| RSA 1024 | Signing | RSA 1024 bits offers moderate security but is now considered vulnerable and outdated for most modern applications | Low (80-bit) |
| RSA 2048 | Signing | RSA 2048 bits offers strong security and is widely used for modern encryption and digital signatures | Medium (112-bit) |
| RSA 3072 | Signing | RSA 3072 bits provides a higher security level, suitable for long-term protection of sensitive data | Medium (128-bit) |
| RSA 4096 | Signing | RSA 4096 bits offers very high security, commonly used for highly sensitive data and long-term encryption | Medium (128-bit) |
| RSA 8192 | Signing | RSA 8192 bits provides extremely high security, used for the most sensitive data and long-term protection | High (192-bit) |
| RSA PSS/OAEP 1024 | Signing | RSA 1024 bits PSS provides moderate security for digital signatures, with PSS offering improved resistance against certain attacks, though it's now considered vulnerable for most applications | Low (80-bit) |
| RSA PSS/OAEP 2048 | Signing | RSA 2048 bits PSS offers strong security with enhanced resistance to forgery and adaptive chosen-message attacks, making it widely used in modern systems | Medium (112-bit) |
| RSA PSS/OAEP 3072 | Signing | RSA 3072 bits PSS provides enhanced security for long-term digital signature protection, with PSS improving resistance to certain signature-related attacks | Medium (128-bit) |
| RSA PSS/OAEP 4096 | Signing | RSA 4096 bits PSS provides very high security for digital signatures, with PSS offering added protection against vulnerabilities in deterministic signature schemes | Medium (128-bit) |
| RSA PSS/OAEP 8192 | Signing | RSA 8192 bits PSS offers extremely high security for critical digital signatures, with PSS further strengthening resistance to advanced cryptographic attacks and long-term protection | High (192-bit) |
| ECDSA P-256 | Signing | Digital signature algorithm based on the NIST P-256 curve, providing 128-bit security | Medium (128-bit) |
| ECDSA P-384 | Signing | Digital signature algorithm based on the NIST P-384 curve, providing 192-bit security | High (192-bit) |
| ECDSA P-521 | Signing | Digital signature algorithm based on the NIST P-521 curve, providing 256-bit security | Very High (256-bit) |
| Brainpool P-256r1 | Signing | Brainpool P256 is a 256-bit elliptic curve offering strong security for digital signatures and key exchange | Medium (128-bit) |
| Brainpool P-256t1 | Signing | Brainpool P256T is a 256-bit twisted curve, optimized for faster operations and improved security in digital signatures and key exchange | Medium (128-bit) |
| Brainpool P-320r1 | Signing | Brainpool P320 is a 320-bit curve providing strong security for cryptographic operations, suitable for high-security applications | Medium (128-bit) |
| Brainpool P-320t1 | Signing | Brainpool P320T is a 320-bit twisted curve, balancing strong security and efficient performance for cryptographic tasks | Medium (128-bit) |
| Brainpool P-384t1 | Signing | Brainpool P384T is a 384-bit twisted curve providing strong security for digital signatures and key exchange, optimized for performance and efficiency | High (192-bit) |
| Brainpool P-512t1 | Signing | Brainpool P512T is a 512-bit twisted curve, providing very high security and optimized for efficient cryptographic processing | Very High (256-bit) |
| Brainpool P-384r1 | Signing | Brainpool P384 is a 384-bit elliptic curve providing enhanced security for high-assurance applications | High (192-bit) |
| Brainpool P-512r1 | Signing | Brainpool P512 is a 512-bit elliptic curve offering very high security for sensitive data and long-term protection | Very High (256-bit) |
| Brainpool P-160r1 | Signing | Brainpool P160 is a 160-bit curve, offering moderate security for lightweight cryptographic applications | Low (80-bit) |
| Brainpool P-160t1 | Signing | Brainpool P160T is a 160-bit twisted curve, offering efficient performance and moderate security for lightweight applications | Low (80-bit) |
| Brainpool P-192r1 | Signing | Brainpool P192 is a 192-bit curve providing a balanced security level for general-purpose cryptography | Low (80-bit) |
| Brainpool P-192t1 | Signing | Brainpool P192T is a 192-bit twisted curve, optimized for faster cryptographic operations with improved security | Low (80-bit) |
| Brainpool P-224r1 | Signing | Brainpool P224 is a 224-bit curve offering strong security for medium-strength cryptographic applications | Medium (112-bit) |
| Brainpool P-224t1 | Signing | Brainpool P224T is a 224-bit twisted Edwards curve, optimized for efficient cryptographic operations with strong security | Medium (112-bit) |
| SEC P-256k1 | Signing | Sec P256K is a 256-bit curve widely used in Bitcoin and blockchain technologies, optimized for fast elliptic curve operations | Medium (128-bit) |
| SEC P-224r1 | Signing | Sec P224 is a 224-bit curve offering strong security for general-purpose cryptography, commonly used in digital signatures | Medium (112-bit) |
| SEC P-224k1 | Signing | Sec P224K is a 224-bit curve used in cryptographic applications with an emphasis on fast and efficient operations | Medium (112-bit) |
| SEC P-192r1 | Signing | Sec P192 is a 192-bit curve providing moderate security for lightweight cryptographic applications | Low (80-bit) |
| SEC P-192k1 | Signing | Sec P192K is a 192-bit curve widely used in blockchain and cryptographic systems, optimized for efficient operations | Low (80-bit) |
| Ed25519 | Signing | Ed25519 is a high-security elliptic curve signature algorithm, designed for fast performance and resistance to side-channel attacks | Medium (128-bit) |
| Ed448 | Signing | Ed448 is a highly secure elliptic curve signature algorithm, offering stronger security than ED25519, with a larger key size | High (224-bit) |
| ML-DSA44 | Signing | ML-DSA44 offers 128-bit quantum security, designed for lightweight applications that require post-quantum resilience with moderate security | NIST Category 2 (Quantum-resistant) |
| ML-DSA65 | Signing | ML-DSA65 provides 192-bit quantum security, offering stronger protection against quantum adversaries while maintaining efficiency for broader use cases | NIST Category 3 (Quantum-resistant) |
| ML-DSA87 | Signing | ML-DSA87 delivers 256-bit quantum security, designed for high-assurance applications needing robust resistance to future quantum computing threats | NIST Category 5 (Quantum-resistant) |
| SLH-DSA-SHA2-128s | Signing | SLH-DSA SHA2 128bit Small: Offers 128-bit security with SHA-2, optimized for small footprint applications | NIST Category 1 (Quantum-resistant) |
| SLH-DSA-Shake-192f | Signing | SLH-DSA SHAKE 192bit Fast: Delivers 192-bit security with SHAKE, optimized for fast performance | NIST Category 3 (Quantum-resistant) |
| SLH-DSA-Shake-256s | Signing | SLH-DSA SHAKE 256bit Small: Offers 256-bit security with SHAKE, suitable for small footprint applications | NIST Category 5 (Quantum-resistant) |
| SLH-DSA-Shake-256f | Signing | SLH-DSA SHA2 256bit Fast: Offers 256-bit security with SHAKE, optimized for fast performance | NIST Category 5 (Quantum-resistant) |
| SLH-DSA-SHA2-128f | Signing | SLH-DSA SHAKE 128bit Fast: Delivers 128-bit security with SHAKE, optimized for fast performance | NIST Category 1 (Quantum-resistant) |
| SLH-DSA-SHA2-192s | Signing | SLH-DSA SHA2 192bit Small: Offers 192-bit security with SHA-2, suitable for small footprint applications | NIST Category 3 (Quantum-resistant) |
| SLH-DSA-SHA2-192f | Signing | SLH-DSA SHA2 192bit Fast: Ensures 192-bit security with SHA-2, optimized for fast performance | NIST Category 3 (Quantum-resistant) |
| SLH-DSA-SHA2-256s | Signing | SLH-DSA SHA2 256bit Small: Offers 256-bit security with SHA-2, suitable for small footprint applications | NIST Category 5 (Quantum-resistant) |
| SLH-DSA-SHA2-256f | Signing | SLH-DSA SHA2 256bit Small: Offers 256-bit security with SHA-2, suitable for small footprint applications | NIST Category 5 (Quantum-resistant) |
| SLH-DSA-Shake-128s | Signing | SLH-DSA SHAKE 128bit Small: Provides 128-bit security with SHAKE, designed for small footprint applications | NIST Category 1 (Quantum-resistant) |
| SLH-DSA-Shake-128f | Signing | SLH-DSA SHAKE 128bit Fast: Ensures 128-bit security with SHAKE, optimized for fast performance | NIST Category 1 (Quantum-resistant) |
| SLH-DSA-Shake-192s | Signing | SLH-DSA SHAKE 192bit Small: Provides 192-bit security with SHAKE, designed for small footprint applications | NIST Category 3 (Quantum-resistant) |
| HASH-SLH-DSA-SHA2-128s-SHA256 | Signing | Pre-Hash SLH-DSA SHA2 128bit Small: Offers 128-bit security with SHA-2, optimized for small footprint applications | NIST Category 1 (Quantum-resistant) |
| HASH-SLH-DSA-Shake-192f-SHAke256 | Signing | Pre-Hash SLH-DSA SHAKE 192bit Fast: Delivers 192-bit security with SHAKE, optimized for fast performance | NIST Category 3 (Quantum-resistant) |
| HASH-SLH-DSA-Shake-256s-SHAke256 | Signing | Pre-Hash SLH-DSA SHA2 256bit Small: Offers 256-bit security with SHA-2, suitable for small footprint applications | NIST Category 5 (Quantum-resistant) |
| HASH-SLH-DSA-Shake-256f-SHAke256 | Signing | Pre-Hash SLH-DSA SHA2 256bit Fast: Offers 256-bit security with SHAKE, optimized for fast performance | NIST Category 5 (Quantum-resistant) |
| HASH-SLH-DSA-SHA2-128f-SHA256 | Signing | Pre-Hash SLH-DSA SHA2 128bit Fast: Delivers 128-bit security with SHA-2, optimized for fast performance | NIST Category 1 (Quantum-resistant) |
| HASH-SLH-DSA-SHA2-192s-SHA512 | Signing | Pre-Hash SLH-DSA SHA2 192bit Small: Offers 192-bit security with SHA-2, suitable for small footprint applications | NIST Category 3 (Quantum-resistant) |
| HASH-SLH-DSA-SHA2-192f-SHA512 | Signing | Pre-Hash SLH-DSA SHA2 192bit Fast: Ensures 192-bit security with SHA-2, optimized for fast performance | NIST Category 3 (Quantum-resistant) |
| HASH-SLH-DSA-SHA2-256s-SHA512 | Signing | Pre-Hash SLH-DSA SHA2 256bit Small: Offers 256-bit security with SHA-2, suitable for small footprint applications | NIST Category 5 (Quantum-resistant) |
| HASH-SLH-DSA-SHA2-256f-SHA512 | Signing | Pre-Hash SLH-DSA SHA2 256bit Small: Offers 256-bit security with SHA-2, suitable for small footprint applications | NIST Category 5 (Quantum-resistant) |
| HASH-SLH-DSA-Shake-128s-Shake128 | Signing | Pre-Hash SLH-DSA SHAKE 128bit Small: Provides 128-bit security with SHAKE, designed for small footprint applications | NIST Category 1 (Quantum-resistant) |
| HASH-SLH-DSA-Shake-128f-Shake128 | Signing | Pre-Hash SLH-DSA SHA2 128bit Fast: Ensures 128-bit security with SHA-2, optimized for fast performance | NIST Category 1 (Quantum-resistant) |
| HASH-SLH-DSA-Shake-192s-SHAke256 | Signing | Pre-Hash SLH-DSA SHAKE 192bit Small: Provides 192-bit security with SHAKE, designed for small footprint applications | NIST Category 3 (Quantum-resistant) |
| Composite ML-DSA44 / PSS2048 | Signing | ML-DSA44 / RSA 2048 PSS combines 128-bit quantum security of ML-DSA44 with RSA2048PSS, suitable for moderate security applications requiring post-quantum and classical resilience | NIST Category 2 (Quantum-resistant) |
| Composite ML-DSA65 / ECP384 | Signing | ML-DSA65 / ECP384 offers 192-bit quantum security of ML-DSA65 with ECDSA P-384, ideal for high-security applications needing long-term protection | NIST Category 3 (Quantum-resistant) |
| Composite ML-DSA65 / Brainpool P-256 | Signing | ML-DSA65 / Brainpool P-256 provides 192-bit quantum security of ML-DSA65 with Brainpool P-256, designed for secure communications and data integrity | NIST Category 3 (Quantum-resistant) |
| Composite ML-DSA65 / Ed25519 | Signing | ML-DSA65 / Ed25519 combines 192-bit quantum security of ML-DSA65 with Ed25519, optimized for fast and secure digital signatures | NIST Category 3 (Quantum-resistant) |
| Composite ML-DSA87 / ECP384 | Signing | ML-DSA87 / ECP384 ensures 256-bit quantum security of ML-DSA87 with ECDSA P-384, suitable for highly sensitive data and long-term protection | NIST Category 5 (Quantum-resistant) |
| Composite ML-DSA87 / Brainpool P-384 | Signing | ML-DSA87 / Brainpool P-384 offers 256-bit quantum security of ML-DSA87 with Brainpool P-384, ideal for secure financial transactions and data integrity | NIST Category 5 (Quantum-resistant) |
| Composite ML-DSA87 / Ed448 | Signing | ML-DSA87 / Ed448 combines 256-bit quantum security of ML-DSA87 with Ed448, designed for high-security digital signatures and fast performance | NIST Category 5 (Quantum-resistant) |
| Composite ML-DSA87 / PSS4096 | Signing | ML-DSA87 / RSA 4096 PSS provides 256-bit quantum security of ML-DSA87 with RSA 4096 PSS, suitable for highly sensitive data and long-term protection | NIST Category 3 (Quantum-resistant) |
| Composite ML-DSA44 / RSA2048 | Signing | ML-DSA44 / RSA 2048 combines 128-bit quantum security of ML-DSA44 with RSA 2048, suitable for moderate security applications requiring post-quantum and classical resilience | NIST Category 2 (Quantum-resistant) |
| Composite ML-DSA44 / Ed25519 | Signing | ML-DSA44 / Ed25519 offers 128-bit quantum security of ML-DSA44 with Ed25519, optimized for fast and secure digital signatures | NIST Category 2 (Quantum-resistant) |
| Composite ML-DSA44 / ECP256 | Signing | ML-DSA44 / ECP256 provides 128-bit quantum security of ML-DSA44 with ECDSA P-256, ideal for secure communications and data integrity | NIST Category 2 (Quantum-resistant) |
| Composite ML-DSA65 / PSS3072 | Signing | ML-DSA65 / RSA 3072 PSS combines 192-bit quantum security of ML-DSA65 with RSA 3072 PSS, suitable for long-term protection and moderate security applications | NIST Category 3 (Quantum-resistant) |
| Composite ML-DSA65 / RSA3072 | Signing | ML-DSA65 / RSA 3072 offers 192-bit quantum security of ML-DSA65 with RSA 3072, ideal for secure communications and data integrity | NIST Category 3 (Quantum-resistant) |
| Composite ML-DSA65 / PSS4096 | Signing | ML-DSA65 / RSA 4096 PSS provides 192-bit quantum security of ML-DSA65 with RSA 4096 PSS, suitable for highly sensitive data and long-term protection | NIST Category 3 (Quantum-resistant) |
| Composite ML-DSA65 / RSA4096 | Signing | ML-DSA65 / RSA 4096 combines 192-bit quantum security of ML-DSA65 with RSA 4096, ideal for high-security applications needing long-term protection | NIST Category 3 (Quantum-resistant) |
| Composite ML-DSA65 / ECP256 | Signing | ML-DSA65 / ECP256 offers 192-bit quantum security of ML-DSA65 with ECDSA P-256, designed for secure communications and data integrity | NIST Category 3 (Quantum-resistant) |
| RSA | Encryption | A widely-used asymmetric encryption algorithm that provides secure data transmission, suitable for a variety of security applications including secure communications and data integrity | Medium |
| RSA-OAEP | Encryption | An asymmetric encryption algorithm that uses Optimal Asymmetric Encryption Padding (OAEP) to enhance security, suitable for encryption of sensitive information | High |
| PBE-SHA1-3DES | Encryption | Suitable for securing sensitive data with moderate security needs. Not recommended for high-security applications due to outdated components | Medium |
| PBE-SHA1-2DES | Encryption | Suitable for moderate security needs. Not recommended for high-security applications | Low |
| PBE-SHA1-RC2-128 | Encryption | Provides moderate security. Not recommended for high-security applications | Medium |
| PBE-SHA1-RC2-40 | Encryption | Offers low security. Not recommended for sensitive data | Low |
| JCEKS-SHA1-3DES | Encryption | Java variant of PBE-SHA1-3DES: Suitable for moderate security needs. Not recommended for high-security applications | Medium |
| PBE-MD2-DES | Encryption | Outdated and insecure. Not recommended for use | Low |
| PBE-SHA1-DES | Encryption | Suitable for moderate security needs. Not recommended for high-security applications | Low |
| PBE-SHA1-RC2-64 | Encryption | Provides moderate security. Not recommended for high-security applications | Low |
| PBES2-PKCS5-SHA512 | Encryption | Strong security, suitable for high-security encryption | High |
| PBE-MD5-DES | Encryption | Outdated and insecure. Not recommended for use | Low |
| PBE-MD2-RC2-64 | Encryption | Outdated and insecure. Not recommended for use | Low |
| PBE-MD5-RC2-64 | Encryption | Outdated and insecure. Not recommended for use | Low |
| DES-EDE3-CBC | Encryption | 112-bit security (effectively ~80-bit), suitable for legacy compatibility but not recommended for new secure applications | Low |
| AES128-CBC | Encryption | 128-bit security, suitable for moderate security data encryption | High |
| AES192-CBC | Encryption | 192-bit security, suitable for higher security data encryption | High |
| AES192-GCM | Encryption | 192-bit security, ideal for secure communications with higher security needs | High |
| AES256-CBC | Encryption | 256-bit security, suitable for highly sensitive data encryption | High |
| AES256-GCM | Encryption | 256-bit security, ideal for secure communications with the highest security needs | High |
| AES128-GCM | Encryption | 128-bit security, ideal for secure communications | High |
| MD5 | Hashing | MD5 Hash Algorithm: Outdated and insecure. Not recommended for use | Low |
| SHA1 | Hashing | SHA1 Hash Algorithm: Provides moderate security but is considered less secure due to known vulnerabilities. Not recommended for new applications or highly sensitive data | Low |
| SHA256 | Hashing | SHA-256 Hash Algorithm | Medium |
| SHA3-512 | Hashing | SHA3-512 Hash Algorithm | Very High |
| SHAKE128 | Hashing | SHAKE128 Hash Algorithm | Medium |
| SHAKE256 | Hashing | SHAKE256 Hash Algorithm | Very High |
| SHA384 | Hashing | SHA-384 Hash Algorithm | High |
| SHA512 | Hashing | SHA-512 Hash Algorithm | Very High |
| SHA3-224 | Hashing | SHA3-224 Hash Algorithm | Medium |
| SHA3-256 | Hashing | SHA3-256 Hash Algorithm | Medium |
| SHA3-384 | Hashing | SHA3-384 Hash Algorithm | High |