cryptographicAlgorithms

Name Type Algorithm Method Key Size Strength Replaced By
DES Symmetric 64-bit block cipher 64 bit (56 + 8 parity)

56-bit encryption keys

Very weak 3DES
3DES Symmetric 64-bit block cipher 192 bit (168 bit + 24 parity) Moderate AES
Blowfish Symmetric 64-bit block cipher 32- to 448-bit key
AES Symmetric 128-bit block cipher 128-bit encryption keys

192-bit encryption keys

256-bit encryption keys

Strong N/A
Twofish Symmetric 128-bit block cipher 128-, 192-, or 256-bit key
RC4 – Rivest Cipher 4 Symmetric Stream mode cipher (one bit at a time) 40- to 2,048-bit key
RC5 Symmetric Block mode cipher Variable (up to 2048) Very Strong N/A
RSA Asymmetric Key transport 1024-bit keys Strong N/A
Diffie-Hellman Asymmetric Key exchange N/A Moderate El Gamal
El Gamal Asymmetric Key exchange N/A Very Strong N/A
MD5 Hashing – Integrity Rivest MD5 Block Hash 512 bit block processing

Creates 128-bit hashes / digest

Strong MD6, et. Al.
SHA-1 Hashing – Integrity Rivest SHA Hash 512-bit processing

Creates 160-bit hashes / digest

Very Strong N/A
SHA-2 Hashing – Integrity Hash Creates 224-, 256-, 384-, or 512-bit hashes
HMAC-MD5 Integrity -Authenticity Keyed Digest Creates 128-bit hashes Very Strong N/A
HMAC-SHA1 Integrity – Authenticity Creates 160-bit hashes
RIPEMD Hash Creates 128-, 160-, 256-, or 320-bit hashes

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.