Explore tens of thousands of sets crafted by our community.
Common Cryptographic Algorithms
30
Flashcards
0/30
AES
Symmetric encryption algorithm, commonly used for secure data transmission and file encryption.
RSA
Asymmetric encryption algorithm, widely used for secure data transmission, especially in public key infrastructures.
SHA-256
Cryptographic hash function, used to generate unique hashes for data integrity verification and signatures.
MD5
Cryptographic hash function, historically used for data integrity checks but now considered weak.
Blowfish
Symmetric encryption algorithm, designed to be a fast and secure alternative to existing standards.
Twofish
Symmetric encryption algorithm, a contender for the AES title, known for its flexibility and security.
Triple DES
Symmetric encryption algorithm, an evolution of DES with higher security through multiple encryption cycles.
DES
Symmetric encryption algorithm, once a standard, now considered insecure due to its short key length.
ECC
Asymmetric encryption algorithm, used for encryption, digital signatures, and key exchange with smaller key sizes.
Diffie-Hellman
Key exchange algorithm, allows secure sharing of a symmetric key over an insecure channel.
ElGamal
Asymmetric encryption algorithm, based on the Diffie-Hellman key exchange and used for secure data encryption and digital signatures.
HMAC
Data integrity algorithm, combines a cryptographic hash function with a secret key, used for message authentication.
PGP
Encryption program, provides cryptographic privacy and authentication through a combination of hashing, data compression, symmetric-key cryptography, and public-key cryptography.
Serpent
Symmetric key block cipher, designed to be a high-security encryption algorithm with resistance to attacks.
RIPEMD-160
Cryptographic hash function, used for applications like Bitcoin that require a moderate level of collision resistance.
Whirlpool
Cryptographic hash function, generates a 512-bit hash and designed for integrity protection and authentication.
CAST-128
Symmetric key block cipher, known for its flexibility in key length and resistance to linear and differential cryptanalysis.
CAST-256
Symmetric key block cipher, designed to be secure and efficient both in hardware and software across a variety of platforms.
RC4
Stream cipher, historically used in protocols like WEP and SSL but now considered insecure.
RC5
Symmetric key block cipher, flexible in block size, key size, and number of rounds.
RC6
Symmetric key block cipher, contender in the AES competition and characterized by its use of data-dependent rotations.
Camellia
Symmetric key block cipher, used in protocols like TLS and IPSec, known for its security and performance.
SEED
Symmetric key block cipher, endorsed by the Korean government with similar structure to AES, offering high levels of security.
IDEA
Symmetric key block cipher, used as the algorithm of choice in the early versions of PGP for high-speed data encryption.
SKIPJACK
Symmetric encryption algorithm, developed by the NSA and used in the Fortezza program for securing government communications.
DSS
Digital signature algorithm, based on the discrete logarithm problem, creating signatures for data authenticity and integrity.
ECDSA
Digital signature algorithm, an elliptic curve variation of DSS offering the same security level with smaller key sizes.
Chacha20
Stream cipher, designed to improve upon the performance of the predecessors like Salsa20/20, suitable for high-performance encryption tasks.
Poly1305
Message authentication code, often used together with Chacha20 to secure network communication protocols like TLS.
Salsa20/20
Stream cipher, used for encryption purposes when high throughput is required, like in VPN services or disk encryption.
© Hypatia.Tech. 2024 All rights reserved.