Explore tens of thousands of sets crafted by our community.
Cryptography Algorithms
15
Flashcards
0/15
MD5 (Message Digest Algorithm 5)
Type: Cryptographic Hash Function Use-case: Deprecated due to vulnerabilities, formerly used for data integrity checks
SHA-256 (Secure Hash Algorithm 256-bit)
Type: Cryptographic Hash Function Use-case: Data integrity verification, such as file checksums and Blockchain technology
ECC (Elliptic Curve Cryptography)
Type: Asymmetric Key Cryptography Use-case: Providing similar levels of security as RSA but with smaller key sizes, ideal for mobile devices
Serpent
Type: Symmetric Key Cryptography Use-case: An alternative to AES for general encryption tasks
RSA (Rivest–Shamir–Adleman)
Type: Asymmetric Key Cryptography Use-case: Secure data transmission and digital signatures
Blowfish
Type: Symmetric Key Cryptography Use-case: Encrypting data on a lower-resource environment such as embedded systems
PGP (Pretty Good Privacy)
Type: Encryption Program Use-case: Securely transmitting messages and files with both symmetric and asymmetric encryption
AES (Advanced Encryption Standard)
Type: Symmetric Key Cryptography Use-case: Encrypting sensitive data in transit or at rest
DES (Data Encryption Standard)
Type: Symmetric Key Cryptography Use-case: Now obsolete, the first encryption algorithm approved by the US government for public disclosure
Diffie-Hellman Key Exchange
Type: Key Agreement Protocol Use-case: Securely exchanging cryptographic keys over a public channel
Twofish
Type: Symmetric Key Cryptography Use-case: Encryption in software and hardware environments where AES is not suitable
ElGamal Encryption
Type: Asymmetric Key Cryptography Use-case: Encrypting data and ensuring secure key exchange
Scrypt
Type: Password Derivation Function Using-case: Protecting the integrity of cryptocurrencies like Litecoin and for key derivation
HMAC (Hash-based Message Authentication Code)
Type: Message Authentication Code (MAC) Use-case: Verifying data integrity and authenticity of a message with a shared secret key
3DES (Triple Data Encryption Standard)
Type: Symmetric Key Cryptography Use-case: Legacy systems requiring higher security than DES, gradually being phased out
© Hypatia.Tech. 2024 All rights reserved.