Symmetric encryption algorithms (also called shared keys)
Type |
definition: send receive uses the same symmetric key |
Secret key Length |
Group length |
Number of Cycles |
Security |
Des |
Data Encryption Standard, faster, suitable for encrypting large amounts of data; |
56 |
64 |
16 |
Dependent key Poor search method attack |
3DES |
is based on des symmetric algorithm, a piece of data with three different keys for three times encryption, higher intensity; |
112 168 |
64 |
48 |
Military grade, resistant to differential analysis and correlation |
Aes |
Advanced Encryption Standard, symmetric algorithm, is the next generation of cryptographic algorithm standard, fast, high security level, the current implementation of AES standard is Rijndael algorithm |
128 192 256 |
64 |
10 12 14 |
High security level, advanced Encryption Standard |
Idea |
International data encryption algorithms that provide very strong security with a 128-bit key |
128 |
64 |
8 |
Attacks that can withstand differential cryptographic analysis |
MD5 |
Information-Digest algorithm Message-digest 5 |
128 |
512 |
4 |
The MD5 algorithm is primarily designed for digital signatures |
SHA |
Secure Hashing algorithm Secure Hash algorithm |
160 |
512 |
4 |
Digital signatures can be implemented, similar to MD5 |
Asymmetric encryption Algorithm (also known as public key)
Type |
definition: a pair of public keys and private keys, |
explanation Example |
Rsa |
Based on large prime number decomposition (Ron Rivest,adi Shamir,len Adleman Three-bit genius's name) |
For example: The modulo operation of 7*d=1mod8 is: (7*d)/8 .... 1 d=7 |
Ecc |
Elliptic Curve cipher Coding |
Elliptic Curves Cryptography |
Comparison of Des_3des_aes_ides_rsa cipher algorithms