Use of symmetric algorithms
- encrypting large amounts of data
Use of asymmetric algorithms
Use of hash functions
Hash / Symmetric / Asymmetric
Hash = 0 Symmetric = 1 Asymmetric = 2+
Hash / Symmetric / Asymmetric
Hash = 256 bits Symmetric = 128 bits Asymmetric = 2048 bits
Hash / Symmetric / Asymmetric
Hash = SHA Symmetric = AES Asymmetric = RSA
Hash / Symmetric / Asymmetric
Hash = Fast Symmetric = Fast Asymmetric = Slow
Hash / Symmetric / Asymmetric
Hash = medium Symmetric = medium Asymmetric = high
Hash / Symmetric / Asymmetric
Hash = n.a. Symmetric = Loss of both (sender & receiver) Asymmetric = Loss of owner of the asymmetric key only
Hash / Symmetric / Asymmetric
Hash = n.a. Symmetric = Challenging Asymmetric = Easy & Secure
Hash / Symmetric / Asymmetric
Hash = SHA-224, SHA-256, SHA-384, SHA-512 Symmetric = AES, Blowfish, Twofish, 3DES, RC4 Asymmetric = RSA, DSA, ECC, Diffie-Hellman