0% found this document useful (0 votes)
44 views2 pages

NitinFinal Notes

This document categorizes and compares different cryptographic algorithms. It lists symmetric private key algorithms like DES, 3DES, IDEA and AES with key lengths ranging from 128 to 256 bits. It also lists asymmetric public key algorithms such as RSA, DSS, Knapsack, El Gamal and Diffie-Hellman. Hashing algorithms like MD4, MD5, SHA-1 and SHA are included with key lengths. Finally, it describes the security services provided by symmetric algorithms like encryption, access control and integrity, and the services provided by asymmetric algorithms such as authentication, integrity and non-repudiation.

Uploaded by

nrpradhan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views2 pages

NitinFinal Notes

This document categorizes and compares different cryptographic algorithms. It lists symmetric private key algorithms like DES, 3DES, IDEA and AES with key lengths ranging from 128 to 256 bits. It also lists asymmetric public key algorithms such as RSA, DSS, Knapsack, El Gamal and Diffie-Hellman. Hashing algorithms like MD4, MD5, SHA-1 and SHA are included with key lengths. Finally, it describes the security services provided by symmetric algorithms like encryption, access control and integrity, and the services provided by asymmetric algorithms such as authentication, integrity and non-repudiation.

Uploaded by

nrpradhan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Category Algorithms Key Length Bits Attack

Symmetric
(Private Key)- DES
3DES
IDEA
Rijndael(AES) Variable 128 to 256

Asymmetric (Public Key) RSA


DSS
Knapsack
E1 Gamal
Diffie-Hellman
Hashing MD4
MD5 128 Birthday

SHA-1 160
SHA and HMAC
Security Services

Symmetric -
Encryption,access Control, Integrity and key Management

Asymmetric-
Authentication,Integrity and non-repudiation

Data Integrity

You might also like