Research Article

Security Requirements for Multimedia Archives

Table 1

Known attacks for cryptographic primitives.

ClassAlgorithmKnown attackComplexity

Block cipherDESDifferential cryptanalysis249
Block cipherDESLinear cryptanalysis243
Stream cipherRC4Royal Holloway attack224
Hash functionMD4Differential cryptanalysis28
Hash functionMD5Differential cryptanalysis219
Hash functionRIPEMDDifferential cryptanalysis216