Tom Olzak

Which cryptographic algorithms to use and those to avoid

In Data Security, Encryption, Risk Management on March 18, 2009 at 11:35

Researchers at Fortify Software have written a Crypto Manifesto, in which they make algorithm recommendations for:

  • Cryptographic hashes
  • Encryption and encoding
  • Symmetric and public keys
  • Pseudo-random number generators

The table below summaries the manifesto’s assertions, with details about why a certain algorithm calls into the use or not-use column included in the Fortify document.
 

recommended_encryption_methods

%d bloggers like this: