At CRYPTHOR we utilize the following non-exhaustive list of cryptographic algorithms and hash functions:
Applied cryptographic algorithms:
- AES (block size – 128 bit; key length: 128, 192 and 256 bit;)
- Blowfish;
- Haval (256 bit, 5 passes);
- CAST – 128 (CAST – 5);
- CAST 256 (CAST – 6);
- Information Concealment Engine (ICE);
- Information Concealment Engine 2 (ICE – 2);
- ICE Encrypt;
- Mitsubishi Improved Security Technology – MISTY – 1;
- Ron’s Code 2 or Rivest’s Cipher 2 (RC – 2);
- Ron’s Code 4 or Rivest’s Cipher 4 (RC – 4);
- Ron’s Code 5 or Rivest’s Cipher 5 (RC – 5);
- Ron’s Code 6 or Rivest’s Cipher 6 (RC – 6);
- Serpent;
- Tiny Encryption Algorithm (TEA);
- Twofish;
- Etc.;
Applied hash functions:
- Secure Hash Algorithm – 1 (SHA-1);
- RIPEMO – 160;
- Haval (256 bit, 5 passes);
- Message Digest – 5 (MD-5);
- Message Digest – 4 (MD-4);
- Tiger;
- RIPE MD – 128;
- SHA – 256 (SHA-2 Family);
- SHA – 384 (SHA-2 Family);
- SHA – 512 (SHA-2 Family);