Symmetric encryption algorithm (with the same decryption key)
name |
Key Length |
Operation Speed |
Security |
Resource Consumption |
Des |
56 Guests |
More quickly |
Low |
In |
3DES |
112-bit or 168-bit |
Slow |
In |
High |
Aes |
128, 192, 256-bit |
Fast |
High |
Low |
asymmetric algorithm (encryption key and decryption key differ)
name |
Maturity Level |
security (depends on key length) |
Operation Speed |
Resource Consumption |
Rsa |
High |
High |
Slow |
High |
Dsa |
High |
High |
Slow |
Can only be used for digital signatures |
Ecc |
Low |
High |
Fast |
Low (less compute, less storage footprint, lower bandwidth requirements) |
Hash algorithm Comparison
name |
Security |
Speed |
SHA-1 |
High |
Slow |
MD5 |
In |
Fast |
comparison of symmetric and asymmetric algorithms
name |
Key Management |
Security |
Speed |
Symmetric algorithm |
More difficult, not suitable for the internet, generally used in internal systems |
In |
Fast several orders of magnitude (software encryption and decryption speed of at least 100 times times, can decrypt the number of M-bit data per second), suitable for large data volume encryption and decryption processing |
Asymmetric algorithms |
Key easy to manage |
High |
Slow, suitable for small data volumes plus decryption or data signing |
Algorithm selection (from performance and security synthesis)
Symmetric encryption: AES (128-bit),
Asymmetric encryption: ECC (160-bit) or RSA (1024x768),
Message digest: MD5
Digital signature:DSA
Common encryption algorithms