Questions about this topic? Sign up to ask in the talk tab.

List of cryptography functions

From NetSec
Revision as of 19:03, 17 October 2015 by User (Talk | contribs) (Created page with "{| {{table}} |+ Encryption Quick Reference | align="center" style="background:#f0f0f0;"|'''Name''' | align="center" style="background:#f0f0f0;"|'''Value''' |- | Recommended mi...")

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
Encryption Quick Reference
Name Value
Recommended minimum key size (symmetric) 128 bits
Recommended minimum key size (asymmetric) 2048 bits
Preferred minimum key size (symmetric) 256 bits
Preferred minimum key size (asymmetric) 4096 bits


Encryption algorithms
Cipher Mode Bits Stream? Estimated Time to Crack Should use? Notes
RSA 1024-4096
DES No
3DES No
Blowfish ECB No No This is the primary mode of encryption used in IRC encryption plugins.
Blowfish CBC No No* For most uses, this is a weak cryptosystem. For IRC, still preferred to Blowfish-ECB.


Hash functions
Hash Bits Broken? Should use? Notes
MD5 128 Yes No Collisions can be generated at will with desktop computational power.
SHA-1 160 Yes No Collision are expensive to generate, but a sufficiently motivated adversary can do it.
SHA-2 224-512 No Yes Pseudo-collisions generated with partial SHA-256, no full attacks.
SHA-3 (Keccak) 224-512 No Yes Not widely implemented yet.