Various encryption and decryption algorithms compare __ algorithm

Source: Internet
Author: User

two . Introduction to cryptographic algorithms

Symmetric encryption algorithm

Symmetric encryption algorithm used to encrypt sensitive data and other information, commonly used algorithms include:

DES (encryption Standard): Data Encryption Standard, faster, suitable for encryption of large amounts of data on the occasion.

3DES (Triple des): is based on DES, a piece of data with three different keys for three times encryption, higher strength.

AES (Advanced encryption Standard): Advanced Encryption Standard, is the next generation of encryption algorithm standard, fast, high security level;

Comparison of AES with 3DES

Algorithm name

Algorithm type

Key length

Speed

Decryption Time (construction machine tries 255 keys per second)

Resource consumption

Aes

Symmetric block password

128, 192, 256 bits

High

149 trillion years

Low

3DES

Symmetric Feistel Password

112-bit or 168-bit

Low

4.6 Billion years

In

Non-symmetric algorithm

RSA: Invented by RSA, is a public key algorithm that supports variable-length keys, and the length of the file blocks that need to be encrypted is also variable;

DSA (Digital Signature algorithm): Digital Signature Algorithm, is a standard DSS (digital signature standard);

ECC (Elliptic Curves cryptography): Elliptic curve cipher coding.

ECC has an absolute advantage over RSA in many ways, mainly in the following areas:

Strong attack resistance. The same key length, its resistance to attack is much stronger than many times.

The computation quantity is small, the processing speed is fast. The total ECC speed is much faster than RSA and DSA.

Storage space is small footprint. ECC's key size and system parameters are much smaller than RSA and DSA, meaning that it occupies a much smaller storage space. This is of particular importance to the application of encryption algorithm in IC card.

Low bandwidth requirements. When a long message is decrypted, the three types of cryptographic systems have the same bandwidth requirements, but the ECC bandwidth requirements are much lower when applied to short messages. Low bandwidth requirements make ECC has a wide application prospect in wireless network field.

The following two representations are the security and speed comparisons of RSA and ECC.

Breach time (MIPS year)

Rsa/dsa (key length)

ECC key length

Rsa/ecc key length is greater than

106

5:1

108

768

132

6:1

1011

1024

160

7:1

1020

2048

21 0

10:1

1078

21000

600

35:1

 

Breach time (MIPS year)

Rsa/dsa (key length)

ECC key length

Rsa/ecc key length than

%

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.