A consolidated reference for the symmetric ciphers exposed by Utilavo's encryption tools. Status, key and block sizes, and deprecation dates are sourced directly from NIST SP 800-131A Rev 2 and SP 800-57 Part 1 Rev 5 so the recommendation column is auditable.
Methodology
Each algorithm row is populated from its current entry in NIST's transition guidance documents. The recommended column reflects the 2026 NIST guidance for new systems; deprecated_year reflects the year the algorithm was first formally disallowed for the relevant federal use case. No measurements are taken — this is a reference matrix, not a benchmark.
See the site-wide research methodology for shared test conditions and tooling.
Dataset
| Algorithm | Key size (bits) | Block size (bits) | NIST status | Deprecated (year) | Recommended for new systems |
|---|---|---|---|---|---|
| AES-128 | 128 | 128 | Approved (FIPS 197) | — | Yes |
| AES-192 | 192 | 128 | Approved (FIPS 197) | — | Yes |
| AES-256 | 256 | 128 | Approved (FIPS 197) | — | Yes (recommended for long-term confidentiality per SP 800-131A Rev 2) |
| Triple-DES (3-key TDEA) | 168 | 64 | Disallowed for federal use after 2023 (SP 800-131A Rev 2) | 2023 | No |
| Triple-DES (2-key TDEA) | 112 | 64 | Disallowed since 2015 (SP 800-131A Rev 1) | 2015 | No |
| DES | 56 | 64 | Withdrawn — FIPS 46-3 withdrawn in 2005 | 2005 | No |
| RC4 | 40-2048 | N/A (stream) | Never approved by NIST; prohibited in TLS by RFC 7465 (2015) | 2015 | No |
Download raw data
The raw CSV contains every row in the table above plus any columns omitted from the rendered view.
Download CSV