There are a number of
standards Standard may refer to:
Symbols
* Colours, standards and guidons, kinds of military signs
* Standard (emblem), a type of a large symbol or emblem used for identification
Norms, conventions or requirements
* Standard (metrology), an object t ...
related to
cryptography
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
. Standard algorithms and protocols provide a focus for study; standards for popular applications attract a large amount of
cryptanalysis
Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic se ...
.
Encryption standards
*
Data Encryption Standard
The Data Encryption Standard (DES ) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cryp ...
(DES, now obsolete)
*
Advanced Encryption Standard
The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
AES is a variant ...
(AES)
*
RSA the original public key algorithm
*
OpenPGP
Hash standards
*
MD5
The MD5 message-digest algorithm is a widely used hash function producing a 128-bit hash value. MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, and was specified in 1992 as Request for Comments, RFC 1321.
MD5 ...
128-bit (obsolete)
*
SHA-1
In cryptography, SHA-1 (Secure Hash Algorithm 1) is a hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest – typically rendered as 40 hexadecimal digits. It was designed by the United States ...
160-bit (obsolete)
*
SHA-2
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published in 2001. They are built using the Merkle–Damgård construction, from a one-way compression ...
available in 224, 256, 384, and 512-bit variants
*
HMAC
In cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a se ...
keyed hash
* PBKDF2
Key derivation function
In cryptography, a key derivation function (KDF) is a cryptographic algorithm that derives one or more secret keys from a secret value such as a master key, a password, or a passphrase using a pseudorandom function (which typically uses a cr ...
(RFC 2898)
Digital signature standards
* Digital Signature Standard (DSS), based on the
Digital Signature Algorithm
The Digital Signature Algorithm (DSA) is a Public-key cryptography, public-key cryptosystem and Federal Information Processing Standards, Federal Information Processing Standard for digital signatures, based on the mathematical concept of modular e ...
(DSA)
*
RSA
*
Elliptic Curve DSA
Public-key infrastructure (PKI) standards
*
X.509 Public Key Certificates
Wireless Standards
*
Wired Equivalent Privacy
Wired Equivalent Privacy (WEP) is an obsolete, and insecure security algorithm for 802.11 wireless networks. It was introduced as part of the original IEEE 802.11 standard ratified in 1997. The intention was to provide a level of security and pr ...
(WEP), severely flawed and superseded by WPA
*
Wi-Fi Protected Access
Wi-Fi Protected Access (WPA) (Wireless Protected Access), Wi-Fi Protected Access 2 (WPA2), and Wi-Fi Protected Access 3 (WPA3) are the three security certification programs developed after 2000 by the Wi-Fi Alliance to secure wireless computer n ...
(WPA) better than WEP, a 'pre-standard' partial version of 802.11i
*
802.11i a.k.a. WPA2, uses
AES and other improvements on WEP
*
A5/1 and
A5/2 cell phone encryption for
GSM
The Global System for Mobile Communications (GSM) is a family of standards to describe the protocols for second-generation (2G) digital cellular networks, as used by mobile devices such as mobile phones and Mobile broadband modem, mobile broadba ...
U.S. Government Federal Information Processing Standards (FIPS)
*FIPS PUB 31 Guidelines for Automatic Data Processing Physical Security and Risk Management 1974
*FIPS PUB 46-3 Data Encryption Standard (
DES) 1999
*FIPS PUB 73 Guidelines for Security of Computer Applications 1980
*FIPS PUB 74 Guidelines for Implementing and Using the
NBS Data Encryption Standard
The Data Encryption Standard (DES ) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cryp ...
1981
*FIPS PUB 81
DES Modes of Operation 1980
*FIPS PUB 102 Guideline for Computer Security Certification and Accreditation 1983
*FIPS PUB 112 Password Usage 1985, defines 10 factors to be considered in access control systems that are based on passwords
*FIPS PUB 113 Computer Data Authentication 1985, specifies a Data Authentication Algorithm (DAA) based on
DES, adopted by the
Department of Treasury and the banking community to protect electronic fund transfers.
*FIPS PUB 140-2 Security Requirements for Cryptographic Modules 2001, defines four increasing security levels
*FIPS PUB 171 Key Management Using
ANSI
The American National Standards Institute (ANSI ) is a private nonprofit organization that oversees the development of voluntary consensus standards for products, services, processes, systems, and personnel in the United States. The organiz ...
X9.17 (ANSI X9.17-1985) 1992, based on
DES
*FIPS PUB 180-2 Secure Hash Standard (SHS) 2002 defines the
SHA family
*FIPS PUB 181 Automated Password Generator (APG) 1993
*FIPS PUB 185 Escrowed Encryption Standard (EES) 1994, a
key escrow system that provides for decryption of telecommunications when lawfully authorized.
*FIPS PUB 186-2 Digital Signature Standard (
DSS) 2000
*FIPS PUB 190 Guideline for the Use of Advanced
Authentication
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an Logical assertion, assertion, such as the Digital identity, identity of a computer system user. In contrast with iden ...
Technology Alternatives 1994
*FIPS PUB 191 Guideline for the Analysis of
local area network
A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, campus, or building, and has its network equipment and interconnects locally managed. LANs facilitate the distribution of da ...
Security 1994
*FIPS PUB 196 Entity
Authentication
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an Logical assertion, assertion, such as the Digital identity, identity of a computer system user. In contrast with iden ...
Using
Public Key Cryptography
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic al ...
1997
*FIPS PUB 197 Advanced Encryption Standard (
AES) 2001
*FIPS PUB 198 The Keyed-Hash Message Authentication Code (
HMAC
In cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a se ...
) 2002
Internet Requests for Comments (RFCs)
{{Empty section, date=July 2010
Classified Standards
*
EKMS NSA's Electronic Key Management System
*
FNBDT
The Secure Communications Interoperability Protocol (SCIP) is a US standard for secure voice and data communication, focircuit-switchedone-to-one connections, not packet-switched networks. SCIP derived from the US Government Future Narrowband Di ...
NSA's secure narrow band voice standard
*
Fortezza encryption based on portable crypto token in
PC Card
PC Card is a technical standard specifying an expansion card interface for laptops and personal digital assistants, PDAs. The PCMCIA originally introduced the 16-bit Industry Standard Architecture, ISA-based PCMCIA Card in 1990, but renamed it to ...
format
*
STE secure telephone
*
STU-III
STU-III (Secure Telephone Unit - third generation) is a family of secure telephones introduced in 1987 by the NSA for use by the United States government, its contractors, and its allies. STU-III desk units look much like typical office telephon ...
older secure telephone
*
TEMPEST prevents compromising emanations
Other
*
IPsec Virtual Private Network (
VPN) and more
*
IEEE
The Institute of Electrical and Electronics Engineers (IEEE) is an American 501(c)(3) organization, 501(c)(3) public charity professional organization for electrical engineering, electronics engineering, and other related disciplines.
The IEEE ...
P1363 covers most aspects of public-key cryptography
*
Transport Layer Security
Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network, such as the Internet. The protocol is widely used in applications such as email, instant messaging, and voice over ...
(formerly SSL)
*
SSH secure
Telnet
Telnet (sometimes stylized TELNET) is a client-server application protocol that provides access to virtual terminals of remote systems on local area networks or the Internet. It is a protocol for bidirectional 8-bit communications. Its main ...
and more
*
Content Scrambling System (CSS, the
DVD
The DVD (common abbreviation for digital video disc or digital versatile disc) is a digital optical disc data storage format. It was invented and developed in 1995 and first released on November 1, 1996, in Japan. The medium can store any ki ...
encryption standard, broken by
DeCSS)
*
Kerberos authentication standard
*
RADIUS
In classical geometry, a radius (: radii or radiuses) of a circle or sphere is any of the line segments from its Centre (geometry), center to its perimeter, and in more modern usage, it is also their length. The radius of a regular polygon is th ...
authentication standard
* ANSI X9.59 electronic payment standard
*
Common Criteria
The Common Criteria for Information Technology Security Evaluation (referred to as Common Criteria or CC) is an international standard (International Organization for Standardization, ISO/International Electrotechnical Commission, IEC 15408) for co ...
Trusted operating system
Trusted Operating System (TOS) generally refers to an operating system that provides sufficient support for multilevel security and evidence of correctness to meet a particular set of government requirements.
The most common set of criteria for tr ...
standard
*
CRYPTREC Japanese Government's cryptography recommendations
See also
*
NSA cryptography
*
Topics in cryptography
The following outline is provided as an overview of and topical guide to cryptography:
Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer scie ...
Technology-related lists