There are a number of
standards Standard may refer to:
Symbols
* Colours, standards and guidons, kinds of military signs
* Standard (emblem), a type of a large symbol or emblem used for identification
Norms, conventions or requirements
* Standard (metrology), an object t ...
related to
cryptography
Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adve ...
. Standard algorithms and protocols provide a focus for study; standards for popular applications attract a large amount of
cryptanalysis.
Encryption standards
*
Data Encryption Standard
The Data Encryption Standard (DES ) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cr ...
(DES, now obsolete)
*
Advanced Encryption Standard
The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
AES is a variant ...
(AES)
*
RSA
RSA may refer to:
Organizations Academia and education
* Rabbinical Seminary of America, a yeshiva in New York City
*Regional Science Association International (formerly the Regional Science Association), a US-based learned society
*Renaissance S ...
the original public key algorithm
*
OpenPGP
Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partiti ...
Hash standards
*
MD5 128-bit (obsolete)
*
SHA-1
In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographically broken but still widely used hash function which takes an input and produces a 160-bit (20- byte) hash value known as a message digest – typically rendered as 40 hexadec ...
160-bit (obsolete)
*
SHA-2
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published in 2001. They are built using the Merkle–Damgård construction, from a one-way compressi ...
available in 224, 256, 384, and 512-bit variants
*
HMAC
In cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secre ...
keyed hash
* PBKDF2
Key derivation function
In cryptography, a key derivation function (KDF) is a cryptographic algorithm that derives one or more secret keys from a secret value such as a master key, a password, or a passphrase using a pseudorandom function (which typically uses a cryp ...
(RFC 2898)
Digital signature standards
* Digital Signature Standard (DSS), based on the
Digital Signature Algorithm
The Digital Signature Algorithm (DSA) is a public-key cryptosystem and Federal Information Processing Standard for digital signatures, based on the mathematical concept of modular exponentiation and the discrete logarithm problem. DSA is a varia ...
(DSA)
*
RSA
RSA may refer to:
Organizations Academia and education
* Rabbinical Seminary of America, a yeshiva in New York City
*Regional Science Association International (formerly the Regional Science Association), a US-based learned society
*Renaissance S ...
*
Elliptic Curve DSA
Public-key infrastructure (PKI) standards
*
X.509 Public Key Certificates
Wireless Standards
*
Wired Equivalent Privacy
Wired Equivalent Privacy (WEP) was a security algorithm for 802.11 wireless networks. Introduced as part of the original IEEE 802.11 standard ratified in 1997, its intention was to provide data confidentiality comparable to that of a traditional ...
(WEP), severely flawed and superseded by WPA
*
Wi-Fi Protected Access
Wi-Fi Protected Access (WPA), Wi-Fi Protected Access II (WPA2), and Wi-Fi Protected Access 3 (WPA3) are the three security and security certification programs developed after 2000 by the Wi-Fi Alliance to secure wireless computer networks. The Al ...
(WPA) better than WEP, a 'pre-standard' partial version of 802.11i
*
802.11i a.k.a. WPA2, uses
AES
AES may refer to:
Businesses and organizations Companies
* AES Corporation, an American electricity company
* AES Data, former owner of Daisy Systems Holland
* AES Eletropaulo, a former Brazilian electricity company
* AES Andes, formerly AES Gener ...
and other improvements on WEP
*
A5/1
A5/1 is a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard. It is one of several implementations of the A5 security protocol. It was initially kept secret, but became public knowledge through l ...
and
A5/2 cell phone encryption for
GSM
U.S. Government Federal Information Processing Standards (FIPS)
*FIPS PUB 31 Guidelines for Automatic Data Processing Physical Security and Risk Management 1974
*FIPS PUB 46-3 Data Encryption Standard (
DES) 1999
*FIPS PUB 73 Guidelines for Security of Computer Applications 1980
*FIPS PUB 74 Guidelines for Implementing and Using the
NBS Data Encryption Standard
The Data Encryption Standard (DES ) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cr ...
1981
*FIPS PUB 81
DES Modes of Operation 1980
*FIPS PUB 102 Guideline for Computer Security Certification and Accreditation 1983
*FIPS PUB 112 Password Usage 1985, defines 10 factors to be considered in access control systems that are based on passwords
*FIPS PUB 113 Computer Data Authentication 1985, specifies a Data Authentication Algorithm (DAA) based on
DES, adopted by the
Department of Treasury and the banking community to protect electronic fund transfers.
*FIPS PUB 140-2 Security Requirements for Cryptographic Modules 2001, defines four increasing security levels
*FIPS PUB 171 Key Management Using
ANSI
The American National Standards Institute (ANSI ) is a private non-profit organization that oversees the development of voluntary consensus standards for products, services, processes, systems, and personnel in the United States. The organ ...
X9.17 (ANSI X9.17-1985) 1992, based on
DES
*FIPS PUB 180-2 Secure Hash Standard (SHS) 2002 defines the
SHA family
*FIPS PUB 181 Automated Password Generator (APG) 1993
*FIPS PUB 185 Escrowed Encryption Standard (EES) 1994, a
key escrow system that provides for decryption of telecommunications when lawfully authorized.
*FIPS PUB 186-2 Digital Signature Standard (
DSS) 2000
*FIPS PUB 190 Guideline for the Use of Advanced
Authentication
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicat ...
Technology Alternatives 1994
*FIPS PUB 191 Guideline for the Analysis of
local area network
A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building. By contrast, a wide area network (WAN) not only covers a larger ...
Security 1994
*FIPS PUB 196 Entity
Authentication
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicat ...
Using
Public Key Cryptography
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
1997
*FIPS PUB 197 Advanced Encryption Standard (
AES
AES may refer to:
Businesses and organizations Companies
* AES Corporation, an American electricity company
* AES Data, former owner of Daisy Systems Holland
* AES Eletropaulo, a former Brazilian electricity company
* AES Andes, formerly AES Gener ...
) 2001
*FIPS PUB 198 The Keyed-Hash Message Authentication Code (
HMAC
In cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secre ...
) 2002
Internet Requests for Comments (RFCs)
{{Empty section, date=July 2010
Classified Standards
*
EKMS NSA's Electronic Key Management System
*
FNBDT NSA's secure narrow band voice standard
*
Fortezza encryption based on portable crypto token in
PC Card
In computing, PC Card is a configuration for computer parallel communication peripheral interface, designed for laptop computers. Originally introduced as PCMCIA, the PC Card standard as well as its successors like CardBus were defined and devel ...
format
*
STE secure telephone
*
STU-III
STU-III (Secure Telephone Unit - third generation) is a family of secure telephones introduced in 1987 by the NSA for use by the United States government, its contractors, and its allies. STU-III desk units look much like typical office telephone ...
older secure telephone
*
TEMPEST
Tempest is a synonym for a storm.
'' The Tempest'' is a play by William Shakespeare.
Tempest or The Tempest may also refer to:
Arts and entertainment Films
* ''The Tempest'' (1908 film), a British silent film
* ''The Tempest'' (1911 film), a ...
prevents compromising emanations
Other
*
IPsec
In computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in ...
Virtual Private Network (
VPN) and more
*
IEEE
The Institute of Electrical and Electronics Engineers (IEEE) is a 501(c)(3) professional association for electronic engineering and electrical engineering (and associated disciplines) with its corporate office in New York City and its operati ...
P1363 covers most aspects of public-key cryptography
*
Transport Layer Security
Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in secu ...
(formerly SSL)
*
SSH secure
Telnet
Telnet is an application protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in-band with Telnet cont ...
and more
*
Content Scrambling System (CSS, the
DVD
The DVD (common abbreviation for Digital Video Disc or Digital Versatile Disc) is a digital optical disc data storage format. It was invented and developed in 1995 and first released on November 1, 1996, in Japan. The medium can store any kin ...
encryption standard, broken by
DeCSS
DeCSS is one of the first free computer programs capable of decrypting content on a commercially produced DVD video disc. Before the release of DeCSS, open source operating systems (such as BSD and Linux) could not play encrypted video DVDs.
...
)
*
Kerberos authentication standard
*
RADIUS
In classical geometry, a radius ( : radii) of a circle or sphere is any of the line segments from its center to its perimeter, and in more modern usage, it is also their length. The name comes from the latin ''radius'', meaning ray but also the ...
authentication standard
* ANSI X9.59 electronic payment standard
*
Common Criteria
The Common Criteria for Information Technology Security Evaluation (referred to as Common Criteria or CC) is an international standard ( ISO/ IEC 15408) for computer security certification. It is currently in version 3.1 revision 5.
Common Criter ...
Trusted operating system standard
*
CRYPTREC Japanese Government's cryptography recommendations
See also
*
Topics in cryptography
The following outline is provided as an overview of and topical guide to cryptography:
Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer scie ...
Technology-related lists