RSA 1024 Signing RSA 1024 bits offers moderate security but is now considered vulnerable and outdated for most modern applications Low (80-bit)
RSA 2048 Signing RSA 2048 bits offers strong security and is widely used for modern encryption and digital signatures Medium (112-bit)
RSA 3072 Signing RSA 3072 bits provides a higher security level, suitable for long-term protection of sensitive data Medium (128-bit)
RSA 4096 Signing RSA 4096 bits offers very high security, commonly used for highly sensitive data and long-term encryption Medium (128-bit)
RSA 8192 Signing RSA 8192 bits provides extremely high security, used for the most sensitive data and long-term protection High (192-bit)
RSA PSS/OAEP 1024 Signing RSA 1024 bits PSS provides moderate security for digital signatures, with PSS offering improved resistance against certain attacks, though it's now considered vulnerable for most applications Low (80-bit)
RSA PSS/OAEP 2048 Signing RSA 2048 bits PSS offers strong security with enhanced resistance to forgery and adaptive chosen-message attacks, making it widely used in modern systems Medium (112-bit)
RSA PSS/OAEP 3072 Signing RSA 3072 bits PSS provides enhanced security for long-term digital signature protection, with PSS improving resistance to certain signature-related attacks Medium (128-bit)
RSA PSS/OAEP 4096 Signing RSA 4096 bits PSS provides very high security for digital signatures, with PSS offering added protection against vulnerabilities in deterministic signature schemes Medium (128-bit)
RSA PSS/OAEP 8192 Signing RSA 8192 bits PSS offers extremely high security for critical digital signatures, with PSS further strengthening resistance to advanced cryptographic attacks and long-term protection High (192-bit)
ECDSA P-256 Signing Digital signature algorithm based on the NIST P-256 curve, providing 128-bit security Medium (128-bit)
ECDSA P-384 Signing Digital signature algorithm based on the NIST P-384 curve, providing 192-bit security High (192-bit)
ECDSA P-521 Signing Digital signature algorithm based on the NIST P-521 curve, providing 256-bit security Very High (256-bit)
Brainpool P-256r1 Signing Brainpool P256 is a 256-bit elliptic curve offering strong security for digital signatures and key exchange Medium (128-bit)
Brainpool P-256t1 Signing Brainpool P256T is a 256-bit twisted curve, optimized for faster operations and improved security in digital signatures and key exchange Medium (128-bit)
Brainpool P-320r1 Signing Brainpool P320 is a 320-bit curve providing strong security for cryptographic operations, suitable for high-security applications Medium (128-bit)
Brainpool P-320t1 Signing Brainpool P320T is a 320-bit twisted curve, balancing strong security and efficient performance for cryptographic tasks Medium (128-bit)
Brainpool P-384t1 Signing Brainpool P384T is a 384-bit twisted curve providing strong security for digital signatures and key exchange, optimized for performance and efficiency High (192-bit)
Brainpool P-512t1 Signing Brainpool P512T is a 512-bit twisted curve, providing very high security and optimized for efficient cryptographic processing Very High (256-bit)
Brainpool P-384r1 Signing Brainpool P384 is a 384-bit elliptic curve providing enhanced security for high-assurance applications High (192-bit)
Brainpool P-512r1 Signing Brainpool P512 is a 512-bit elliptic curve offering very high security for sensitive data and long-term protection Very High (256-bit)
Brainpool P-160r1 Signing Brainpool P160 is a 160-bit curve, offering moderate security for lightweight cryptographic applications Low (80-bit)
Brainpool P-160t1 Signing Brainpool P160T is a 160-bit twisted curve, offering efficient performance and moderate security for lightweight applications Low (80-bit)
Brainpool P-192r1 Signing Brainpool P192 is a 192-bit curve providing a balanced security level for general-purpose cryptography Low (80-bit)
Brainpool P-192t1 Signing Brainpool P192T is a 192-bit twisted curve, optimized for faster cryptographic operations with improved security Low (80-bit)
Brainpool P-224r1 Signing Brainpool P224 is a 224-bit curve offering strong security for medium-strength cryptographic applications Medium (112-bit)
Brainpool P-224t1 Signing Brainpool P224T is a 224-bit twisted Edwards curve, optimized for efficient cryptographic operations with strong security Medium (112-bit)
SEC P-256k1 Signing Sec P256K is a 256-bit curve widely used in Bitcoin and blockchain technologies, optimized for fast elliptic curve operations Medium (128-bit)
SEC P-224r1 Signing Sec P224 is a 224-bit curve offering strong security for general-purpose cryptography, commonly used in digital signatures Medium (112-bit)
SEC P-224k1 Signing Sec P224K is a 224-bit curve used in cryptographic applications with an emphasis on fast and efficient operations Medium (112-bit)
SEC P-192r1 Signing Sec P192 is a 192-bit curve providing moderate security for lightweight cryptographic applications Low (80-bit)
SEC P-192k1 Signing Sec P192K is a 192-bit curve widely used in blockchain and cryptographic systems, optimized for efficient operations Low (80-bit)
Ed25519 Signing Ed25519 is a high-security elliptic curve signature algorithm, designed for fast performance and resistance to side-channel attacks Medium (128-bit)
Ed448 Signing Ed448 is a highly secure elliptic curve signature algorithm, offering stronger security than ED25519, with a larger key size High (224-bit)
ML-DSA44 Signing ML-DSA44 offers 128-bit quantum security, designed for lightweight applications that require post-quantum resilience with moderate security NIST Category 2 (Quantum-resistant)
ML-DSA65 Signing ML-DSA65 provides 192-bit quantum security, offering stronger protection against quantum adversaries while maintaining efficiency for broader use cases NIST Category 3 (Quantum-resistant)
ML-DSA87 Signing ML-DSA87 delivers 256-bit quantum security, designed for high-assurance applications needing robust resistance to future quantum computing threats NIST Category 5 (Quantum-resistant)
SLH-DSA-SHA2-128s Signing SLH-DSA SHA2 128bit Small: Offers 128-bit security with SHA-2, optimized for small footprint applications NIST Category 1 (Quantum-resistant)
SLH-DSA-Shake-192f Signing SLH-DSA SHAKE 192bit Fast: Delivers 192-bit security with SHAKE, optimized for fast performance NIST Category 3 (Quantum-resistant)
SLH-DSA-Shake-256s Signing SLH-DSA SHAKE 256bit Small: Offers 256-bit security with SHAKE, suitable for small footprint applications NIST Category 5 (Quantum-resistant)
SLH-DSA-Shake-256f Signing SLH-DSA SHA2 256bit Fast: Offers 256-bit security with SHAKE, optimized for fast performance NIST Category 5 (Quantum-resistant)
SLH-DSA-SHA2-128f Signing SLH-DSA SHAKE 128bit Fast: Delivers 128-bit security with SHAKE, optimized for fast performance NIST Category 1 (Quantum-resistant)
SLH-DSA-SHA2-192s Signing SLH-DSA SHA2 192bit Small: Offers 192-bit security with SHA-2, suitable for small footprint applications NIST Category 3 (Quantum-resistant)
SLH-DSA-SHA2-192f Signing SLH-DSA SHA2 192bit Fast: Ensures 192-bit security with SHA-2, optimized for fast performance NIST Category 3 (Quantum-resistant)
SLH-DSA-SHA2-256s Signing SLH-DSA SHA2 256bit Small: Offers 256-bit security with SHA-2, suitable for small footprint applications NIST Category 5 (Quantum-resistant)
SLH-DSA-SHA2-256f Signing SLH-DSA SHA2 256bit Small: Offers 256-bit security with SHA-2, suitable for small footprint applications NIST Category 5 (Quantum-resistant)
SLH-DSA-Shake-128s Signing SLH-DSA SHAKE 128bit Small: Provides 128-bit security with SHAKE, designed for small footprint applications NIST Category 1 (Quantum-resistant)
SLH-DSA-Shake-128f Signing SLH-DSA SHAKE 128bit Fast: Ensures 128-bit security with SHAKE, optimized for fast performance NIST Category 1 (Quantum-resistant)
SLH-DSA-Shake-192s Signing SLH-DSA SHAKE 192bit Small: Provides 192-bit security with SHAKE, designed for small footprint applications NIST Category 3 (Quantum-resistant)
HASH-SLH-DSA-SHA2-128s-SHA256 Signing Pre-Hash SLH-DSA SHA2 128bit Small: Offers 128-bit security with SHA-2, optimized for small footprint applications NIST Category 1 (Quantum-resistant)
HASH-SLH-DSA-Shake-192f-SHAke256 Signing Pre-Hash SLH-DSA SHAKE 192bit Fast: Delivers 192-bit security with SHAKE, optimized for fast performance NIST Category 3 (Quantum-resistant)
HASH-SLH-DSA-Shake-256s-SHAke256 Signing Pre-Hash SLH-DSA SHA2 256bit Small: Offers 256-bit security with SHA-2, suitable for small footprint applications NIST Category 5 (Quantum-resistant)
HASH-SLH-DSA-Shake-256f-SHAke256 Signing Pre-Hash SLH-DSA SHA2 256bit Fast: Offers 256-bit security with SHAKE, optimized for fast performance NIST Category 5 (Quantum-resistant)
HASH-SLH-DSA-SHA2-128f-SHA256 Signing Pre-Hash SLH-DSA SHA2 128bit Fast: Delivers 128-bit security with SHA-2, optimized for fast performance NIST Category 1 (Quantum-resistant)
HASH-SLH-DSA-SHA2-192s-SHA512 Signing Pre-Hash SLH-DSA SHA2 192bit Small: Offers 192-bit security with SHA-2, suitable for small footprint applications NIST Category 3 (Quantum-resistant)
HASH-SLH-DSA-SHA2-192f-SHA512 Signing Pre-Hash SLH-DSA SHA2 192bit Fast: Ensures 192-bit security with SHA-2, optimized for fast performance NIST Category 3 (Quantum-resistant)
HASH-SLH-DSA-SHA2-256s-SHA512 Signing Pre-Hash SLH-DSA SHA2 256bit Small: Offers 256-bit security with SHA-2, suitable for small footprint applications NIST Category 5 (Quantum-resistant)
HASH-SLH-DSA-SHA2-256f-SHA512 Signing Pre-Hash SLH-DSA SHA2 256bit Small: Offers 256-bit security with SHA-2, suitable for small footprint applications NIST Category 5 (Quantum-resistant)
HASH-SLH-DSA-Shake-128s-Shake128 Signing Pre-Hash SLH-DSA SHAKE 128bit Small: Provides 128-bit security with SHAKE, designed for small footprint applications NIST Category 1 (Quantum-resistant)
HASH-SLH-DSA-Shake-128f-Shake128 Signing Pre-Hash SLH-DSA SHA2 128bit Fast: Ensures 128-bit security with SHA-2, optimized for fast performance NIST Category 1 (Quantum-resistant)
HASH-SLH-DSA-Shake-192s-SHAke256 Signing Pre-Hash SLH-DSA SHAKE 192bit Small: Provides 192-bit security with SHAKE, designed for small footprint applications NIST Category 3 (Quantum-resistant)
Composite ML-DSA44 / PSS2048 Signing ML-DSA44 / RSA 2048 PSS combines 128-bit quantum security of ML-DSA44 with RSA2048PSS, suitable for moderate security applications requiring post-quantum and classical resilience NIST Category 2 (Quantum-resistant)
Composite ML-DSA65 / ECP384 Signing ML-DSA65 / ECP384 offers 192-bit quantum security of ML-DSA65 with ECDSA P-384, ideal for high-security applications needing long-term protection NIST Category 3 (Quantum-resistant)
Composite ML-DSA65 / Brainpool P-256 Signing ML-DSA65 / Brainpool P-256 provides 192-bit quantum security of ML-DSA65 with Brainpool P-256, designed for secure communications and data integrity NIST Category 3 (Quantum-resistant)
Composite ML-DSA65 / Ed25519 Signing ML-DSA65 / Ed25519 combines 192-bit quantum security of ML-DSA65 with Ed25519, optimized for fast and secure digital signatures NIST Category 3 (Quantum-resistant)
Composite ML-DSA87 / ECP384 Signing ML-DSA87 / ECP384 ensures 256-bit quantum security of ML-DSA87 with ECDSA P-384, suitable for highly sensitive data and long-term protection NIST Category 5 (Quantum-resistant)
Composite ML-DSA87 / Brainpool P-384 Signing ML-DSA87 / Brainpool P-384 offers 256-bit quantum security of ML-DSA87 with Brainpool P-384, ideal for secure financial transactions and data integrity NIST Category 5 (Quantum-resistant)
Composite ML-DSA87 / Ed448 Signing ML-DSA87 / Ed448 combines 256-bit quantum security of ML-DSA87 with Ed448, designed for high-security digital signatures and fast performance NIST Category 5 (Quantum-resistant)
Composite ML-DSA87 / PSS4096 Signing ML-DSA87 / RSA 4096 PSS provides 256-bit quantum security of ML-DSA87 with RSA 4096 PSS, suitable for highly sensitive data and long-term protection NIST Category 3 (Quantum-resistant)
Composite ML-DSA44 / RSA2048 Signing ML-DSA44 / RSA 2048 combines 128-bit quantum security of ML-DSA44 with RSA 2048, suitable for moderate security applications requiring post-quantum and classical resilience NIST Category 2 (Quantum-resistant)
Composite ML-DSA44 / Ed25519 Signing ML-DSA44 / Ed25519 offers 128-bit quantum security of ML-DSA44 with Ed25519, optimized for fast and secure digital signatures NIST Category 2 (Quantum-resistant)
Composite ML-DSA44 / ECP256 Signing ML-DSA44 / ECP256 provides 128-bit quantum security of ML-DSA44 with ECDSA P-256, ideal for secure communications and data integrity NIST Category 2 (Quantum-resistant)
Composite ML-DSA65 / PSS3072 Signing ML-DSA65 / RSA 3072 PSS combines 192-bit quantum security of ML-DSA65 with RSA 3072 PSS, suitable for long-term protection and moderate security applications NIST Category 3 (Quantum-resistant)
Composite ML-DSA65 / RSA3072 Signing ML-DSA65 / RSA 3072 offers 192-bit quantum security of ML-DSA65 with RSA 3072, ideal for secure communications and data integrity NIST Category 3 (Quantum-resistant)
Composite ML-DSA65 / PSS4096 Signing ML-DSA65 / RSA 4096 PSS provides 192-bit quantum security of ML-DSA65 with RSA 4096 PSS, suitable for highly sensitive data and long-term protection NIST Category 3 (Quantum-resistant)
Composite ML-DSA65 / RSA4096 Signing ML-DSA65 / RSA 4096 combines 192-bit quantum security of ML-DSA65 with RSA 4096, ideal for high-security applications needing long-term protection NIST Category 3 (Quantum-resistant)
Composite ML-DSA65 / ECP256 Signing ML-DSA65 / ECP256 offers 192-bit quantum security of ML-DSA65 with ECDSA P-256, designed for secure communications and data integrity NIST Category 3 (Quantum-resistant)
RSA Encryption A widely-used asymmetric encryption algorithm that provides secure data transmission, suitable for a variety of security applications including secure communications and data integrity Medium
RSA-OAEP Encryption An asymmetric encryption algorithm that uses Optimal Asymmetric Encryption Padding (OAEP) to enhance security, suitable for encryption of sensitive information High
PBE-SHA1-3DES Encryption Suitable for securing sensitive data with moderate security needs. Not recommended for high-security applications due to outdated components Medium
PBE-SHA1-2DES Encryption Suitable for moderate security needs. Not recommended for high-security applications Low
PBE-SHA1-RC2-128 Encryption Provides moderate security. Not recommended for high-security applications Medium
PBE-SHA1-RC2-40 Encryption Offers low security. Not recommended for sensitive data Low
JCEKS-SHA1-3DES Encryption Java variant of PBE-SHA1-3DES: Suitable for moderate security needs. Not recommended for high-security applications Medium
PBE-MD2-DES Encryption Outdated and insecure. Not recommended for use Low
PBE-SHA1-DES Encryption Suitable for moderate security needs. Not recommended for high-security applications Low
PBE-SHA1-RC2-64 Encryption Provides moderate security. Not recommended for high-security applications Low
PBES2-PKCS5-SHA512 Encryption Strong security, suitable for high-security encryption High
PBE-MD5-DES Encryption Outdated and insecure. Not recommended for use Low
PBE-MD2-RC2-64 Encryption Outdated and insecure. Not recommended for use Low
PBE-MD5-RC2-64 Encryption Outdated and insecure. Not recommended for use Low
DES-EDE3-CBC Encryption 112-bit security (effectively ~80-bit), suitable for legacy compatibility but not recommended for new secure applications Low
AES128-CBC Encryption 128-bit security, suitable for moderate security data encryption High
AES192-CBC Encryption 192-bit security, suitable for higher security data encryption High
AES192-GCM Encryption 192-bit security, ideal for secure communications with higher security needs High
AES256-CBC Encryption 256-bit security, suitable for highly sensitive data encryption High
AES256-GCM Encryption 256-bit security, ideal for secure communications with the highest security needs High
AES128-GCM Encryption 128-bit security, ideal for secure communications High
MD5 Hashing MD5 Hash Algorithm: Outdated and insecure. Not recommended for use Low
SHA1 Hashing SHA1 Hash Algorithm: Provides moderate security but is considered less secure due to known vulnerabilities. Not recommended for new applications or highly sensitive data Low
SHA256 Hashing SHA-256 Hash Algorithm Medium
SHA3-512 Hashing SHA3-512 Hash Algorithm Very High
SHAKE128 Hashing SHAKE128 Hash Algorithm Medium
SHAKE256 Hashing SHAKE256 Hash Algorithm Very High
SHA384 Hashing SHA-384 Hash Algorithm High
SHA512 Hashing SHA-512 Hash Algorithm Very High
SHA3-224 Hashing SHA3-224 Hash Algorithm Medium
SHA3-256 Hashing SHA3-256 Hash Algorithm Medium
SHA3-384 Hashing SHA3-384 Hash Algorithm High