Explore tens of thousands of sets crafted by our community.
Common Cryptographic Algorithms
30
Flashcards
0/30
Blowfish
Symmetric encryption algorithm, designed to be a fast and secure alternative to existing standards.
IDEA
Symmetric key block cipher, used as the algorithm of choice in the early versions of PGP for high-speed data encryption.
RSA
Asymmetric encryption algorithm, widely used for secure data transmission, especially in public key infrastructures.
Twofish
Symmetric encryption algorithm, a contender for the AES title, known for its flexibility and security.
HMAC
Data integrity algorithm, combines a cryptographic hash function with a secret key, used for message authentication.
Triple DES
Symmetric encryption algorithm, an evolution of DES with higher security through multiple encryption cycles.
ECDSA
Digital signature algorithm, an elliptic curve variation of DSS offering the same security level with smaller key sizes.
ECC
Asymmetric encryption algorithm, used for encryption, digital signatures, and key exchange with smaller key sizes.
SEED
Symmetric key block cipher, endorsed by the Korean government with similar structure to AES, offering high levels of security.
Diffie-Hellman
Key exchange algorithm, allows secure sharing of a symmetric key over an insecure channel.
CAST-256
Symmetric key block cipher, designed to be secure and efficient both in hardware and software across a variety of platforms.
DSS
Digital signature algorithm, based on the discrete logarithm problem, creating signatures for data authenticity and integrity.
RIPEMD-160
Cryptographic hash function, used for applications like Bitcoin that require a moderate level of collision resistance.
RC4
Stream cipher, historically used in protocols like WEP and SSL but now considered insecure.
Chacha20
Stream cipher, designed to improve upon the performance of the predecessors like Salsa20/20, suitable for high-performance encryption tasks.
SHA-256
Cryptographic hash function, used to generate unique hashes for data integrity verification and signatures.
RC6
Symmetric key block cipher, contender in the AES competition and characterized by its use of data-dependent rotations.
ElGamal
Asymmetric encryption algorithm, based on the Diffie-Hellman key exchange and used for secure data encryption and digital signatures.
Whirlpool
Cryptographic hash function, generates a 512-bit hash and designed for integrity protection and authentication.
Serpent
Symmetric key block cipher, designed to be a high-security encryption algorithm with resistance to attacks.
RC5
Symmetric key block cipher, flexible in block size, key size, and number of rounds.
SKIPJACK
Symmetric encryption algorithm, developed by the NSA and used in the Fortezza program for securing government communications.
CAST-128
Symmetric key block cipher, known for its flexibility in key length and resistance to linear and differential cryptanalysis.
Poly1305
Message authentication code, often used together with Chacha20 to secure network communication protocols like TLS.
PGP
Encryption program, provides cryptographic privacy and authentication through a combination of hashing, data compression, symmetric-key cryptography, and public-key cryptography.
DES
Symmetric encryption algorithm, once a standard, now considered insecure due to its short key length.
MD5
Cryptographic hash function, historically used for data integrity checks but now considered weak.
Camellia
Symmetric key block cipher, used in protocols like TLS and IPSec, known for its security and performance.
AES
Symmetric encryption algorithm, commonly used for secure data transmission and file encryption.
Salsa20/20
Stream cipher, used for encryption purposes when high throughput is required, like in VPN services or disk encryption.
© Hypatia.Tech. 2024 All rights reserved.