You are on page 1of 1

Public key/asymmetric algorithms:

Examples of well-regarded asymmetric key techniques for varied purposes


include:
DiffieHellman key exchange protocol
DSS (Digital Signature Standard), which incorporates the Digital
Signature Algorithm
ElGamal
Various elliptic curve techniques
Various password-authenticated key agreement techniques
Paillier cryptosystem
RSA encryption algorithm (PKCS#1)
CramerShoup cryptosystem
YAK authenticated key agreement protocol
Examples of asymmetric key algorithms not widely adopted include:
NTRUEncrypt cryptosystem
McEliece cryptosystem
Examples of notable yet insecure asymmetric key algorithms include:
MerkleHellman knapsack cryptosystem
Examples of protocols using asymmetric key algorithms include:
GPG, an implementation of OpenPGP
Internet Key Exchange
PGP
ZRTP, a secure VoIP protocol
Secure Socket Layer, now codified as the IETF standard Transport
Layer Security (TLS)
SILC
SSH
Bitcoin
Off-the-Record Messaging
Symmetric algorithms:
SHA
Twofish
Serpent
AES (Rijndael)
Blowfish
CAST5
RC4
3DES
Skipjack
Safer+/++ (Bluetooth)
IDEA

You might also like