Dec 5, 2007

Crypto Cheat Sheet

Earlier today I spotted a question from Coop about which crypto algorithms are best for use on production systems. Based on previous experience in producing secure development guidelines and e-Learning content, I was able to compile the following cheat sheet of recommended crypto algorithms:

Hashing: SHA (256/512)
Symmetric: AES (256)
Asymmetric: RSA (2048)
Key exchange: Diffie-Hellman (2048)

Of course, there are a few more algorithms (or variations of the already mentioned algorithms) that can be used for backwards compatibility purposes only. Examples of these are AES (128), Triple DES, RSA (1024), and SHA-1.

NIST has also published a few articles on the matter. (Do a search for the term "recommend")

No comments: