A, data encryption/coding algorithm list
Common used to ensure the security of encryption or coding algorithm is as follows:
1, common encryption algorithm
Public-key algorithms used for sensitive data, abstract, signature, etc to encrypt messages, commonly used encryption algorithm include:
Data Encryption Standard (DES) : Data Encryption Standard, faster, suitable for Encryption large Data circumstance;
3DES (Triple DES) : is based on DES, to a data with three different keys three times higher strength; encrypted,
RC2 and RC4: using variable-length keys of large quantities of data encrypt than DES quickly;
International Data Encryption IDEA (done) International Data Encryption Algorithm, using 128-bit key provide very strong safety;
RSA: by RSA company invention, is a variable-length keys support of public key algorithms, need encrypted files fast length is variable,
DSA (done) : Digital our Digital Signature Algorithm, is a standard DSS (digital-signature standard);
AES Encryption Standard (on) : senior Encryption Standard, is the next generation of Encryption algorithm Standard, quick speed, high level of security, currently AES Standard, an implementation is Rijndael algorithm,
BLOWFISH, it USES variable-length keys, length can reach 448 bit, running speed quickly;
Other algorithms, such as ElGamal, Deffie - Hellman, new elliptic curve algorithm ECC etc.
2 and one-way hash algorithm
One-way hash function are generally used to generate news summary, encryption, common are:
MD5 (5) : < about done is RSA data security and development of a one-way hash Algorithm, MD5 is widely used and can be used to make different length of data blocks AnMa operations into a 128-bit numerical;
SHA (Secure Hash done) this is a relatively new hashing algorithms, can to arbitrary length of data operation generated a 160 bits of numerical;
MAC (< Authentication Code) : news Authentication codes, is a unidirectional function, use a key to use them on the system or user Authentication files or between news. HMAC (for news authentication encryption hashing) is an example of this function.
Cyclic Redundancy Check (CRC) : Cyclic Redundancy Check code, CRC Check because realize simple and submit the wrong ability, it is widely used in various data validation applications. Occupies system resources with software and hardware are less, can come true, is for data transmission error detection to a kind of very good method (CRC is not strictly hashing algorithms, but its role and hashing algorithm is roughly same, so to such).
3 and other data algorithm
Other data algorithm including some commonly used encoding algorithm and expressly (ASCII, Unicode) conversion, such as the Base 64, Quoted Printable, EBCDIC etc.
Second, the.net realize algorithm
Common encryption and coding algorithm are already in the.net Framework has been implemented for coding personnel provides tremendous convenience, realize these algorithms namespaces are: System. J Cryptography Security.
System Security. J j Cryptography namespaces provide encryption services, including safety data encoding and decoding, and many other operation, such as hashing, random number generation and news identity authentication.
Other pages: : 1 * 2 * 3 * Next>>