Skip to content

Commit

Permalink
Update crypto_algorithms.md
Browse files Browse the repository at this point in the history
  • Loading branch information
santosomar committed Jul 12, 2019
1 parent 08623c8 commit 956a11f
Showing 1 changed file with 4 additions and 45 deletions.
49 changes: 4 additions & 45 deletions crypto/crypto_algorithms.md
@@ -1,5 +1,6 @@
# Cryptographic Algorithms # Cryptographic Algorithms



<table> <table>
<tbody> <tbody>
<tr> <tr>
Expand All @@ -8,31 +9,27 @@
<th scope="col">Status</th> <th scope="col">Status</th>
<th scope="col">Alternative</th> <th scope="col">Alternative</th>
<th scope="col">QCR</th> <th scope="col">QCR</th>
<th scope="col">Mitigation</th>
</tr> </tr>
<tr> <tr>
<td>DES</td> <td>DES</td>
<td>Encryption</td> <td>Encryption</td>
<td>Avoid</td> <td>Avoid</td>
<td>AES</td> <td>AES</td>
<td>&mdash;</td> <td>&mdash;</td>
<td>&mdash;</td>
</tr> </tr>
<tr> <tr>
<td>3DES</td> <td>3DES</td>
<td>Encryption</td> <td>Encryption</td>
<td>Legacy</td> <td>Legacy</td>
<td>AES</td> <td>AES</td>
<td>&mdash;</td> <td>&mdash;</td>
<td>Short key lifetime</td>
</tr> </tr>
<tr> <tr>
<td>RC4</td> <td>RC4</td>
<td>Encryption</td> <td>Encryption</td>
<td>Avoid</td> <td>Avoid</td>
<td>AES</td> <td>AES</td>
<td>&mdash;</td> <td>&mdash;</td>
<td>&mdash;</td>
</tr> </tr>
<tr> <tr>
<td> <td>
Expand All @@ -45,7 +42,7 @@
</td> </td>
<td> <td>
<p>Acceptable</p> <p>Acceptable</p>
<p>NGE</a></p> <p>NGE</p>
</td> </td>
<td> <td>
<p>AES-GCM</p> <p>AES-GCM</p>
Expand All @@ -55,10 +52,6 @@
<p>✓ (256-bit)</p> <p>✓ (256-bit)</p>
<p>✓ (256-bit)</p> <p>✓ (256-bit)</p>
</td> </td>
<td>
<p>&mdash;</p>
<p>&mdash;</p>
</td>
</tr> </tr>
<tr> <tr>
<td> <td>
Expand All @@ -82,11 +75,6 @@ DSA-3072</td>
<p>&mdash;</p> <p>&mdash;</p>
<p>&mdash;</p> <p>&mdash;</p>
</td> </td>
<td>
<p>&mdash;</p>
<p>&mdash;</p>
<p>&mdash;</p>
</td>
</tr> </tr>
<tr> <tr>
<td> <td>
Expand All @@ -110,11 +98,6 @@ ECDSA-256</td>
<p>&mdash;</p> <p>&mdash;</p>
<p>&mdash;</p> <p>&mdash;</p>
</td> </td>
<td>
<p>&mdash;</p>
<p>&mdash;</p>
<p>&mdash;</p>
</td>
</tr> </tr>
<tr> <tr>
<td> <td>
Expand All @@ -137,19 +120,13 @@ ECDSA-256</td>
<p>&mdash;</p> <p>&mdash;</p>
<p>&mdash;</p> <p>&mdash;</p>
</td> </td>
<td>
<p>&mdash;</p>
<p>&mdash;</p>
<p>&mdash;</p>
</td>
</tr> </tr>
<tr> <tr>
<td>MD5</td> <td>MD5</td>
<td>Integrity</td> <td>Integrity</td>
<td>Avoid</td> <td>Avoid</td>
<td>SHA-256</td> <td>SHA-256</td>
<td>&mdash;</td> <td>&mdash;</td>
<td>&mdash;</td>
</tr> </tr>
<tr> <tr>
<td> <td>
Expand All @@ -165,9 +142,6 @@ ECDSA-256</td>
<p>SHA-256</p> <p>SHA-256</p>
</td> </td>
<td>&mdash;</td> <td>&mdash;</td>
<td>
<p>&mdash;</p>
</td>
</tr> </tr>
<tr> <tr>
<td> <td>
Expand All @@ -191,35 +165,27 @@ ECDSA-256</td>
<p>✓</p> <p>✓</p>
<p>✓</p> <p>✓</p>
</td> </td>
<td>
<p>&mdash;</p>
<p>&mdash;</p>
<p>&mdash;</p>
</td>
</tr> </tr>
<tr> <tr>
<td>HMAC-MD5</td> <td>HMAC-MD5</td>
<td>Integrity</td> <td>Integrity</td>
<td>Legacy</td> <td>Legacy</td>
<td>HMAC-SHA-256</td> <td>HMAC-SHA-256</td>
<td>&mdash;</td> <td>&mdash;</td>
<td>Short key lifetime</td>
</tr> </tr>
<tr> <tr>
<td>HMAC-SHA-1</td> <td>HMAC-SHA-1</td>
<td>Integrity</td> <td>Integrity</td>
<td>Acceptable</td> <td>Acceptable</td>
<td>HMAC-SHA-256</td> <td>HMAC-SHA-256</td>
<td>&mdash;</td> <td>&mdash;</td>
<td>&mdash;</td>
</tr> </tr>
<tr> <tr>
<td>HMAC-SHA-256</td> <td>HMAC-SHA-256</td>
<td>Integrity</td> <td>Integrity</td>
<td>NGE</td> <td>NGE</td>
<td>&mdash;</td> <td>&mdash;</td>
<td>✓</td> <td>✓</td>
<td>&mdash;</td>
</tr> </tr>
<tr> <tr>
<td> <td>
Expand All @@ -239,10 +205,6 @@ ECDSA-384</td>
<p>&mdash;</p> <p>&mdash;</p>
<p>&mdash;</p> <p>&mdash;</p>
</td> </td>
<td>
<p>&mdash;</p>
<p>&mdash;</p>
</td>
</tr> </tr>
<tr> <tr>
<td> <td>
Expand All @@ -263,13 +225,9 @@ ECDSA-384</td>
<p>&mdash;</p> <p>&mdash;</p>
<p>&mdash;</p> <p>&mdash;</p>
</td> </td>
<td>
<p>&mdash;</p>
<p>&mdash;</p>
</td>
</tr> </tr>
<tr> <tr>
<td colspan="6"><a name="ftn1"></a> <td colspan="5"><a name="ftn1"></a>
<p>1. QCR = quantum computer resistant.</p> <p>1. QCR = quantum computer resistant.</p>
<a name="ftn2"></a> <a name="ftn2"></a>
<p>2. NGE = next generation encryption.</p> <p>2. NGE = next generation encryption.</p>
Expand All @@ -278,6 +236,7 @@ ECDSA-384</td>
</tbody> </tbody>
</table> </table>



- Avoid: Algorithms that are marked as Avoid do not provide adequate security against modern threats and should not be used to protect sensitive information. It is recommended that these algorithms be replaced with stronger algorithms. - Avoid: Algorithms that are marked as Avoid do not provide adequate security against modern threats and should not be used to protect sensitive information. It is recommended that these algorithms be replaced with stronger algorithms.


- Legacy: Legacy algorithms provide a marginal but acceptable security level. They should be used only when no better alternatives are available, such as when interoperating with legacy equipment. It is recommended that these legacy algorithms be phased out and replaced with stronger algorithms. - Legacy: Legacy algorithms provide a marginal but acceptable security level. They should be used only when no better alternatives are available, such as when interoperating with legacy equipment. It is recommended that these legacy algorithms be phased out and replaced with stronger algorithms.
Expand Down

0 comments on commit 956a11f

Please sign in to comment.