996:
1994:
1991:
1989:
1986:
1984:
1981:
1979:
1976:
1974:
1971:
1969:
1966:
1964:
1961:
1959:
1956:
1954:
1951:
1949:
1946:
1944:
1941:
1939:
1936:
1934:
1931:
1929:
1926:
1924:
1921:
1919:
1916:
1914:
1911:
1909:
1906:
1904:
1901:
1899:
1896:
1894:
1891:
1889:
1886:
1884:
1881:
1879:
1878:New Data Seal
1876:
1874:
1871:
1869:
1866:
1864:
1861:
1859:
1856:
1854:
1851:
1849:
1846:
1844:
1841:
1839:
1836:
1834:
1831:
1829:
1826:
1824:
1821:
1819:
1816:
1814:
1811:
1808:
1804:
1800:
1798:
1795:
1793:
1790:
1788:
1785:
1783:
1780:
1778:
1775:
1773:
1770:
1768:
1765:
1763:
1760:
1758:
1755:
1753:
1750:
1748:
1745:
1743:
1740:
1738:
1735:
1733:
1730:
1728:
1725:
1723:
1720:
1718:
1715:
1713:
1710:
1708:
1705:
1703:
1700:
1698:
1695:
1693:
1690:
1688:
1685:
1683:
1680:
1678:
1675:
1673:
1670:
1668:
1665:
1663:
1660:
1658:
1655:
1653:
1650:
1648:
1645:
1643:
1640:
1638:
1635:
1633:
1630:
1628:
1625:
1623:
1620:
1618:
1617:BEAR and LION
1615:
1613:
1610:
1608:
1605:
1603:
1600:
1598:
1595:
1593:
1590:
1588:
1585:
1583:
1580:
1578:
1575:
1574:
1572:
1566:
1560:
1557:
1555:
1552:
1550:
1547:
1545:
1542:
1540:
1537:
1535:
1532:
1530:
1527:
1525:
1522:
1520:
1517:
1515:
1512:
1510:
1507:
1505:
1502:
1501:
1499:
1493:
1487:
1484:
1482:
1479:
1477:
1474:
1471:
1467:
1463:
1460:
1458:
1455:
1453:
1450:
1449:
1447:
1441:
1436:
1432:
1431:Block ciphers
1425:
1420:
1418:
1413:
1411:
1406:
1405:
1402:
1398:
1388:
1385:
1383:
1380:
1378:
1375:
1373:
1370:
1368:
1365:
1363:
1360:
1358:
1355:
1353:
1350:
1348:
1345:
1344:
1342:
1338:
1332:
1329:
1327:
1324:
1322:
1319:
1317:
1314:
1312:
1309:
1307:
1304:
1303:
1301:
1297:
1291:
1288:
1286:
1283:
1281:
1278:
1276:
1273:
1271:
1268:
1266:
1263:
1262:
1260:
1256:
1246:
1243:
1241:
1238:
1235:
1231:
1229:
1226:
1224:
1221:
1219:
1216:
1214:
1211:
1209:
1206:
1204:
1201:
1199:
1196:
1194:
1191:
1190:
1188:
1184:
1178:
1175:
1173:
1170:
1168:
1165:
1163:
1160:
1158:
1155:
1153:
1150:
1148:
1145:
1144:
1142:
1140:
1135:
1130:
1126:
1120:
1117:
1115:
1112:
1110:
1107:
1105:
1102:
1100:
1097:
1093:
1090:
1089:
1088:
1085:
1083:
1080:
1078:
1075:
1071:
1068:
1066:
1063:
1062:
1061:
1058:
1056:
1053:
1049:
1046:
1044:
1041:
1040:
1039:
1036:
1034:
1031:
1029:
1026:
1024:
1021:
1019:
1016:
1015:
1013:
1011:
1007:
1001:
1000:Schmidt–Samoa
998:
996:
993:
991:
988:
986:
983:
981:
978:
976:
973:
971:
968:
966:
963:
961:
960:Damgård–Jurik
958:
956:
955:Cayley–Purser
953:
951:
948:
946:
943:
942:
940:
938:
934:
931:
927:
923:
916:
911:
909:
904:
902:
897:
896:
893:
889:
885:
879:(in Japanese)
878:
875:
871:
866:
865:
845:
839:
825:on 2018-04-17
821:
814:
808:
804:
791:
790:
788:
783:
782:
780:
776:
773:
772:
770:
763:
762:
760:
755:
754:
752:
751:
749:
745:
742:
740:
737:
736:
734:
727:
726:
724:
719:
718:
716:
712:
709:
708:
706:
705:
703:
696:
695:
694:Key exchange
693:
689:
686:
685:
683:
678:
677:
675:
674:
672:
671:
660:
659:
657:
652:
651:
649:
645:
642:
641:
639:
632:
631:
629:
624:
623:
621:
620:
618:
613:
612:
610:
604:
601:
599:
596:
594:
593:Enocoro-128v2
591:
590:
588:
584:
581:
579:
576:
574:
571:
570:
568:
564:
561:
559:
558:Hierocrypt-L1
556:
554:
551:
550:
548:
547:
545:
539:
536:
535:
534:Key exchange
533:
528:
527:
525:
520:
519:
517:
516:
514:
513:
502:
499:
496:
495:
493:
489:
485:
482:
481:
479:
475:
472:
470:
467:
466:
464:
458:
455:
453:
450:
449:
447:
443:
440:
438:
435:
433:
430:
428:
425:
423:
420:
419:
417:
416:
414:
409:
406:
403:
400:
398:
395:
392:
389:
386:
384:
381:
380:
378:
372:
369:
368:
366:
362:
359:
357:
354:
353:
351:
346:
345:
343:
342:
340:
334:
331:
329:
326:
325:
324:Key exchange
323:
319:
316:
315:
313:
309:
306:
304:
301:
299:
296:
294:
291:
289:
286:
285:
283:
282:
280:
279:
273:
265:
263:
259:
255:
251:
247:
243:
238:
236:
232:
227:
225:
224:Enocoro-128v2
221:
217:
213:
209:
203:
201:
197:
193:
189:
185:
181:
177:
173:
169:
165:
161:
157:
153:
149:
148:Hierocrypt-L1
145:
141:
131:
129:
125:
111:
108:
105:
102:
101:
100:
98:
94:
90:
80:
77:
73:
69:
65:
64:stream cipher
54:
53:
49:
45:
41:
37:
33:
32:cryptographic
29:
25:
21:
3366:Block cipher
3211:Key schedule
3201:Key exchange
3191:Kleptography
3154:Cryptosystem
3103:Cryptography
2988:
2325:
2265:Partitioning
2223:Side-channel
2201:
2168:Higher-order
2153:Differential
2034:Key schedule
1387:OpenPGP card
1367:Web of trust
1305:
1023:Cramer–Shoup
848:. Retrieved
838:
827:. Retrieved
820:the original
807:
583:Hierocrypt-3
271:
239:
228:
204:
180:Hierocrypt-3
137:
120:
86:
71:
60:
23:
19:
18:
3354:Mathematics
3345:Mix network
3035:Merkle tree
3023:Utilization
3009:NSA Suite B
2350:Utilization
2336:NSA Suite B
2321:AES process
2270:Rubber-hose
2208:Related-key
2116:Brute-force
1495:Less common
1357:Fingerprint
1321:NSA Suite B
1285:RSA problem
1162:NTRUEncrypt
393:SHA-512/256
3453:Categories
3305:Ciphertext
3275:Decryption
3270:Encryption
3231:Ransomware
2847:encryption
2624:RadioGatĂşn
2431:Comparison
2300:Chi-square
2218:Rotational
2158:Impossible
2079:Block size
1973:Spectr-H64
1797:Ladder-DES
1792:Kuznyechik
1737:Hierocrypt
1607:BassOmatic
1570:algorithms
1497:algorithms
1470:Triple DES
1445:algorithms
1311:IEEE P1363
929:Algorithms
850:2018-08-16
829:2018-08-16
799:References
739:RIPEMD-160
676:Signature
644:PC-MAC-AES
518:Signature
284:Signature
258:Triple DES
256:, move of
97:government
3295:Plaintext
2764:KDF1/KDF2
2683:functions
2669:Whirlpool
2275:Black-bag
2195:Boomerang
2184:Known-key
2163:Truncated
1988:Threefish
1983:SXAL/MBAL
1873:MultiSwap
1828:MacGuffin
1787:KN-Cipher
1727:Grand Cru
1682:CS-Cipher
1662:COCONUT98
603:MULTI-S01
371:KCipher-2
216:KCipher-2
196:MULTI-S01
134:Selection
3434:Category
3340:Kademlia
3300:Codetext
3243:(CSPRNG)
2989:CRYPTREC
2820:Poly1305
2740:yescrypt
2654:Streebog
2534:CubeHash
2514:(winner)
2326:CRYPTREC
2290:Weak key
2243:Acoustic
2084:Key size
1928:Red Pike
1747:IDEA NXT
1627:Chiasmus
1622:CAST-256
1602:BaseKing
1587:Akelarre
1582:Adiantum
1549:Skipjack
1514:CAST-128
1509:Camellia
1457:Blowfish
1372:Key size
1306:CRYPTREC
1223:McEliece
1177:RLWE-SIG
1172:RLWE-KEX
1167:NTRUSign
980:Paillier
538:PSEC-KEM
488:Poly1305
484:ChaCha20
410:SHAKE256
407:SHAKE128
404:SHA3-512
401:SHA3-384
397:SHA3-256
361:Camellia
318:RSA-OAEP
246:Poly1305
242:ChaCha20
164:Camellia
93:industry
89:academia
20:CRYPTREC
3110:General
2895:Attacks
2825:SipHash
2781:CBC-MAC
2715:LM hash
2695:Balloon
2559:HAS-160
2367:Padding
2285:Rebound
1993:Treyfer
1943:SAVILLE
1903:PRESENT
1893:NOEKEON
1838:MAGENTA
1833:Madryga
1813:Lucifer
1677:CRYPTON
1486:Twofish
1476:Serpent
1218:Lamport
1198:CEILIDH
1157:NewHope
1104:Schnorr
1087:ElGamal
1065:Ed25519
945:Benaloh
775:CBC-MAC
390:SHA-512
387:SHA-384
383:SHA-256
303:RSA-PSS
264:, etc.
200:Hitachi
188:Fujitsu
178:(NEC),
154:), and
152:Toshiba
76:SSL/TLS
72:notable
50:in the
46:run by
22:is the
3221:Keygen
3055:Pepper
2994:NESSIE
2941:Design
2735:scrypt
2730:PBKDF2
2705:Catena
2700:bcrypt
2690:Argon2
2649:Snefru
2644:Shabal
2639:SWIFFT
2619:RIPEMD
2614:N-hash
2589:MASH-2
2584:MASH-1
2569:Kupyna
2529:BLAKE3
2512:Keccak
2497:Grøstl
2474:BLAKE2
2331:NESSIE
2280:Davies
2228:Timing
2143:Linear
2103:Attack
2022:Design
2013:Zodiac
1978:Square
1953:SHACAL
1948:SC2000
1908:Prince
1888:Nimbus
1883:NewDES
1868:MULTI2
1858:MISTY1
1801:LOKI (
1777:KHAZAD
1772:KeeLoq
1767:KASUMI
1762:Kalyna
1647:CLEFIA
1632:CIKS-1
1592:Anubis
1443:Common
1340:Topics
1316:NESSIE
1258:Theory
1186:Others
1043:X25519
578:CLEFIA
563:MISTY1
222:) and
208:CLEFIA
184:SC2000
156:MISTY1
95:, and
40:NESSIE
3251:(PRN)
2849:modes
2725:Makwa
2720:Lyra2
2710:crypt
2659:Tiger
2609:MDC-2
2564:HAVAL
2549:Fugue
2507:Skein
2492:BLAKE
2469:SHA-3
2464:SHA-2
2458:SHA-1
2213:Slide
2069:Round
2054:P-box
2049:S-box
2008:XXTEA
1968:Speck
1963:Simon
1958:SHARK
1938:SAFER
1923:REDOC
1848:Mercy
1807:89/91
1757:Iraqi
1722:G-DES
1712:FEA-M
1692:DES-X
1657:Cobra
1612:BATON
1597:Ascon
1577:3-Way
1568:Other
1152:Kyber
1147:BLISS
1109:SPEKE
1077:ECMQV
1070:Ed448
1060:EdDSA
1055:ECDSA
985:Rabin
823:(PDF)
816:(PDF)
744:SHA-1
298:EdDSA
293:ECDSA
254:SHA-3
250:EdDSA
235:SHA-1
3050:Salt
3014:CNSA
2881:IAPM
2835:VMAC
2830:UMAC
2815:PMAC
2810:CMAC
2806:OMAC
2801:NMAC
2796:HMAC
2791:GMAC
2760:HKDF
2629:SIMD
2579:Lane
2554:GOST
2539:ECOH
2426:List
2413:and
2341:CNSA
2200:Mod
2126:MITM
1898:NUSH
1853:MESH
1843:MARS
1717:FROG
1707:FEAL
1687:DEAL
1667:Crab
1652:CMEA
1559:XTEA
1544:SEED
1524:IDEA
1519:GOST
1504:ARIA
1352:OAEP
1326:CNSA
1203:EPOC
1048:X448
1038:ECDH
598:MUGI
474:HMAC
469:CMAC
333:ECDH
252:and
233:and
220:KDDI
212:Sony
194:and
192:MUGI
52:U.S.
2886:OCB
2876:GCM
2871:EAX
2866:CWC
2856:CCM
2786:DAA
2664:VSH
2634:SM3
2604:MD6
2599:MD4
2594:MD2
2574:LSH
2544:FSB
2452:MD5
2295:Tau
2255:XSL
2059:SPN
2003:xmx
1998:UES
1933:S-1
1918:RC2
1863:MMB
1742:ICE
1697:DFC
1554:TEA
1539:RC6
1534:RC5
1529:LEA
1481:SM4
1462:DES
1452:AES
1362:PKI
1245:XTR
1213:IES
1208:HFE
1139:SIS
1134:LWE
1119:STS
1114:SRP
1099:MQV
1082:EKE
1033:DSA
1018:BLS
990:RSA
965:GMR
792:N/A
784:N/A
764:N/A
756:N/A
728:N/A
720:N/A
697:N/A
679:N/A
661:N/A
653:N/A
633:N/A
625:N/A
614:N/A
529:N/A
521:N/A
457:GCM
452:CCM
442:XTS
437:OFB
432:CTR
427:CFB
422:CBC
356:AES
347:N/A
288:DSA
262:RC4
231:RC4
174:),
146:),
144:NEC
128:IEC
124:ISO
68:RC4
38:'s
3455::
2502:JH
1823:M8
1818:M6
1805:,
1803:97
1702:E2
1468:,
1193:AE
1028:DH
328:DH
248:,
170:,
91:,
66:,
3095:e
3088:t
3081:v
2808:/
2403:e
2396:t
2389:v
2202:n
2186:)
2182:(
2149:)
2145:(
2122:)
2118:(
2109:)
2105:(
2095:)
2091:(
1913:Q
1809:)
1472:)
1464:(
1437:)
1433:(
1423:e
1416:t
1409:v
1136:/
1131:/
914:e
907:t
900:v
853:.
832:.
486:-
244:-
218:(
210:(
198:(
186:(
166:(
158:(
150:(
142:(
126:/
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.