0% found this document useful (0 votes)
26 views

Chapter 2 2_Symmetric and Asymmetric Encryption

The document outlines widely used cryptographic algorithms, categorized into symmetric encryption, asymmetric encryption, hashing algorithms, and hybrid cryptography. Key algorithms discussed include AES, RSA, and SHA-2, highlighting their strengths, weaknesses, and common use cases. It emphasizes the importance of these algorithms in securing communications, data integrity, and authentication.

Uploaded by

Squall Lionheart
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views

Chapter 2 2_Symmetric and Asymmetric Encryption

The document outlines widely used cryptographic algorithms, categorized into symmetric encryption, asymmetric encryption, hashing algorithms, and hybrid cryptography. Key algorithms discussed include AES, RSA, and SHA-2, highlighting their strengths, weaknesses, and common use cases. It emphasizes the importance of these algorithms in securing communications, data integrity, and authentication.

Uploaded by

Squall Lionheart
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Widely Used Cryptographic Algorithms

1. Symmetric Encryption Algorithms (Secret-Key Encryption)

These algorithms use a single key for both encryption and decryption. They are fast and efficient for
large-scale data encryption.

Advanced Encryption Standard (AES)

• Key Sizes: 128-bit, 192-bit, 256-bit

• Block Size: 128-bit

• Strengths: Highly secure, fast, widely adopted (used in TLS, VPNs, disk encryption).

• Use Cases: Wi-Fi security (WPA2, WPA3), file encryption, government use (NIST standard).

Data Encryption Standard (DES) (Deprecated)

• Key Size: 56-bit

• Block Size: 64-bit

• Weaknesses: Vulnerable to brute-force attacks, replaced by AES.

• Use Cases: Previously used in financial systems, now mostly obsolete.

Triple DES (3DES) (Deprecated)

• Key Size: 112-bit or 168-bit

• Block Size: 64-bit

• Strengths: More secure than DES but slower.

• Weaknesses: Deprecated by NIST due to security concerns.

• Use Cases: Used in legacy banking systems and older encryption protocols.

Blowfish

• Key Size: 32-bit to 448-bit

• Block Size: 64-bit

• Strengths: Fast, flexible, open-source.

• Weaknesses: 64-bit block size makes it less secure than AES for large data.

• Use Cases: Password hashing (e.g., bcrypt), VPNs, file encryption.

Twofish

• Key Size: 128-bit, 192-bit, 256-bit

• Block Size: 128-bit


• Strengths: Secure, considered a strong alternative to AES.

• Use Cases: Open-source encryption tools, database security.

2. Asymmetric Encryption Algorithms (Public-Key Cryptography)

These algorithms use a public key for encryption and a private key for decryption, ensuring secure key
exchange and authentication.

RSA (Rivest-Shamir-Adleman)

• Key Sizes: 1024-bit, 2048-bit, 4096-bit

• Strengths: Highly secure, widely used for secure communication.

• Weaknesses: Slow for large data encryption, vulnerable to quantum computing.

• Use Cases: SSL/TLS, digital signatures, secure email (PGP).

Elliptic Curve Cryptography (ECC)

• Key Sizes: 160-bit, 256-bit, 521-bit

• Strengths: Same security as RSA but with smaller keys and faster performance.

• Use Cases: Secure messaging (Signal app), SSL/TLS, cryptocurrency wallets.

Diffie-Hellman (DH) Key Exchange

• Purpose: Secure key exchange between two parties.

• Weaknesses: No authentication (vulnerable to MITM attacks unless combined with digital


signatures).

• Use Cases: Secure key exchange in TLS, VPNs, SSH.

Digital Signature Algorithm (DSA)

• Key Sizes: 1024-bit, 2048-bit, 3072-bit

• Strengths: Used for authentication and data integrity.

• Weaknesses: Not used for encryption, only for signing.

• Use Cases: Secure software updates, digital certificates (SSL/TLS).

3. Hashing Algorithms (Data Integrity & Authentication)

Hashing functions convert data into fixed-length values, ensuring data integrity without encryption.

Secure Hash Algorithm (SHA) Family


• SHA-1 (Deprecated): 160-bit hash, broken by collision attacks.

• SHA-2 (Secure): SHA-256, SHA-384, SHA-512 used in blockchain, SSL/TLS.

• SHA-3: Latest standard, used for post-quantum cryptography.

Message Digest (MD) Family (Obsolete)

• MD5 (128-bit hash): Vulnerable to collisions, not secure.

• Use Case: Still used for checksums but not for security applications.

bcrypt

• Strengths: Secure password hashing with built-in salting.

• Use Cases: Storing passwords securely in databases.

Argon2

• Strengths: Memory-hard function, best for password hashing (winner of Password Hashing
Competition).

• Use Cases: Secure authentication systems.

4. Hybrid Cryptography (Combination of Symmetric & Asymmetric)

Some systems use both types for enhanced security and efficiency.

Transport Layer Security (TLS) (Hybrid)

• Uses RSA or ECC for key exchange.

• Uses AES or ChaCha20 for data encryption.

• Used in HTTPS, VPNs, and secure communication.

Pretty Good Privacy (PGP) (Hybrid)

• Uses RSA for key exchange.

• Uses AES or 3DES for encryption.

• Used in secure email communication.


Summary Table of Widely Used Algorithms

Algorithm
Algorithm Strengths Common Use Cases
Type

Symmetric AES Fast, secure Wi-Fi, VPNs, file encryption

DES (deprecated) Weak security Legacy banking systems

3DES (deprecated) More secure than DES Older banking systems

Blowfish Fast, flexible VPNs, password hashing

Twofish Strong alternative to AES Open-source encryption

Asymmetric RSA Secure, widely used SSL/TLS, digital signatures

ECC Smaller keys, strong security Secure messaging, SSL/TLS

Diffie-Hellman Secure key exchange TLS, SSH, VPNs

DSA Authentication only Digital certificates

SHA-2 (SHA-256, SHA-


Hashing Secure, widely used Blockchain, SSL/TLS
512)

Login systems,
bcrypt Secure password hashing
authentication

Memory-hard, best for


Argon2 Secure authentication
passwords

You might also like