At CRYPTHOR we utilize the following non-exhaustive list of cryptographic algorithms and hash functions:

Applied cryptographic algorithms:
  • AES (block size – 128 bit; key length: 128, 192 and 256 bit;)
  • Blowfish;
  • Haval (256 bit, 5 passes);
  • CAST – 128 (CAST – 5);
  • CAST 256 (CAST – 6);
  • Information Concealment Engine (ICE);
  • Information Concealment Engine 2 (ICE – 2);
  • ICE Encrypt;
  • Mitsubishi Improved Security Technology – MISTY – 1;
  • Ron’s Code 2 or Rivest’s Cipher 2 (RC – 2);
  • Ron’s Code 4 or Rivest’s Cipher 4 (RC – 4);
  • Ron’s Code 5 or Rivest’s Cipher 5 (RC – 5);
  • Ron’s Code 6 or Rivest’s Cipher 6 (RC – 6);
  • Serpent;
  • Tiny Encryption Algorithm (TEA);
  • Twofish;
  • Etc.;
Applied hash functions:
  • Secure Hash Algorithm – 1 (SHA-1);
  • RIPEMO – 160;
  • Haval (256 bit, 5 passes);
  • Message Digest – 5 (MD-5);
  • Message Digest – 4 (MD-4);
  • Tiger;
  • RIPE MD – 128;
  • SHA – 256 (SHA-2 Family);
  • SHA – 384 (SHA-2 Family);
  • SHA – 512 (SHA-2 Family);