Brainstorming Internet and Computing Security

Sunday, March 31, 2013

What's a good list of encryption algorithms?

Pre-Computing
Caesar Shift
Playfair
Rail Fence Cipher
Beale Ciphers
Vigenere

Old (Obsolete)
RC4
WEP
DES
3DES
Hill
Vigenere

Standard
AES (US) [Rijndael]
Serpent (Israel)
GOST (Russia)
IDEA (Europe)
WPA2

New (not mathematically "well investigated")
Two Fish
Blowfish
Phelix
Safer
Digital Vigenere
FROG
DEAL
RC6

Hash Algorithm names:
Old
md5
SHA1

New
SHA512
Whirlpool
RipeMD
Skein

Encryption primer
Posted by Unknown at 7:51 PM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Blog Archive

  • ▼  2013 (21)
    • ►  April (5)
    • ▼  March (16)
      • A simple model to explain the Diffie-Hellman Key E...
      • Hypothetical Key Logger defeat
      • What's a good list of encryption algorithms?
      • WinRar can span compressed files over DVD's or eve...
      • Truecrypt password vectors can be approximated.
      • How do you satisfactorily erase flash media?
      • How big is RSA keyspace?
      • Antivirus gambit - hash code identifiers
      • Flushing DNS used to burden an A.P.T., with IP add...
      • RFID chips can improve secure dongles.
      • Novel CAPTCHA use?
      • Whitelists and Blacklists are not mutually exclusive.
      • Internet Infrastructure improvement?
      • Google Alerts go stale in Three (3) Days!
      • Interactive Voice Recognition on Youtube?
      • Newspaper publishing v Academic publishing

About Me

Unknown
View my complete profile
Awesome Inc. theme. Powered by Blogger.