Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Common Cryptographic Algorithms

30

Flashcards

0/30

Still learning
StarStarStarStar

Blowfish

StarStarStarStar

Symmetric encryption algorithm, designed to be a fast and secure alternative to existing standards.

StarStarStarStar

IDEA

StarStarStarStar

Symmetric key block cipher, used as the algorithm of choice in the early versions of PGP for high-speed data encryption.

StarStarStarStar

RSA

StarStarStarStar

Asymmetric encryption algorithm, widely used for secure data transmission, especially in public key infrastructures.

StarStarStarStar

Twofish

StarStarStarStar

Symmetric encryption algorithm, a contender for the AES title, known for its flexibility and security.

StarStarStarStar

HMAC

StarStarStarStar

Data integrity algorithm, combines a cryptographic hash function with a secret key, used for message authentication.

StarStarStarStar

Triple DES

StarStarStarStar

Symmetric encryption algorithm, an evolution of DES with higher security through multiple encryption cycles.

StarStarStarStar

ECDSA

StarStarStarStar

Digital signature algorithm, an elliptic curve variation of DSS offering the same security level with smaller key sizes.

StarStarStarStar

ECC

StarStarStarStar

Asymmetric encryption algorithm, used for encryption, digital signatures, and key exchange with smaller key sizes.

StarStarStarStar

SEED

StarStarStarStar

Symmetric key block cipher, endorsed by the Korean government with similar structure to AES, offering high levels of security.

StarStarStarStar

Diffie-Hellman

StarStarStarStar

Key exchange algorithm, allows secure sharing of a symmetric key over an insecure channel.

StarStarStarStar

CAST-256

StarStarStarStar

Symmetric key block cipher, designed to be secure and efficient both in hardware and software across a variety of platforms.

StarStarStarStar

DSS

StarStarStarStar

Digital signature algorithm, based on the discrete logarithm problem, creating signatures for data authenticity and integrity.

StarStarStarStar

RIPEMD-160

StarStarStarStar

Cryptographic hash function, used for applications like Bitcoin that require a moderate level of collision resistance.

StarStarStarStar

RC4

StarStarStarStar

Stream cipher, historically used in protocols like WEP and SSL but now considered insecure.

StarStarStarStar

Chacha20

StarStarStarStar

Stream cipher, designed to improve upon the performance of the predecessors like Salsa20/20, suitable for high-performance encryption tasks.

StarStarStarStar

SHA-256

StarStarStarStar

Cryptographic hash function, used to generate unique hashes for data integrity verification and signatures.

StarStarStarStar

RC6

StarStarStarStar

Symmetric key block cipher, contender in the AES competition and characterized by its use of data-dependent rotations.

StarStarStarStar

ElGamal

StarStarStarStar

Asymmetric encryption algorithm, based on the Diffie-Hellman key exchange and used for secure data encryption and digital signatures.

StarStarStarStar

Whirlpool

StarStarStarStar

Cryptographic hash function, generates a 512-bit hash and designed for integrity protection and authentication.

StarStarStarStar

Serpent

StarStarStarStar

Symmetric key block cipher, designed to be a high-security encryption algorithm with resistance to attacks.

StarStarStarStar

RC5

StarStarStarStar

Symmetric key block cipher, flexible in block size, key size, and number of rounds.

StarStarStarStar

SKIPJACK

StarStarStarStar

Symmetric encryption algorithm, developed by the NSA and used in the Fortezza program for securing government communications.

StarStarStarStar

CAST-128

StarStarStarStar

Symmetric key block cipher, known for its flexibility in key length and resistance to linear and differential cryptanalysis.

StarStarStarStar

Poly1305

StarStarStarStar

Message authentication code, often used together with Chacha20 to secure network communication protocols like TLS.

StarStarStarStar

PGP

StarStarStarStar

Encryption program, provides cryptographic privacy and authentication through a combination of hashing, data compression, symmetric-key cryptography, and public-key cryptography.

StarStarStarStar

DES

StarStarStarStar

Symmetric encryption algorithm, once a standard, now considered insecure due to its short key length.

StarStarStarStar

MD5

StarStarStarStar

Cryptographic hash function, historically used for data integrity checks but now considered weak.

StarStarStarStar

Camellia

StarStarStarStar

Symmetric key block cipher, used in protocols like TLS and IPSec, known for its security and performance.

StarStarStarStar

AES

StarStarStarStar

Symmetric encryption algorithm, commonly used for secure data transmission and file encryption.

StarStarStarStar

Salsa20/20

StarStarStarStar

Stream cipher, used for encryption purposes when high throughput is required, like in VPN services or disk encryption.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.