Chapter 27: Cryptographic Algorithms
Symmetric
DES, 3DES (block)
AES (block)
Blowfish, Twofish (block)
RC2, RC4 (stream), RC5 (block), RC6 (block)
Asymmetric
RSA
DSA
Elliptic Curve (ECC – requires less power, good for mobile)
PGP / GPG
Digital Signatures
RSA
DSA
Key Exchange
Diffie-Hellman
KEA, IKEA, etc.
Hashing
MD5
SHA-1, SHA-2, SHA-3
HMAC
RIPEMD
Key Stretching
Obfuscation
XOR
ROT13
Substitution ciphers