algorithm principle query: http://mathworld.wolfram.com
Cryptographic hash function (Message digest algorithm, message authentication code, MD algorithm)
- Keyed-hash Message Authentication Code
- EMAC (Nessie selection MAC)
- HMAC (Nessie selection MAC; ISO/IEC 9797-1,fips and IETF RFC)
- Ttmac also called Two-track-mac (Nessie selection MAC; K.U.Leuven (Belgium) & Debis AG (Germany))
- UMAC (Nessie selection MAC; Intel,unevada reno,ibm,technion,& ucal Davis)
- MD5 (one of the series Message digest algorithms, presented by Professor Ron Rivest of MIT; 128-bit summary)
- SHA-1 (160-bit digest developed by the NSA, one of the FIPS standards; The first release release was found to be defective and replaced by this version; Nist/nsa has released several variants with longer ' digest ' lengths; Cryptrec recommended (limited))
- SHA-256 (Nessie series message digest algorithm, FIPS standard one 180-2, digest length 256-bit CRYPTREC recommendation)
- SHA-384 (Nessie column message digest algorithm, FIPS standard one 180-2, digest length 384 bits; CRYPTREC recommendation)
- SHA-512 (Nessie column message digest algorithm, FIPS standard one 180-2, digest length 512 bits; CRYPTREC recommendation)
- RIPEMD-160 (developed in Europe for RIPE projects, 160-bit summaries; Cryptrec recommended (limited))
- Tiger (by Ross Anderson et al)
- Snefru
- Whirlpool (Nessie selection Hash Function,scopus Tecnologia S.A. (Brazil) & K.U.Leuven (Belgium))
Public/private key encryption Algorithm (also known as asymmetric key algorithm)
- Ace-kem (Nessie selection asymmetric encryption scheme; IBM Zurich)
- ACE Encrypt
- Chor-rivest
- Diffie-hellman (key agreement; Cryptrec recommended)
- El Gamal (Discrete logarithm)
- ECC (elliptic curve cipher algorithm) (Discrete logarithm variant)
- Psec-kem (Nessie selection asymmetric encryption scheme; NTT (Japan); Cryptrec recommendation only in DEM construction W/SEC1 parameters))
- Ecies (Elliptic Curve Integrated encryption System; Certicom Corp)
- Ecies-kem
- ECDH (Elliptic Curve diffie-hellman key protocol; CRYPTREC recommended)
- EPOC
- Merkle-hellman (knapsack scheme)
- McEliece
- Ntruencrypt
- RSA (Factoring)
- Rsa-kem (Nessie selection asymmetric encryption scheme; ISO/IEC 18033-2 draft)
- RSA-OAEP (Cryptrec recommended)
- Rabin cryptosystem (Factor decomposition)
- Rabin-saep
- Hime (R)
- XTR
Public/private key signature Algorithm
- DSA (zh: digital signatures; ZH-TW: Digital Signature Algorithm) (from Nsa,zh: digitally signed; ZH-TW: part of the digit seal standard (DSS); Cryptrec recommended)
- Elliptic Curve DSA (Nessie selection digital signature scheme; Certicom Corp); Cryptrec recommendation as ANSI X9.62,SEC1)
- Schnorr signatures
- RSA Signature
- RSA-PSS (Nessie selection digital signature scheme; RSA Laboratories); Cryptrec recommendation)
- RSASSA-PKCS1 v1.5 (CRYPTREC recommendation)
- Nyberg-rueppel signatures
- MQV protocol
- Gennaro-halevi-rabin Signature Scheme
- Cramer-shoup Signature Scheme
- One-time signatures
- Lamport Signature Scheme
- Bos-chaum Signature Scheme
- Undeniable signatures
- Chaum-van Antwerpen Signature Scheme
- Fail-stop signatures
- Ong-schnorr-shamir Signature Scheme
- birational permutation scheme
- ESIGN
- Esign-d
- Esign-r
- Direct Anonymous Attestation
- Ntrusign public key encryption algorithm for mobile devices, the key is relatively short but also can achieve high-density key ECC encryption effect
- Sflash (Nessie selection Digital signature scheme (ESP for smartcard applications and similar); Schlumberger (France))
- Quartz
"2"hyperledger/febric: List of common cryptographic algorithm classifications