 Cryptography standards

There are a number of standards related to cryptography. Standard algorithms and protocols provide a focus for study; standards for popular applications attract a large amount of cryptanalysis.
Contents
Encryption standards
 Data Encryption Standard (DES, now obsolete)
 TripleDES
 Advanced Encryption Standard (AES)
 RSA the original public key algorithm
 OpenPGP
 CipherSaber
Hash standards
 MD5 128bit (obsolescent)
 SHA1 160bit
 SHA2 available in 224, 256, 384 and 512bit variants
 HMAC keyed hash
 PBKDF2 Key derivation function (RFC 2898)
Digital signature standards
 Digital Signature Standard (DSS), based on the Digital Signature Algorithm (DSA)
 RSA
Publickey infrastructure (PKI) standards
 X.509 Public Key Certificates
Wireless Standards
 Wired Equivalent Privacy (WEP), severely flawed and superseded by WPA
 WiFi Protected Access (WPA) better than WEP, a 'prestandard' partial version of 802.11i
 802.11i a.k.a. WPA2, uses AES and other improvements on WEP
 A5/1 and A5/2 cell phone encryption for GSM
U.S. Government Federal Information Processing Standards (FIPS)
 FIPS PUB 31 Guidelines for Automatic Data Processing Physical Security and Risk Management 1974
 FIPS PUB 463 Data Encryption Standard (DES) 1999
 FIPS PUB 73 Guidelines for Security of Computer Applications 1980
 FIPS PUB 74 Guidelines for Implementing and Using the NBS Data Encryption Standard 1981
 FIPS PUB 81 DES Modes of Operation 1980
 FIPS PUB 102 Guideline for Computer Security Certification and Accreditation 1983
 FIPS PUB 112 Password Usage 1985, defines 10 factors to be considered in access control systems that are based on passwords
 FIPS PUB 113 Computer Data Authentication 1985, specifies a Data Authentication Algorithm (DAA) based on DES, adopted by the Department of Treasury and the banking community to protect electronic fund transfers.
 FIPS PUB 1402 Security Requirements for Cryptographic Modules 2001, defines four increasing security levels
 FIPS PUB 171 Key Management Using ANSI X9.17 (ANSI X9.171985) 1992, based on DES
 FIPS PUB 1802 Secure Hash Standard (SHS) 2002 defines the SHA family
 FIPS PUB 181 Automated Password Generator (APG) 1993
 FIPS PUB 185 Escrowed Encryption Standard (EES) 1994, a key escrow system that provides for decryption of telecommunications when lawfully authorized.
 FIPS PUB 1862 Digital Signature Standard (DSS) 2000
 FIPS PUB 190 Guideline for the Use of Advanced Authentication Technology Alternatives 1994
 FIPS PUB 191 Guideline for the Analysis of local area network Security 1994
 FIPS PUB 196 Entity Authentication Using Public Key Cryptography 1997
 FIPS PUB 197 Advanced Encryption Standard (AES) 2001
 FIPS PUB 198 The KeyedHash Message Authentication Code (HMAC) 2002
Internet Requests for Comments (RFCs)
Classified Standards
 EKMS NSA's Electronic Key Management System
 FNBDT NSA's secure narrow band voice standard
 Fortezza encryption based on portable crypto token in PC Card format
 STE secure telephone
 STUIII older secure telephone
 TEMPEST prevents compromising emanations
Other
 IPsec Virtual Private Network (VPN) and more
 IEEE P1363 covers most aspects of publickey cryptography
 Transport Layer Security (formerly SSL)
 SSH secure Telnet and more
 Content Scrambling System (CSS, the DVD encryption standard, broken by DeCSS)
 Kerberos authentication standard
 RADIUS authentication standard
 ANSI X9.59 electronic payment standard
 Common Criteria Trusted operating system standard
 CRYPTREC Japanese Government's cryptography recommendations
See also
Categories: Cryptography standards
 Technologyrelated lists
Wikimedia Foundation. 2010.
Look at other dictionaries:
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Outline of cryptography — See also: Index of cryptography articles The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the… … Wikipedia
Topics in cryptography — This article is intended to be an analytic glossary , or alternatively, an organized collection of annotated pointers.Classical ciphers*Autokey cipher *Permutation cipher*Polyalphabetic substitution **Vigenère cipher*Polygraphic substitution… … Wikipedia
NSA Suite B Cryptography — Suite B is a set of cryptographic algorithms promulgated by the National Security Agency as part of its Cryptographic Modernization Program. It is to serve as an interoperable cryptographic base for both unclassified information and most… … Wikipedia
NSA Suite A Cryptography — National Security Agency (NSA) Suite A Cryptography contains classified algorithms that will not be released. Suite A will be used for the protection of some categories of especially sensitive information (a small percentage of the overall… … Wikipedia
Capstone (cryptography) — Capstone is the name of a United States government long term project to develop cryptography standards for public and government use. Capstone was driven by the NIST and the NSA; the project began in 1993refNote1. The initiative involved four… … Wikipedia
History of cryptography — The history of cryptography begins thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In… … Wikipedia
Elliptic Curve Cryptography — Elliptische Kurve über Unter Elliptic Curve Cryptography (ECC) oder deutsch Elliptische Kurven Kryptographie versteht man asymmetrische Kryptosysteme, die Operationen auf elliptischen Kurven über endlichen Körpern v … Deutsch Wikipedia
Elliptic curve cryptography — (ECC) is an approach to public key cryptography based on the algebraic structure of elliptic curves over finite fields. The use of elliptic curves in cryptography was suggested independently by Neal Koblitz[1] and Victor S. Miller[2] in 1985.… … Wikipedia
Publickey cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia