AES is the gold standard for symmetric encryption. It is highly trusted and highly secure. Do any other symmetric ciphers - besides OTP - come close to AES's usability, security, trust-ability?
Asked
Active
Viewed 436 times
1 Answers
2
ChaCha20
- Provides 128 or 256-bit key space.
- The best attack against 6 (128-bit) or 7 (256-bit) of 20 rounds
- Stream cipher requires 64-bit nonce and 64-bit position counter
- Used in TLS 1.3, OpenSSH, as well as BSD and Linux kernel RNGs
- Part of ESTREAM portfolio
Serpent
- Provides 128, 192, or 256 bit key space.
- Best attack against 11 or 12 of 32 rounds
- Block cipher with 128-bit block
- AES competition finalist
Twofish
- Provides 128, 192, or 256 bit key space.
- Best attack against 6 of 16 rounds
- Block cipher with 128-bit block and Feistel network design
- AES competition finalist
- Used in disk encryption software, OpenPGP standard, numerous applications
Deoxys-II
- It provides 128 or 256-bit keyspace.
- Authenticated encryption scheme with a 120-bit nonce, nonce misuse resistant
- Based on 16-round tweakable block cipher using AES round function
- Designed to provide better security than AES-GCM
- Part of CAESAR portfolio for use case 3 (maximum security)
Camellia
- Provides 128, 192, or 256-bit key space.
- Block cipher with 128-bit block and Feistel network design
- Patented but royalty-free
- Used in OpenSSL, optional in OpenPGP and numerous other standards
- Part of NESSIE and CRYPTREC portfolios
SEED
- Provides 128-bit key space.
- Best attack against 8 of 16 rounds
- Block cipher with 128-bit block and Feistel network design
- Used primarily in South Korea
CAST-256
- Provides 128 to 256 bit security in 32-bit increments
- Best attack against 28 of 48 rounds
- Block cipher with 128-bit block and Feistel network design
There is the generic multi-target attack on n-bit key ciphers that requires less than the $2^n$ cipher evaluations.
kelalaka
- 49,797
- 12
- 123
- 211