Questions about this topic? Sign up to ask in the talk tab.
List of cryptography functions
From NetSec
Revision as of 19:03, 17 October 2015 by User (Talk | contribs) (Created page with "{| {{table}} |+ Encryption Quick Reference | align="center" style="background:#f0f0f0;"|'''Name''' | align="center" style="background:#f0f0f0;"|'''Value''' |- | Recommended mi...")
| Name | Value |
| Recommended minimum key size (symmetric) | 128 bits |
| Recommended minimum key size (asymmetric) | 2048 bits |
| Preferred minimum key size (symmetric) | 256 bits |
| Preferred minimum key size (asymmetric) | 4096 bits |
| Cipher | Mode | Bits | Stream? | Estimated Time to Crack | Should use? | Notes |
| RSA | 1024-4096 | |||||
| DES | No | |||||
| 3DES | No | |||||
| Blowfish | ECB | No | No | This is the primary mode of encryption used in IRC encryption plugins. | ||
| Blowfish | CBC | No | No* | For most uses, this is a weak cryptosystem. For IRC, still preferred to Blowfish-ECB. | ||
| Hash | Bits | Broken? | Should use? | Notes |
| MD5 | 128 | Yes | No | Collisions can be generated at will with desktop computational power. |
| SHA-1 | 160 | Yes | No | Collision are expensive to generate, but a sufficiently motivated adversary can do it. |
| SHA-2 | 224-512 | No | Yes | Pseudo-collisions generated with partial SHA-256, no full attacks. |
| SHA-3 (Keccak) | 224-512 | No | Yes | Not widely implemented yet. |