<s>
This	O
article	O
summarizes	O
publicly	O
known	O
attacks	O
against	O
block	O
ciphers	O
and	O
stream	B-Algorithm
ciphers	I-Algorithm
.	O
</s>
<s>
Cipher	B-Algorithm
Security	I-Algorithm
claim	O
Best	O
attack	O
Publish	O
date	O
Comment	O
AES128	B-Algorithm
2128	O
2011-08-17	O
Independent	O
biclique	O
attack	O
.	O
</s>
<s>
AES192	B-Algorithm
2192	O
AES256	B-Algorithm
2256	O
Blowfish	B-Algorithm
Up	O
to	O
2448	O
4	O
of	O
16	O
rounds	O
;	O
64-bit	O
block	O
is	O
vulnerable	O
to	O
SWEET32	O
attack	O
.	O
</s>
<s>
Author	O
of	O
Blowfish	B-Algorithm
recommends	O
using	O
Twofish	B-Algorithm
instead	O
.	O
</s>
<s>
SWEET32	O
attack	O
demonstrated	O
birthday	O
attacks	O
to	O
recover	O
plaintext	O
with	O
its	O
64-bit	O
block	O
size	O
,	O
vulnerable	O
to	O
protocols	O
such	O
as	O
TLS	B-Protocol
,	O
SSH	B-Protocol
,	O
IPsec	B-Protocol
,	O
and	O
OpenVPN	B-Language
,	O
without	O
attacking	O
the	O
cipher	O
itself	O
.	O
</s>
<s>
Twofish	B-Algorithm
2128	O
–	O
2256	O
6	O
of	O
16	O
rounds	O
(	O
2256	O
time	O
)	O
1999-10-05	O
Impossible	O
differential	O
attack	O
.	O
</s>
<s>
Serpent-128	O
2128	O
10	O
of	O
32	O
rounds	O
(	O
289	O
time	O
,	O
2118	O
data	O
)	O
2002-02-04	O
Linear	O
cryptanalysis	O
.	O
</s>
<s>
Serpent-192	O
2192	O
11	O
of	O
32	O
rounds	O
(	O
2187	O
time	O
,	O
2118	O
data	O
)	O
Serpent-256	O
2256	O
DES	B-Algorithm
256	O
239	O
–	O
243	O
time	O
,	O
243	O
known	O
plaintexts	O
2001	O
Linear	O
cryptanalysis	O
.	O
</s>
<s>
In	O
addition	O
,	O
broken	O
by	O
brute	O
force	O
in	O
256	O
time	O
,	O
no	O
later	O
than	O
1998-07-17	O
,	O
see	O
EFF	B-Algorithm
DES	I-Algorithm
cracker	I-Algorithm
.	O
</s>
<s>
Time	O
complexity	O
is	O
2113	O
steps	O
,	O
but	O
along	O
with	O
proposed	O
techniques	O
,	O
it	O
is	O
estimated	O
to	O
be	O
equivalent	O
to	O
290	O
single	B-Algorithm
DES	I-Algorithm
encryption	O
steps	O
.	O
</s>
<s>
SWEET32	O
attack	O
demonstrated	O
birthday	O
attacks	O
to	O
recover	O
plaintext	O
with	O
its	O
64-bit	O
block	O
size	O
,	O
vulnerable	O
to	O
protocols	O
such	O
as	O
TLS	B-Protocol
,	O
SSH	B-Protocol
,	O
IPsec	B-Protocol
,	O
and	O
OpenVPN	B-Language
.	O
</s>
<s>
KASUMI	B-Algorithm
2128	O
232	O
time	O
,	O
226	O
data	O
,	O
230	O
memory	O
,	O
4	O
related	O
keys	O
2010-01-10	O
The	O
cipher	O
used	O
in	O
3G	B-Architecture
cell	O
phone	O
networks	O
.	O
</s>
<s>
This	O
attack	O
takes	O
less	O
than	O
two	O
hours	O
on	O
a	O
single	O
PC	O
,	O
but	O
is	O
n't	O
applicable	O
to	O
3G	B-Architecture
due	O
to	O
known	O
plaintext	O
and	O
related	O
key	O
requirements	O
.	O
</s>
<s>
RC4	B-Algorithm
Up	O
to	O
22048	O
2007	O
Commonly	O
known	O
as	O
PTW	O
attack	O
,	O
it	O
can	O
break	O
WEP	B-Protocol
encryption	O
in	O
Wi-Fi	O
on	O
an	O
ordinary	O
computer	O
in	O
negligible	O
time	O
.	O
</s>
<s>
Cipher	B-Algorithm
Security	I-Algorithm
claim	O
Best	O
attack	O
Publish	O
date	O
Comment	O
RC4	B-Algorithm
up	O
to	O
22048	O
(	O
90%	O
probability	O
)	O
2000	O
Paper	O
.	O
</s>
<s>
Cipher	B-Algorithm
Security	I-Algorithm
claim	O
Best	O
attack	O
Publish	O
date	O
Comment	O
CAST	O
(	O
not	O
CAST-128	B-Algorithm
)	O
264	O
248	O
time	O
,	O
217	O
chosen	O
plaintexts	O
1997-11-11	O
Related-key	O
attack	O
.	O
</s>
<s>
CAST-128	B-Algorithm
2128	O
6	O
of	O
16	O
rounds	O
(	O
288.51	O
time	O
,	O
253.96	O
data	O
)	O
2009-08-23	O
Known-plaintext	O
linear	O
cryptanalysis	O
.	O
</s>
<s>
CAST-256	B-Algorithm
2256	O
24	O
of	O
48	O
rounds	O
(	O
2156.2	O
time	O
,	O
2124.1	O
data	O
)	O
IDEA	B-Algorithm
2128	O
2012-04-15	O
Narrow-biclique	O
attack	O
.	O
</s>
<s>
MISTY1	B-Algorithm
2128	O
2015-07-30	O
Chosen-ciphertext	O
,	O
integral	B-General_Concept
cryptanalysis	I-General_Concept
,	O
an	O
improvement	O
over	O
a	O
previous	O
chosen-plaintext	O
attack	O
.	O
</s>
<s>
RC2	B-Algorithm
264	O
–	O
2128	O
Unknown	O
time	O
,	O
234	O
chosen	O
plaintexts	O
1997-11-11	O
Related-key	O
attack	O
.	O
</s>
<s>
RC5	B-Algorithm
2128	O
SEED	O
2128	O
Skipjack	B-Algorithm
280	O
280	O
ECRYPT	O
II	O
recommendations	O
note	O
that	O
,	O
as	O
of	O
2012	O
,	O
80	O
bit	O
ciphers	O
provide	O
only	O
"	O
Very	O
short-term	O
protection	O
against	O
agencies	O
"	O
.	O
</s>
<s>
NIST	O
recommends	O
not	O
to	O
use	O
Skipjack	B-Algorithm
after	O
2010.Transitions	O
:	O
Recommendation	O
for	O
Transitioning	O
the	O
Use	O
of	O
Cryptographic	O
Algorithms	O
and	O
Key	O
Lengths	O
,	O
NIST	O
TEA	B-Algorithm
2128	O
1997-11-11	O
Related-key	O
attack	O
.	O
</s>
<s>
XTEA	B-Algorithm
2128	O
XXTEA	B-Algorithm
2128	O
259	O
chosen	O
plaintexts	O
2010-05-04	O
Chosen-plaintext	O
,	O
differential	O
cryptanalysis	O
.	O
</s>
<s>
Cipher	B-Algorithm
Security	I-Algorithm
claim	O
Best	O
attack	O
Publish	O
date	O
Comment	O
CAST-256	B-Algorithm
2256	O
2012-12-04	O
Multidimensional	O
zero-correlation	O
cryptanalysis	O
.	O
</s>
