Encryption by date
This is a timeline of the public releases or introductions of computer encryption algorithms.
| Cipher | Year | Key size | Block size | Rounds |
|---|---|---|---|---|
| Lucifer | 1971 | 48 | various | |
| New Data Seal | 1975 | 2048 | 128 | 16 |
| DES-X | 1976 | 184 | ||
| DES | 1977 | 56 | 64 | 16 |
| GDES | 1981 | 32 | ||
| Madryga | 1984 | |||
| NewDES | 1985 | 120 | 64 | 17 |
| Multi2 | 1988 | 64 | 64 | various |
| Khufu | 1989 | 512 | 64 | 16 |
| LOKI97 | 1989 | 64 | 64 | 16 |
| FEAL | 1990 | 64 | 64 | "4,8,32" |
| Redoc | 1990 | 160 | 160 | ? |
| IDEA | 1991 | 128 | 64 | 8.5 |
| BassOmatic | 1991 | 8 to 2048 | 2048 | 1 to 8 |
| CMEA | 1991 | 64 | 16-64 | 3 |
| Blowfish | 1993 | 1-448 | 64 | 16 |
| Crab | 1993 | 80 | 8192 | |
| MMB | 1993 | 128 | 128 | 6 |
| SAFER | 1993 | 64 | 128 | ? |
| SXAL/MBAL | 1993 | 64 | 64 | 8 |
| RC5 | 1994 | 0-2040 | 32/64/128 | 1-255 |
| TEA | 1994 | 128 | 64 | "64,32" |
| 3-Way | 1994 | 96 | 96 | 11 |
| BaseKing | 1994 | 192 | 192 | 11 |
| GOST | 1994 | 256 | 64 | 32 |
| Ladder-DES | 1994 | 224 | 128 | 4 |
| MacGuffin | 1994 | 128 | 64 | 32 |
| RC4 | 1994 | 42-48 | 2064 | 256 |
| BATON | 1995 | 320 | 96128 | |
| KN-Cipher | 1995 | 198 | 64 | 6 |
| Misty1 | 1995 | 128 | 64 | 4*n |
| S-1 | 1995 | hoax | hoax | hoax |
| CAST-128 | 1996 | 40/128 | 64 | 12 or 16 |
| RC2 | 1996 | 8-128 | 64 | 16 |
| Akelarre | 1996 | 128 | 128 | 4 |
| Shark | 1996 | 128 | 64 | 6 |
| Red Pike | 1996 | 64 | 64 | ? |
| XTEA | 1997 | 128 | 64 | "64,32" |
| ICE | 1997 | 64 | 64 | "16,8" |
| M6 | 1997 | 40-64 | 64 | 10 |
| Square | 1997 | 128 | 128 | 8 |
| Treyfer | 1997 | 64 | 64 | 32 |
| xmx | 1997 | variable | key size | variable even |
| AES | 1998 | 128/192/256 | 128 | 10/12/2014 |
| Triple DES | 1998 | 168/112/56 | 64 | 48 |
| Serpent | 1998 | 128/192/256 | 128 | 32 |
| Twofish | 1998 | 128/192/256 | 128 | 16 |
| SEED | 1998 | 128 | 128 | 16 |
| Skipjack | 1998 | 80 | 64 | 32 |
| CAST-256 | 1998 | "128,160,192,224,256" | 128 | 48 |
| CIPHERUNICORN-E | 1998 | 128 | 64 | 16 |
| Coconut98 | 1998 | 256 | 64 | 8 |
| Crypton | 1998 | 128,192,256 | 128 | 12 |
| CS-Cipher | 1998 | 128 | 64 | 8 |
| DEAL | 1998 | 128/192/256 | 128 | "6,8" |
| DFC | 1998 | 128/192/256 | 128 | 8 |
| E2 | 1998 | 128/192/256 | 128 | 12 |
| FROG | 1998 | 128/192/256 | 128 | 8 |
| LOKI97 | 1998 | 128/192/256 | 128 | 16 |
| Magenta | 1998 | 128/192/256 | 128 | "6,8" |
| MARS | 1998 | 128/192/256 | 128 | 32 |
| RC6 | 1998 | 128/192/256 | 128 | 20 |
| xxtea | 1998 | 128 | 64 | various |
| M8 | 1999 | 64 | 10 | |
| MultiSwap | 1999 | 374 | 64 | |
| UES | 1999 | 128/192/256 | 128 | 48 |
| Camellia | 2000 | 128/192/256 | 128 | 18 or 24 |
| Anubis | 2000 | 128320 | 128 | 12+ |
| CIPHERUNICORN-A | 2000 | 128/192/256 | 128 | 16 |
| Hierocrypt | 2000 | 128 | 64 | 6.5 |
| Kasumi | 2000 | |||
| Khazad | 2000 | 128 | 64 | 8 |
| Mercy | 2000 | 128 | 4096 | 6 |
| Nimbus | 2000 | 128 | 64 | 5 |
| Noekeon | 2000 | 128 | 128 | 128 |
| NUSH | 2000 | 128/192/256 | 64128256 | "9,17,33" |
| Q | 2000 | 128/192/256 | 128 | 8 or 9 |
| SC2000 | 2000 | 128/192/256 | 128 | "6.5,7.5" |
| Zodiac | 2000 | 128/192/256 | 128 | 16 |
| FEA-M | 2001 | 4094 | 4096 | 1 |
| Shacal | 2001 | 128 to 512 | "160, 256" | 80 |
| Spectr-H64 | 2001 | 256 | 64 | 12 |
| ABC | 2002 | 512 | 256 | 17 |
| CIKS-1 | 2002 | 256 | 64 | 8 |
| MESH | 2002 | 128/192/256 | "64, 96,128" | "8.5,10.5,12.5" |
| ARIA | 2003 | 128/192/256 | 128 | "12,14,16" |
| Cryptomeria cipher | 2003 | 56 | 64 | 10 |
| Idea NXT | 2003 | 0-256 | 64128 | 16 |
| SMS4 | 2006 | 128 | 128 | 32 |
| CLEFIA (Sony) | 2007 | 128/192/256 | 128 | "18,22,26" |
| Threefish | 2008 | "256,512,1024" | "256,512,1024" | 72 |
| BEAR/LION | ? | 2^13 to 2^23 | 3 | |
| Libelle | ? | 64 | 160 | "1,8,16,32,64" |
| KeeLoq | 1990s | |||
| Hasty Pudding Cipher | 1998–2006 | 0-513+ | varies | |
| Saville | 1999? | 128 | ? | ? |
| Intel Cascade Cipher | 2005? | 128 | 128 | "10,32" |
| Cobra | 2007? | ? | ? | ? |
References
- Horst Feistel. Block Cipher Cryptographic System, US Patent 3,798,359. Filed June 30, 1971. (IBM)
- Henry Beker and Fred Piper (1982). Cipher Systems: The Protection of Communications. John Wiley & Sons. pp. 263–267. ISBN 0-471-89192-4.
- Joe Kilian and Phillip Rogaway, How to protect DES against exhaustive key search (PostScript), Advances in Cryptology – Crypto '96, Springer-Verlag (1996), pp. 252–267.
- Ingrid Schaumuller-Bichl, Zur Analyse des Data Encryption Standard und Synthese Verwandter Chiffriersysteme, Ph.D. Thesis, Linz university, May 1981. (In German).
- Bruce Schneier, Matt Blaze (December 1994). The MacGuffin Block Cipher Algorithm (PDF/PostScript). 2nd International Workshop on Fast Software Encryption (FSE '94). Leuven: Springer-Verlag. pp. 97–110. Retrieved 2007-08-24.