Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Cryptography standards
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Number of standards related to cryptography}} There are a number of '''[[standardization|standards]] related to [[cryptography]]'''. Standard algorithms and protocols provide a focus for study; standards for popular applications attract a large amount of [[cryptanalysis]]. ==Encryption standards== * [[Data Encryption Standard]] (DES, now obsolete) * [[Advanced Encryption Standard]] (AES) * [[RSA (algorithm)|RSA]] the original public key algorithm * [[OpenPGP]] ==Hash standards== * [[MD5]] 128-bit (obsolete) * [[SHA-1]] 160-bit (obsolete) * [[SHA-2]] available in 224, 256, 384, and 512-bit variants * [[HMAC]] keyed hash * PBKDF2 [[Key derivation function]] (RFC 2898) ==Digital signature standards== * Digital Signature Standard (DSS), based on the [[Digital Signature Algorithm]] (DSA) * [[RSA (algorithm)|RSA]] * [[Elliptic Curve DSA]] ==Public-key infrastructure (PKI) standards== * [[X.509]] Public Key Certificates ==Wireless Standards== * [[Wired Equivalent Privacy]] (WEP), severely flawed and superseded by WPA * [[Wi-Fi Protected Access]] (WPA) better than WEP, a 'pre-standard' partial version of 802.11i * [[802.11i]] a.k.a. WPA2, uses [[Advanced Encryption Standard|AES]] and other improvements on WEP * [[A5/1]] and [[A5/2]] cell phone encryption for [[GSM]] ==U.S. Government Federal Information Processing Standards (FIPS)== *FIPS PUB 31 Guidelines for Automatic Data Processing Physical Security and Risk Management 1974 *FIPS PUB 46-3 Data Encryption Standard ([[Data Encryption Standard|DES]]) 1999 *FIPS PUB 73 Guidelines for Security of Computer Applications 1980 *FIPS PUB 74 Guidelines for Implementing and Using the [[National Institute of Standards and Technology|NBS]] [[Data Encryption Standard]] 1981 *FIPS PUB 81 [[Data Encryption Standard|DES]] Modes of Operation 1980 *FIPS PUB 102 Guideline for Computer Security Certification and Accreditation 1983 *FIPS PUB 112 Password Usage 1985, defines 10 factors to be considered in access control systems that are based on passwords *FIPS PUB 113 Computer Data Authentication 1985, specifies a Data Authentication Algorithm (DAA) based on [[Data Encryption Standard|DES]], adopted by the [[U.S. Treasury Department|Department of Treasury]] and the banking community to protect electronic fund transfers. *FIPS PUB 140-2 Security Requirements for Cryptographic Modules 2001, defines four increasing security levels *FIPS PUB 171 Key Management Using [[American National Standards Institute|ANSI]] X9.17 (ANSI X9.17-1985) 1992, based on [[Data Encryption Standard|DES]] *FIPS PUB 180-2 Secure Hash Standard (SHS) 2002 defines the [[Secure Hash Algorithm (disambiguation)|SHA]] family *FIPS PUB 181 Automated Password Generator (APG) 1993 *FIPS PUB 185 Escrowed Encryption Standard (EES) 1994, a [[key escrow]] system that provides for decryption of telecommunications when lawfully authorized. *FIPS PUB 186-2 Digital Signature Standard ([[Digital Signature Algorithm|DSS]]) 2000 *FIPS PUB 190 Guideline for the Use of Advanced [[Authentication]] Technology Alternatives 1994 *FIPS PUB 191 Guideline for the Analysis of [[local area network]] Security 1994 *FIPS PUB 196 Entity [[Authentication]] Using [[Public key cryptography|Public Key Cryptography]] 1997 *FIPS PUB 197 Advanced Encryption Standard ([[Advanced Encryption Standard|AES]]) 2001 *FIPS PUB 198 The Keyed-Hash Message Authentication Code ([[HMAC]]) 2002 ==Internet Requests for Comments (RFCs)== {{Empty section|date=July 2010}} ==Classified Standards== * [[EKMS]] [[NSA]]'s Electronic Key Management System * [[FNBDT]] [[NSA]]'s secure narrow band voice standard * [[Fortezza]] encryption based on portable crypto token in [[PC Card]] format * [[Secure Terminal Equipment|STE]] secure telephone * [[STU-III]] older secure telephone * [[Tempest (codename)|TEMPEST]] prevents compromising emanations ==Other== <!-- to be refined.. --> * [[IPsec]] Virtual Private Network ([[VPN]]) and more * [[IEEE]] [[P1363]] covers most aspects of public-key cryptography * [[Transport Layer Security]] (formerly SSL) * [[Secure Shell|SSH]] secure [[Telnet]] and more * [[Content Scrambling System]] (CSS, the [[DVD]] encryption standard, broken by [[DeCSS]]) * [[Kerberos (protocol)|Kerberos]] authentication standard * [[RADIUS]] authentication standard * ANSI X9.59 electronic payment standard * [[Common Criteria]] [[Trusted operating system]] standard * [[CRYPTREC]] Japanese Government's cryptography recommendations ==See also== * [[NSA cryptography]] * [[Topics in cryptography]] [[Category:Cryptography standards| ]] [[Category:Technology-related lists]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:Empty section
(
edit
)
Template:Short description
(
edit
)