RSA 1024 |
Signing |
RSA 1024 bits offers moderate security but is now considered vulnerable and outdated for most modern applications |
Low (80-bit) |
RSA 2048 |
Signing |
RSA 2048 bits offers strong security and is widely used for modern encryption and digital signatures |
Medium (112-bit) |
RSA 3072 |
Signing |
RSA 3072 bits provides a higher security level, suitable for long-term protection of sensitive data |
Medium (128-bit) |
RSA 4096 |
Signing |
RSA 4096 bits offers very high security, commonly used for highly sensitive data and long-term encryption |
Medium (128-bit) |
RSA 8192 |
Signing |
RSA 8192 bits provides extremely high security, used for the most sensitive data and long-term protection |
High (192-bit) |
RSA PSS/OAEP 1024 |
Signing |
RSA 1024 bits PSS provides moderate security for digital signatures, with PSS offering improved resistance against certain attacks, though it's now considered vulnerable for most applications |
Low (80-bit) |
RSA PSS/OAEP 2048 |
Signing |
RSA 2048 bits PSS offers strong security with enhanced resistance to forgery and adaptive chosen-message attacks, making it widely used in modern systems |
Medium (112-bit) |
RSA PSS/OAEP 3072 |
Signing |
RSA 3072 bits PSS provides enhanced security for long-term digital signature protection, with PSS improving resistance to certain signature-related attacks |
Medium (128-bit) |
RSA PSS/OAEP 4096 |
Signing |
RSA 4096 bits PSS provides very high security for digital signatures, with PSS offering added protection against vulnerabilities in deterministic signature schemes |
Medium (128-bit) |
RSA PSS/OAEP 8192 |
Signing |
RSA 8192 bits PSS offers extremely high security for critical digital signatures, with PSS further strengthening resistance to advanced cryptographic attacks and long-term protection |
High (192-bit) |
ECDSA P-256 |
Signing |
Digital signature algorithm based on the NIST P-256 curve, providing 128-bit security |
Medium (128-bit) |
ECDSA P-384 |
Signing |
Digital signature algorithm based on the NIST P-384 curve, providing 192-bit security |
High (192-bit) |
ECDSA P-521 |
Signing |
Digital signature algorithm based on the NIST P-521 curve, providing 256-bit security |
Very High (256-bit) |
Brainpool P-256r1 |
Signing |
Brainpool P256 is a 256-bit elliptic curve offering strong security for digital signatures and key exchange |
Medium (128-bit) |
Brainpool P-256t1 |
Signing |
Brainpool P256T is a 256-bit twisted curve, optimized for faster operations and improved security in digital signatures and key exchange |
Medium (128-bit) |
Brainpool P-320r1 |
Signing |
Brainpool P320 is a 320-bit curve providing strong security for cryptographic operations, suitable for high-security applications |
Medium (128-bit) |
Brainpool P-320t1 |
Signing |
Brainpool P320T is a 320-bit twisted curve, balancing strong security and efficient performance for cryptographic tasks |
Medium (128-bit) |
Brainpool P-384t1 |
Signing |
Brainpool P384T is a 384-bit twisted curve providing strong security for digital signatures and key exchange, optimized for performance and efficiency |
High (192-bit) |
Brainpool P-512t1 |
Signing |
Brainpool P512T is a 512-bit twisted curve, providing very high security and optimized for efficient cryptographic processing |
Very High (256-bit) |
Brainpool P-384r1 |
Signing |
Brainpool P384 is a 384-bit elliptic curve providing enhanced security for high-assurance applications |
High (192-bit) |
Brainpool P-512r1 |
Signing |
Brainpool P512 is a 512-bit elliptic curve offering very high security for sensitive data and long-term protection |
Very High (256-bit) |
Brainpool P-160r1 |
Signing |
Brainpool P160 is a 160-bit curve, offering moderate security for lightweight cryptographic applications |
Low (80-bit) |
Brainpool P-160t1 |
Signing |
Brainpool P160T is a 160-bit twisted curve, offering efficient performance and moderate security for lightweight applications |
Low (80-bit) |
Brainpool P-192r1 |
Signing |
Brainpool P192 is a 192-bit curve providing a balanced security level for general-purpose cryptography |
Low (80-bit) |
Brainpool P-192t1 |
Signing |
Brainpool P192T is a 192-bit twisted curve, optimized for faster cryptographic operations with improved security |
Low (80-bit) |
Brainpool P-224r1 |
Signing |
Brainpool P224 is a 224-bit curve offering strong security for medium-strength cryptographic applications |
Medium (112-bit) |
Brainpool P-224t1 |
Signing |
Brainpool P224T is a 224-bit twisted Edwards curve, optimized for efficient cryptographic operations with strong security |
Medium (112-bit) |
SEC P-256k1 |
Signing |
Sec P256K is a 256-bit curve widely used in Bitcoin and blockchain technologies, optimized for fast elliptic curve operations |
Medium (128-bit) |
SEC P-224r1 |
Signing |
Sec P224 is a 224-bit curve offering strong security for general-purpose cryptography, commonly used in digital signatures |
Medium (112-bit) |
SEC P-224k1 |
Signing |
Sec P224K is a 224-bit curve used in cryptographic applications with an emphasis on fast and efficient operations |
Medium (112-bit) |
SEC P-192r1 |
Signing |
Sec P192 is a 192-bit curve providing moderate security for lightweight cryptographic applications |
Low (80-bit) |
SEC P-192k1 |
Signing |
Sec P192K is a 192-bit curve widely used in blockchain and cryptographic systems, optimized for efficient operations |
Low (80-bit) |
Ed25519 |
Signing |
Ed25519 is a high-security elliptic curve signature algorithm, designed for fast performance and resistance to side-channel attacks |
Medium (128-bit) |
Ed448 |
Signing |
Ed448 is a highly secure elliptic curve signature algorithm, offering stronger security than ED25519, with a larger key size |
High (224-bit) |
ML-DSA44 |
Signing |
ML-DSA44 offers 128-bit quantum security, designed for lightweight applications that require post-quantum resilience with moderate security |
NIST Category 2 (Quantum-resistant) |
ML-DSA65 |
Signing |
ML-DSA65 provides 192-bit quantum security, offering stronger protection against quantum adversaries while maintaining efficiency for broader use cases |
NIST Category 3 (Quantum-resistant) |
ML-DSA87 |
Signing |
ML-DSA87 delivers 256-bit quantum security, designed for high-assurance applications needing robust resistance to future quantum computing threats |
NIST Category 5 (Quantum-resistant) |
SLH-DSA-SHA2-128s |
Signing |
SLH-DSA SHA2 128bit Small: Offers 128-bit security with SHA-2, optimized for small footprint applications |
NIST Category 1 (Quantum-resistant) |
SLH-DSA-Shake-192f |
Signing |
SLH-DSA SHAKE 192bit Fast: Delivers 192-bit security with SHAKE, optimized for fast performance |
NIST Category 3 (Quantum-resistant) |
SLH-DSA-Shake-256s |
Signing |
SLH-DSA SHAKE 256bit Small: Offers 256-bit security with SHAKE, suitable for small footprint applications |
NIST Category 5 (Quantum-resistant) |
SLH-DSA-Shake-256f |
Signing |
SLH-DSA SHA2 256bit Fast: Offers 256-bit security with SHAKE, optimized for fast performance |
NIST Category 5 (Quantum-resistant) |
SLH-DSA-SHA2-128f |
Signing |
SLH-DSA SHAKE 128bit Fast: Delivers 128-bit security with SHAKE, optimized for fast performance |
NIST Category 1 (Quantum-resistant) |
SLH-DSA-SHA2-192s |
Signing |
SLH-DSA SHA2 192bit Small: Offers 192-bit security with SHA-2, suitable for small footprint applications |
NIST Category 3 (Quantum-resistant) |
SLH-DSA-SHA2-192f |
Signing |
SLH-DSA SHA2 192bit Fast: Ensures 192-bit security with SHA-2, optimized for fast performance |
NIST Category 3 (Quantum-resistant) |
SLH-DSA-SHA2-256s |
Signing |
SLH-DSA SHA2 256bit Small: Offers 256-bit security with SHA-2, suitable for small footprint applications |
NIST Category 5 (Quantum-resistant) |
SLH-DSA-SHA2-256f |
Signing |
SLH-DSA SHA2 256bit Small: Offers 256-bit security with SHA-2, suitable for small footprint applications |
NIST Category 5 (Quantum-resistant) |
SLH-DSA-Shake-128s |
Signing |
SLH-DSA SHAKE 128bit Small: Provides 128-bit security with SHAKE, designed for small footprint applications |
NIST Category 1 (Quantum-resistant) |
SLH-DSA-Shake-128f |
Signing |
SLH-DSA SHAKE 128bit Fast: Ensures 128-bit security with SHAKE, optimized for fast performance |
NIST Category 1 (Quantum-resistant) |
SLH-DSA-Shake-192s |
Signing |
SLH-DSA SHAKE 192bit Small: Provides 192-bit security with SHAKE, designed for small footprint applications |
NIST Category 3 (Quantum-resistant) |
HASH-SLH-DSA-SHA2-128s-SHA256 |
Signing |
Pre-Hash SLH-DSA SHA2 128bit Small: Offers 128-bit security with SHA-2, optimized for small footprint applications |
NIST Category 1 (Quantum-resistant) |
HASH-SLH-DSA-Shake-192f-SHAke256 |
Signing |
Pre-Hash SLH-DSA SHAKE 192bit Fast: Delivers 192-bit security with SHAKE, optimized for fast performance |
NIST Category 3 (Quantum-resistant) |
HASH-SLH-DSA-Shake-256s-SHAke256 |
Signing |
Pre-Hash SLH-DSA SHA2 256bit Small: Offers 256-bit security with SHA-2, suitable for small footprint applications |
NIST Category 5 (Quantum-resistant) |
HASH-SLH-DSA-Shake-256f-SHAke256 |
Signing |
Pre-Hash SLH-DSA SHA2 256bit Fast: Offers 256-bit security with SHAKE, optimized for fast performance |
NIST Category 5 (Quantum-resistant) |
HASH-SLH-DSA-SHA2-128f-SHA256 |
Signing |
Pre-Hash SLH-DSA SHA2 128bit Fast: Delivers 128-bit security with SHA-2, optimized for fast performance |
NIST Category 1 (Quantum-resistant) |
HASH-SLH-DSA-SHA2-192s-SHA512 |
Signing |
Pre-Hash SLH-DSA SHA2 192bit Small: Offers 192-bit security with SHA-2, suitable for small footprint applications |
NIST Category 3 (Quantum-resistant) |
HASH-SLH-DSA-SHA2-192f-SHA512 |
Signing |
Pre-Hash SLH-DSA SHA2 192bit Fast: Ensures 192-bit security with SHA-2, optimized for fast performance |
NIST Category 3 (Quantum-resistant) |
HASH-SLH-DSA-SHA2-256s-SHA512 |
Signing |
Pre-Hash SLH-DSA SHA2 256bit Small: Offers 256-bit security with SHA-2, suitable for small footprint applications |
NIST Category 5 (Quantum-resistant) |
HASH-SLH-DSA-SHA2-256f-SHA512 |
Signing |
Pre-Hash SLH-DSA SHA2 256bit Small: Offers 256-bit security with SHA-2, suitable for small footprint applications |
NIST Category 5 (Quantum-resistant) |
HASH-SLH-DSA-Shake-128s-Shake128 |
Signing |
Pre-Hash SLH-DSA SHAKE 128bit Small: Provides 128-bit security with SHAKE, designed for small footprint applications |
NIST Category 1 (Quantum-resistant) |
HASH-SLH-DSA-Shake-128f-Shake128 |
Signing |
Pre-Hash SLH-DSA SHA2 128bit Fast: Ensures 128-bit security with SHA-2, optimized for fast performance |
NIST Category 1 (Quantum-resistant) |
HASH-SLH-DSA-Shake-192s-SHAke256 |
Signing |
Pre-Hash SLH-DSA SHAKE 192bit Small: Provides 192-bit security with SHAKE, designed for small footprint applications |
NIST Category 3 (Quantum-resistant) |
Composite ML-DSA44 / PSS2048 |
Signing |
ML-DSA44 / RSA 2048 PSS combines 128-bit quantum security of ML-DSA44 with RSA2048PSS, suitable for moderate security applications requiring post-quantum and classical resilience |
NIST Category 2 (Quantum-resistant) |
Composite ML-DSA65 / ECP384 |
Signing |
ML-DSA65 / ECP384 offers 192-bit quantum security of ML-DSA65 with ECDSA P-384, ideal for high-security applications needing long-term protection |
NIST Category 3 (Quantum-resistant) |
Composite ML-DSA65 / Brainpool P-256 |
Signing |
ML-DSA65 / Brainpool P-256 provides 192-bit quantum security of ML-DSA65 with Brainpool P-256, designed for secure communications and data integrity |
NIST Category 3 (Quantum-resistant) |
Composite ML-DSA65 / Ed25519 |
Signing |
ML-DSA65 / Ed25519 combines 192-bit quantum security of ML-DSA65 with Ed25519, optimized for fast and secure digital signatures |
NIST Category 3 (Quantum-resistant) |
Composite ML-DSA87 / ECP384 |
Signing |
ML-DSA87 / ECP384 ensures 256-bit quantum security of ML-DSA87 with ECDSA P-384, suitable for highly sensitive data and long-term protection |
NIST Category 5 (Quantum-resistant) |
Composite ML-DSA87 / Brainpool P-384 |
Signing |
ML-DSA87 / Brainpool P-384 offers 256-bit quantum security of ML-DSA87 with Brainpool P-384, ideal for secure financial transactions and data integrity |
NIST Category 5 (Quantum-resistant) |
Composite ML-DSA87 / Ed448 |
Signing |
ML-DSA87 / Ed448 combines 256-bit quantum security of ML-DSA87 with Ed448, designed for high-security digital signatures and fast performance |
NIST Category 5 (Quantum-resistant) |
Composite ML-DSA87 / PSS4096 |
Signing |
ML-DSA87 / RSA 4096 PSS provides 256-bit quantum security of ML-DSA87 with RSA 4096 PSS, suitable for highly sensitive data and long-term protection |
NIST Category 3 (Quantum-resistant) |
Composite ML-DSA44 / RSA2048 |
Signing |
ML-DSA44 / RSA 2048 combines 128-bit quantum security of ML-DSA44 with RSA 2048, suitable for moderate security applications requiring post-quantum and classical resilience |
NIST Category 2 (Quantum-resistant) |
Composite ML-DSA44 / Ed25519 |
Signing |
ML-DSA44 / Ed25519 offers 128-bit quantum security of ML-DSA44 with Ed25519, optimized for fast and secure digital signatures |
NIST Category 2 (Quantum-resistant) |
Composite ML-DSA44 / ECP256 |
Signing |
ML-DSA44 / ECP256 provides 128-bit quantum security of ML-DSA44 with ECDSA P-256, ideal for secure communications and data integrity |
NIST Category 2 (Quantum-resistant) |
Composite ML-DSA65 / PSS3072 |
Signing |
ML-DSA65 / RSA 3072 PSS combines 192-bit quantum security of ML-DSA65 with RSA 3072 PSS, suitable for long-term protection and moderate security applications |
NIST Category 3 (Quantum-resistant) |
Composite ML-DSA65 / RSA3072 |
Signing |
ML-DSA65 / RSA 3072 offers 192-bit quantum security of ML-DSA65 with RSA 3072, ideal for secure communications and data integrity |
NIST Category 3 (Quantum-resistant) |
Composite ML-DSA65 / PSS4096 |
Signing |
ML-DSA65 / RSA 4096 PSS provides 192-bit quantum security of ML-DSA65 with RSA 4096 PSS, suitable for highly sensitive data and long-term protection |
NIST Category 3 (Quantum-resistant) |
Composite ML-DSA65 / RSA4096 |
Signing |
ML-DSA65 / RSA 4096 combines 192-bit quantum security of ML-DSA65 with RSA 4096, ideal for high-security applications needing long-term protection |
NIST Category 3 (Quantum-resistant) |
Composite ML-DSA65 / ECP256 |
Signing |
ML-DSA65 / ECP256 offers 192-bit quantum security of ML-DSA65 with ECDSA P-256, designed for secure communications and data integrity |
NIST Category 3 (Quantum-resistant) |
RSA |
Encryption |
A widely-used asymmetric encryption algorithm that provides secure data transmission, suitable for a variety of security applications including secure communications and data integrity |
Medium |
RSA-OAEP |
Encryption |
An asymmetric encryption algorithm that uses Optimal Asymmetric Encryption Padding (OAEP) to enhance security, suitable for encryption of sensitive information |
High |
PBE-SHA1-3DES |
Encryption |
Suitable for securing sensitive data with moderate security needs. Not recommended for high-security applications due to outdated components |
Medium |
PBE-SHA1-2DES |
Encryption |
Suitable for moderate security needs. Not recommended for high-security applications |
Low |
PBE-SHA1-RC2-128 |
Encryption |
Provides moderate security. Not recommended for high-security applications |
Medium |
PBE-SHA1-RC2-40 |
Encryption |
Offers low security. Not recommended for sensitive data |
Low |
JCEKS-SHA1-3DES |
Encryption |
Java variant of PBE-SHA1-3DES: Suitable for moderate security needs. Not recommended for high-security applications |
Medium |
PBE-MD2-DES |
Encryption |
Outdated and insecure. Not recommended for use |
Low |
PBE-SHA1-DES |
Encryption |
Suitable for moderate security needs. Not recommended for high-security applications |
Low |
PBE-SHA1-RC2-64 |
Encryption |
Provides moderate security. Not recommended for high-security applications |
Low |
PBES2-PKCS5-SHA512 |
Encryption |
Strong security, suitable for high-security encryption |
High |
PBE-MD5-DES |
Encryption |
Outdated and insecure. Not recommended for use |
Low |
PBE-MD2-RC2-64 |
Encryption |
Outdated and insecure. Not recommended for use |
Low |
PBE-MD5-RC2-64 |
Encryption |
Outdated and insecure. Not recommended for use |
Low |
DES-EDE3-CBC |
Encryption |
112-bit security (effectively ~80-bit), suitable for legacy compatibility but not recommended for new secure applications |
Low |
AES128-CBC |
Encryption |
128-bit security, suitable for moderate security data encryption |
High |
AES192-CBC |
Encryption |
192-bit security, suitable for higher security data encryption |
High |
AES192-GCM |
Encryption |
192-bit security, ideal for secure communications with higher security needs |
High |
AES256-CBC |
Encryption |
256-bit security, suitable for highly sensitive data encryption |
High |
AES256-GCM |
Encryption |
256-bit security, ideal for secure communications with the highest security needs |
High |
AES128-GCM |
Encryption |
128-bit security, ideal for secure communications |
High |
MD5 |
Hashing |
MD5 Hash Algorithm: Outdated and insecure. Not recommended for use |
Low |
SHA1 |
Hashing |
SHA1 Hash Algorithm: Provides moderate security but is considered less secure due to known vulnerabilities. Not recommended for new applications or highly sensitive data |
Low |
SHA256 |
Hashing |
SHA-256 Hash Algorithm |
Medium |
SHA3-512 |
Hashing |
SHA3-512 Hash Algorithm |
Very High |
SHAKE128 |
Hashing |
SHAKE128 Hash Algorithm |
Medium |
SHAKE256 |
Hashing |
SHAKE256 Hash Algorithm |
Very High |
SHA384 |
Hashing |
SHA-384 Hash Algorithm |
High |
SHA512 |
Hashing |
SHA-512 Hash Algorithm |
Very High |
SHA3-224 |
Hashing |
SHA3-224 Hash Algorithm |
Medium |
SHA3-256 |
Hashing |
SHA3-256 Hash Algorithm |
Medium |
SHA3-384 |
Hashing |
SHA3-384 Hash Algorithm |
High |