mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-21 18:33:03 +00:00
Create crypto_algorithms.md
This commit is contained in:
parent
1f798668f7
commit
70b77c6d36
1 changed files with 279 additions and 0 deletions
279
crypto/crypto_algorithms.md
Normal file
279
crypto/crypto_algorithms.md
Normal file
|
@ -0,0 +1,279 @@
|
|||
# Cryptographic Algorithms
|
||||
|
||||
<table>
|
||||
<tbody>
|
||||
<tr>
|
||||
<th scope="col">Algorithm</th>
|
||||
<th scope="col">Operation</th>
|
||||
<th scope="col">Status</th>
|
||||
<th scope="col">Alternative</th>
|
||||
<th scope="col">QCR<a href="https://www.cisco.com/c/en/us/about/security-center/next-generation-cryptography.html#ftn1"><sup>1</sup></a></th>
|
||||
<th scope="col">Mitigation</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>DES</td>
|
||||
<td>Encryption</td>
|
||||
<td>Avoid</td>
|
||||
<td>AES</td>
|
||||
<td>—</td>
|
||||
<td>—</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>3DES</td>
|
||||
<td>Encryption</td>
|
||||
<td>Legacy</td>
|
||||
<td>AES</td>
|
||||
<td>—</td>
|
||||
<td>Short key lifetime</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>RC4</td>
|
||||
<td>Encryption</td>
|
||||
<td>Avoid</td>
|
||||
<td>AES</td>
|
||||
<td>—</td>
|
||||
<td>—</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<p>AES-CBC mode</p>
|
||||
<p>AES-GCM mode</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>Encryption</p>
|
||||
<p>Authenticated encryption</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>Acceptable</p>
|
||||
<p>NGE<a href="https://www.cisco.com/c/en/us/about/security-center/next-generation-cryptography.html#ftn2"><sup>2</sup></a></p>
|
||||
</td>
|
||||
<td>
|
||||
<p>AES-GCM</p>
|
||||
<p>—</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>✓ (256-bit)</p>
|
||||
<p>✓ (256-bit)</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>—</p>
|
||||
<p>—</p>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<p>DH-768, -1024</p>
|
||||
<p>RSA-768, -1024</p>
|
||||
DSA-768, -1024</td>
|
||||
<td>
|
||||
<p>Key exchange</p>
|
||||
<p>Encryption</p>
|
||||
<p>Authentication</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>Avoid</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>DH-3072 (Group 15)</p>
|
||||
<p>RSA-3072</p>
|
||||
DSA-3072</td>
|
||||
<td>
|
||||
<p>—</p>
|
||||
<p>—</p>
|
||||
<p>—</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>—</p>
|
||||
<p>—</p>
|
||||
<p>—</p>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<p>DH-2048</p>
|
||||
<p>RSA-2048</p>
|
||||
DSA-2048</td>
|
||||
<td>
|
||||
<p>Key exchange</p>
|
||||
<p>Encryption</p>
|
||||
<p>Authentication</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>Acceptable</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>ECDH-256</p>
|
||||
<p>—</p>
|
||||
ECDSA-256</td>
|
||||
<td>
|
||||
<p>—</p>
|
||||
<p>—</p>
|
||||
<p>—</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>—</p>
|
||||
<p>—</p>
|
||||
<p>—</p>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<p>DH-3072</p>
|
||||
<p>RSA-3072</p>
|
||||
<p>DSA-3072</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>Key exchange</p>
|
||||
<p>Encryption</p>
|
||||
<p>Authentication</p>
|
||||
</td>
|
||||
<td>Acceptable</td>
|
||||
<td>
|
||||
<p>ECDH-256</p>
|
||||
<p>—</p>
|
||||
ECDSA-256</td>
|
||||
<td>
|
||||
<p>—</p>
|
||||
<p>—</p>
|
||||
<p>—</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>—</p>
|
||||
<p>—</p>
|
||||
<p>—</p>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>MD5</td>
|
||||
<td>Integrity</td>
|
||||
<td>Avoid</td>
|
||||
<td>SHA-256</td>
|
||||
<td>—</td>
|
||||
<td>—</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<p>SHA-1</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>Integrity</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>Legacy</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>SHA-256</p>
|
||||
</td>
|
||||
<td>—</td>
|
||||
<td>
|
||||
<p>—</p>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<p>SHA-256</p>
|
||||
<p>SHA-384</p>
|
||||
<p>SHA-512</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>Integrity</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>NGE</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>SHA-384</p>
|
||||
<p>—</p>
|
||||
<p>—</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>—</p>
|
||||
<p>✓</p>
|
||||
<p>✓</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>—</p>
|
||||
<p>—</p>
|
||||
<p>—</p>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>HMAC-MD5</td>
|
||||
<td>Integrity</td>
|
||||
<td>Legacy</td>
|
||||
<td>HMAC-SHA-256</td>
|
||||
<td>—</td>
|
||||
<td>Short key lifetime</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>HMAC-SHA-1</td>
|
||||
<td>Integrity</td>
|
||||
<td>Acceptable</td>
|
||||
<td>HMAC-SHA-256</td>
|
||||
<td>—</td>
|
||||
<td>—</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>HMAC-SHA-256</td>
|
||||
<td>Integrity</td>
|
||||
<td>NGE</td>
|
||||
<td>—</td>
|
||||
<td>✓</td>
|
||||
<td>—</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<p>ECDH-256</p>
|
||||
ECDSA-256</td>
|
||||
<td>
|
||||
<p>Key exchange</p>
|
||||
<p>Authentication</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>Acceptable</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>ECDH-384</p>
|
||||
ECDSA-384</td>
|
||||
<td>
|
||||
<p>—</p>
|
||||
<p>—</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>—</p>
|
||||
<p>—</p>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<p>ECDH-384</p>
|
||||
ECDSA-384</td>
|
||||
<td>
|
||||
<p>Key exchange</p>
|
||||
<p>Authentication</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>NGE</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>—</p>
|
||||
<p>—</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>—</p>
|
||||
<p>—</p>
|
||||
</td>
|
||||
<td>
|
||||
<p>—</p>
|
||||
<p>—</p>
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td colspan="6"><a name="ftn1"></a>
|
||||
<p>1. QCR = quantum computer resistant.</p>
|
||||
<a name="ftn2"></a>
|
||||
<p>2. NGE = next generation encryption.</p>
|
||||
</td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
Loading…
Reference in a new issue