Docstoc

AlgorithmListxls---IEEE-Standards-Working-Group-Areas

Document Sample
AlgorithmListxls---IEEE-Standards-Working-Group-Areas Powered By Docstoc
					Algorithm
DES Triple DES 2 Key Triple DES 3 Key AES128

Mode Name
DES 2TDEA 3TDEA AES128 XTS-AES-128 XCB-AES-128 EME2-AES-128 AES192 AES256 XTS-AES-256 CCM-128-AES-256 GCM-128-AES-256 CBC-AES-256-HMAC-SHA-1 CBC-AES-256-HMAC-SHA-256 CBC-AES-256-HMAC-SHA-512 XTS-AES-256-HMAC-SHA-512 XCB-AES-256 EME2-AES-256 RSA-1024 RSA-1536 RSA-2048 RSA-3072 RSA-4096 RSA-7680 RSA-15360 ECC-160 ECC-224 ECC-256 ECC-384 ECC-521

Generated # of bits
56 112 168 128 256 128 384 192 256 512 320 320 416 512 768 1024 256 512 2048 3072 4096 6144 8192 15360 30720 320 448 512 768 1042

Maximum Data Encrypted

NIST Bit Equivalance List ***
56 80 112 128 128 128 128 192 256 N/A 256 256 256 256 256 N/A N/A N/A 80 N/A 112 128 N/A 192 256 80 112 128 192 256

AES192 AES256

RSA

Ellyptic Curve

Algorithm
SHA * (HASH A)

Mode Name
SHA-1 SHA-224 SHA-256 SHA-384 SHA-512 HMAC-SHA-1 HMAC-SHA-224 HMAC-SHA-256 HMAC-SHA-384 HMAC-SHA-512

Generated # of bits
160 224 256 384 512 160 224 256 384 512

Maximum Data Encrypted

NIST Bit Equivalance List ***
80 112 128 192 256 128 192 256 256 256

HMAC** (HASH B)

Current NIST recommendations with key equivalent strengths: http://www.keylength.com/en/4/ * HASH A Functions are HASH only and digital signatures only ** HASH B Functions are HMAC, Key Derivation and Random Number Generation *** NIST Bit Equivalence is subjective and only provided as a reference. See NIST SP800-57 for latest information on accepted use dates and lists. NOTES: Other modes for AES include ECB, CBC, CTR Other modes for Triple DES include ECB, CBC, CTR, OFB and CFB Other algorithms not used in most current storage applications include IDEA, Blowfish, Twofish and others This list does not include stream ciphers

Key Composition
56 bit key two 56 bit keys three 56 bit keys 128 bit key two 128 bit keys 128 bit key one 128 bit key, one 256 bit key 192 bit key 256 bit key two 256 bit keys one 256 bit key, one 96 bit IV one 256 bit key, one 96 bit IV one 256 bit key, one 160 bit KMAC one 256 bit key, one 256 bit KMAC one 256 bit key, one 512 bit KMAC two 256 bit keys, one 512 bit KMAC one 256 bit key two 256 bit keys two 1024 bit keys (key pair) two 1024 bit keys (key pair) two 1024 bit keys (key pair) two 1024 bit keys (key pair) two 1024 bit keys (key pair) two 1024 bit keys (key pair) two 1024 bit keys (key pair) two 160 bit keys (key pair) two 224 bit keys (key pair) two 256 bit keys (key pair) two 384 bit keys (key pair) two 521 bit keys (key pair)

Key Composition
160 bit is minimum data or key length recommended 224 bit is minimum data or key length recommended 256 bit is minimum data or key length recommended 384 bit is minimum data or key length recommended 512 bit is minimum data or key length recommended Key or data must be 160 bits or longer Key or data must be 224 bits or longer Key or data must be 256 bits or longer Key or data must be 384 bits or longer Key or data must be 512 bits or longer

owfish, Twofish and others


				
DOCUMENT INFO
Shared By:
Tags: Algor, ithmL
Stats:
views:66
posted:11/28/2009
language:English
pages:4
Description: AlgorithmListxls---IEEE-Standards-Working-Group-Areas