"2"hyperledger/febric: List of common cryptographic algorithm classifications

Source: Internet
Author: User
Tags asymmetric encryption

algorithm principle query: http://mathworld.wolfram.com
Cryptographic hash function (Message digest algorithm, message authentication code, MD algorithm)
  • Keyed-hash Message Authentication Code
  • EMAC (Nessie selection MAC)
  • HMAC (Nessie selection MAC; ISO/IEC 9797-1,fips and IETF RFC)
  • Ttmac also called Two-track-mac (Nessie selection MAC; K.U.Leuven (Belgium) & Debis AG (Germany))
  • UMAC (Nessie selection MAC; Intel,unevada reno,ibm,technion,& ucal Davis)
  • MD5 (one of the series Message digest algorithms, presented by Professor Ron Rivest of MIT; 128-bit summary)
  • SHA-1 (160-bit digest developed by the NSA, one of the FIPS standards; The first release release was found to be defective and replaced by this version; Nist/nsa has released several variants with longer ' digest ' lengths; Cryptrec recommended (limited))
  • SHA-256 (Nessie series message digest algorithm, FIPS standard one 180-2, digest length 256-bit CRYPTREC recommendation)
  • SHA-384 (Nessie column message digest algorithm, FIPS standard one 180-2, digest length 384 bits; CRYPTREC recommendation)
  • SHA-512 (Nessie column message digest algorithm, FIPS standard one 180-2, digest length 512 bits; CRYPTREC recommendation)
  • RIPEMD-160 (developed in Europe for RIPE projects, 160-bit summaries; Cryptrec recommended (limited))
  • Tiger (by Ross Anderson et al)
  • Snefru
  • Whirlpool (Nessie selection Hash Function,scopus Tecnologia S.A. (Brazil) & K.U.Leuven (Belgium))
Public/private key encryption Algorithm (also known as asymmetric key algorithm)
  • Ace-kem (Nessie selection asymmetric encryption scheme; IBM Zurich)
  • ACE Encrypt
  • Chor-rivest
  • Diffie-hellman (key agreement; Cryptrec recommended)
  • El Gamal (Discrete logarithm)
  • ECC (elliptic curve cipher algorithm) (Discrete logarithm variant)
  • Psec-kem (Nessie selection asymmetric encryption scheme; NTT (Japan); Cryptrec recommendation only in DEM construction W/SEC1 parameters))
  • Ecies (Elliptic Curve Integrated encryption System; Certicom Corp)
  • Ecies-kem
  • ECDH (Elliptic Curve diffie-hellman key protocol; CRYPTREC recommended)
  • EPOC
  • Merkle-hellman (knapsack scheme)
  • McEliece
  • Ntruencrypt
  • RSA (Factoring)
  • Rsa-kem (Nessie selection asymmetric encryption scheme; ISO/IEC 18033-2 draft)
  • RSA-OAEP (Cryptrec recommended)
  • Rabin cryptosystem (Factor decomposition)
  • Rabin-saep
  • Hime (R)
  • XTR
Public/private key signature Algorithm
  • DSA (zh: digital signatures; ZH-TW: Digital Signature Algorithm) (from Nsa,zh: digitally signed; ZH-TW: part of the digit seal standard (DSS); Cryptrec recommended)
  • Elliptic Curve DSA (Nessie selection digital signature scheme; Certicom Corp); Cryptrec recommendation as ANSI X9.62,SEC1)
  • Schnorr signatures
  • RSA Signature
  • RSA-PSS (Nessie selection digital signature scheme; RSA Laboratories); Cryptrec recommendation)
  • RSASSA-PKCS1 v1.5 (CRYPTREC recommendation)
  • Nyberg-rueppel signatures
  • MQV protocol
  • Gennaro-halevi-rabin Signature Scheme
  • Cramer-shoup Signature Scheme
  • One-time signatures
  • Lamport Signature Scheme
  • Bos-chaum Signature Scheme
  • Undeniable signatures
  • Chaum-van Antwerpen Signature Scheme
  • Fail-stop signatures
  • Ong-schnorr-shamir Signature Scheme
  • birational permutation scheme
  • ESIGN
  • Esign-d
  • Esign-r
  • Direct Anonymous Attestation
  • Ntrusign public key encryption algorithm for mobile devices, the key is relatively short but also can achieve high-density key ECC encryption effect
  • Sflash (Nessie selection Digital signature scheme (ESP for smartcard applications and similar); Schlumberger (France))
  • Quartz

"2"hyperledger/febric: List of common cryptographic algorithm classifications

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.