diff --git a/crypto/crypto_algorithms.md b/crypto/crypto_algorithms.md index 98eae1c..e5b7c16 100644 --- a/crypto/crypto_algorithms.md +++ b/crypto/crypto_algorithms.md @@ -1,5 +1,6 @@ # Cryptographic Algorithms + @@ -8,7 +9,6 @@ - @@ -16,7 +16,6 @@ - @@ -24,7 +23,6 @@ - @@ -32,7 +30,6 @@ - -

-

-

- @@ -149,7 +127,6 @@ ECDSA-256 -

SHA-256

-

- @@ -203,7 +172,6 @@ ECDSA-256 - @@ -211,7 +179,6 @@ ECDSA-256 - @@ -219,7 +186,6 @@ ECDSA-256 -

-

- -
Status Alternative QCRMitigation
DESAvoid AES
3DESLegacy AES Short key lifetime
RC4Avoid AES
@@ -45,7 +42,7 @@

Acceptable

-

NGE

+

NGE

AES-GCM

@@ -55,10 +52,6 @@

✓ (256-bit)

✓ (256-bit)

-

-

-
@@ -82,11 +75,6 @@ DSA-3072 -

-

-

-
@@ -110,11 +98,6 @@ ECDSA-256 -

-

-

-
@@ -137,11 +120,6 @@ ECDSA-256 -

-

-

-
MD5 Avoid SHA-256
@@ -165,9 +142,6 @@ ECDSA-256 -

-
@@ -191,11 +165,6 @@ ECDSA-256 -

-

-

-
HMAC-MD5 Legacy HMAC-SHA-256 Short key lifetime
HMAC-SHA-1 Acceptable HMAC-SHA-256
HMAC-SHA-256 NGE
@@ -239,10 +205,6 @@ ECDSA-384 -

-

-
@@ -263,13 +225,9 @@ ECDSA-384 -

-

-
+

1. QCR = quantum computer resistant.

2. NGE = next generation encryption.

@@ -278,6 +236,7 @@ ECDSA-384
+ - Avoid: Algorithms that are marked as Avoid do not provide adequate security against modern threats and should not be used to protect sensitive information. It is recommended that these algorithms be replaced with stronger algorithms. - Legacy: Legacy algorithms provide a marginal but acceptable security level. They should be used only when no better alternatives are available, such as when interoperating with legacy equipment. It is recommended that these legacy algorithms be phased out and replaced with stronger algorithms.