Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "List of cryptography functions"
From NetSec
(Created page with "{| {{table}} |+ Encryption Quick Reference | align="center" style="background:#f0f0f0;"|'''Name''' | align="center" style="background:#f0f0f0;"|'''Value''' |- | Recommended mi...") |
|||
Line 4: | Line 4: | ||
| align="center" style="background:#f0f0f0;"|'''Value''' | | align="center" style="background:#f0f0f0;"|'''Value''' | ||
|- | |- | ||
− | | Recommended | + | | Recommended public key algorithms||Curve25519, Ed25519, ECDSA, RSA |
|- | |- | ||
− | | Recommended minimum key size ( | + | | Recommended symmetric ciphers||Salsa20, ChaCha20, AES |
+ | |- | ||
+ | | Recommended minimum key size (symmetric)||128 bits | ||
|- | |- | ||
| Preferred minimum key size (symmetric)||256 bits | | Preferred minimum key size (symmetric)||256 bits | ||
|- | |- | ||
− | | Preferred minimum key size ( | + | | Recommended minimum key size (RSA)||2048 bits |
+ | |- | ||
+ | | Preferred minimum key size (RSA)||4096 bits | ||
|- | |- | ||
| | | | ||
Line 17: | Line 21: | ||
{| {{table}} | {| {{table}} | ||
− | |+ | + | |+ Symmetric Ciphers |
| align="center" style="background:#f0f0f0;"|'''Cipher''' | | align="center" style="background:#f0f0f0;"|'''Cipher''' | ||
− | | align="center" style="background:#f0f0f0;"|''' | + | | align="center" style="background:#f0f0f0;"|'''Block size (bits)''' |
− | | align="center" style="background:#f0f0f0;"|''' | + | | align="center" style="background:#f0f0f0;"|'''Key size (bits)''' |
| align="center" style="background:#f0f0f0;"|'''Stream?''' | | align="center" style="background:#f0f0f0;"|'''Stream?''' | ||
− | |||
| align="center" style="background:#f0f0f0;"|'''Should use?''' | | align="center" style="background:#f0f0f0;"|'''Should use?''' | ||
+ | | align="center" style="background:#f0f0f0;"|'''Estimated Time to Crack''' | ||
| align="center" style="background:#f0f0f0;"|'''Notes''' | | align="center" style="background:#f0f0f0;"|'''Notes''' | ||
|- | |- | ||
− | | | + | | AES||128||128,192,256||||Yes|| |
− | + | ||
− | + | ||
|- | |- | ||
− | | | + | | DES||64||56|||||No||[https://en.wikipedia.org/wiki/Data_Encryption_Standard#Brute_force_attack In 2008 their COPACOBANA RIVYERA reduced the time to break DES to less than one day, using 128 Spartan-3 5000's.]||No|| |
|- | |- | ||
− | | | + | | 3DES||64||168,112,56|||||No|| |
|- | |- | ||
− | | Blowfish|| | + | | Blowfish||64||32-448|||||Not ideal||||This is the primary mode of encryption used in IRC encryption plugins. |
|- | |- | ||
| | | |
Revision as of 22:36, 17 October 2015
Name | Value |
Recommended public key algorithms | Curve25519, Ed25519, ECDSA, RSA |
Recommended symmetric ciphers | Salsa20, ChaCha20, AES |
Recommended minimum key size (symmetric) | 128 bits |
Preferred minimum key size (symmetric) | 256 bits |
Recommended minimum key size (RSA) | 2048 bits |
Preferred minimum key size (RSA) | 4096 bits |
Cipher | Block size (bits) | Key size (bits) | Stream? | Should use? | Estimated Time to Crack | Notes | |
AES | 128 | 128,192,256 | Yes | ||||
DES | 64 | 56 | No | In 2008 their COPACOBANA RIVYERA reduced the time to break DES to less than one day, using 128 Spartan-3 5000's. | No | ||
3DES | 64 | 168,112,56 | No | ||||
Blowfish | 64 | 32-448 | Not ideal | This is the primary mode of encryption used in IRC encryption plugins. | |||
Hash | Bits | Broken? | Should use? | Notes |
MD5 | 128 | Yes | No | Collisions can be generated at will with desktop computational power. |
SHA-1 | 160 | Yes | No | Collision are expensive to generate, but a sufficiently motivated adversary can do it. |
SHA-2 | 224-512 | No | Yes | Pseudo-collisions generated with partial SHA-256, no full attacks. |
SHA-3 (Keccak) | 224-512 | No | Yes | Not widely implemented yet. |