| 1. Block Cipher |
General-Purpose Block Ciphers:
| |
Algorithm |
Key length |
| 1 |
AES |
128, 192, 256 |
| 2 |
Camellia |
128, 192, 256 |
| 3 |
CLEFIA |
128, 192, 256 |
| 4 |
SEED |
128 |
Lightweight Block Cipher:
| |
Algorithm |
Key length |
| 1 |
HIGHT |
128 |
| 2 |
PRESENT |
80, 128 |
Tweakable Block Cipher:
| |
Algorithm |
Key length |
| 1 |
Deoxys-TBC |
256, 384 |
| 2 |
Skinny |
64/192, 128/256, 128/384 |
| 3 |
XTS-AES |
128, 256 |
|
| 2. Stream Cipher |
| |
Algorithm |
Key length |
| 1 |
ChaCha20 |
256 |
| 2 |
HC |
128 |
| 3 |
KCipher-2 |
128 |
| 4 |
MUGI |
128 |
| 5 |
Rabbit |
128 |
|
| 3. Cryptographic Hash Function |
General-Purpose Hash Function:
| |
Algorithm |
Digest length |
| 1 |
SHA2 |
384, 512, 512/224, 512/256 |
| 2 |
SHA3 |
224, 256, 384, 512 |
| 3 |
SM3 |
256 |
Lightweight Hash Function:
| |
Algorithm |
Digest length |
| 1 |
PHOTON |
80/20/16 (P100), 128/16/16 (P144), 160/36/36 (P196), 224/32/32 (P256), 256/32/32 (P288) |
| 2 |
SPONGENT |
88, 128, 160, 224, 256 |
|
| 4. Asymmetric Encryption |
Encryption Scheme:
| |
Algorithm |
| 1 |
ACE-KEM |
| 2 |
ECIES-KEM |
| 3 |
FACE-KEM |
| 4 |
PSEC-KEM |
| 5 |
RSA-KEM |
| 6 |
RSA-OAEP |
Key Agreement Scheme:
| |
Algorithm |
| 1 |
DH Ephemeral-Ephemeral (C(2e,0s)) |
| 2 |
DH Ephemeral-Static (C(1e,1s)) |
| 3 |
DH Ephemeral-Static (C(1e,2s)) |
| 4 |
DH Ephemeral-Static (C(2e,2s)) |
| 5 |
ECDH Ephemeral-Ephemeral (C(2e,0s)) |
| 6 |
ECDH Ephemeral-Static (C(1e,2s)) |
| 7 |
ECDH Ephemeral-Static (C(2e,2s)) |
| 8 |
ECDH Ephemeral-Static(C(1e,1s)) |
Post-Quantum Key Encapsulation Mechanisms:
| |
Algorithm |
Parameter Sets |
| 1 |
mceliece |
460896, 460896f, 460896pc |
| 2 |
mceliece |
6688128, 6688128f, 6688128pc |
| 3 |
mceliece |
6960119, 6960119f, 6960119pc |
| 4 |
mceliece |
8192128, 8192128f, 8192128pc |
| 5 |
FrodoKEM |
976, 1344 |
| 6 |
eFrodoKEM |
976, 1344 |
| 7 |
HQC |
128, 192, 256 |
| 8 |
ML-KEM |
512, 768, 1024 |
| 9 |
NTRUHPS |
2048677, 4096821, 40961229, |
| 10 |
NTRUHRSS |
701, 1373 |
|
| 5. Digital Signature Scheme |
Classic Hard Problem-Based Signature Schemes:
| 1 |
BLS Signature Scheme |
| 2 |
Elliptic Curve Digital Signature Algorithm (ECDSA) |
| 3 |
Elliptic Curve Schnorr DSA (ECSDSA) |
| 4 |
RSA-PSS (RSA-Probabilistic Signature Scheme) |
| 5 |
ShangMi2 (SM2) |
Stateful Hash-Based Signature Schemes:
Post-Quantum Digital Signature Schemes:
| |
Algorithm |
Variant |
| 1 |
ML-DSA |
44, 65, 87 |
| 2 |
Falcon |
512, 1024 |
| 3 |
SLH-DSA-SHA2 |
128s, 192s, 256s, 128f, 192f, 256f |
| 4 |
SLH-DSA-SHAKE |
128s, 192s, 256s, 128f, 192f, 256f |
|
| 6. Cryptographic Prime Number Generators |
Primality Testing Algorithms:
| |
Algorithm |
| 1 |
Elliptic Curve Primality Test |
| 2 |
Miller-Rabin Primality Test |
| 3 |
Probabilistic Lucas Primality Test |
| 4 |
Pocklington Primality Test |
|
| 7. Deterministic Random Bit Generator (DRBG) |
| |
Algorithm |
Key length / Digest length |
| 1 |
AES-CTR-DRBG |
128, 192, 256 |
| 2 |
HMAC-SHA2-DRBG |
224, 256, 384, 512, 512/224, 512/256 |
| 3 |
SHA2-DRBG |
224, 256, 384, 512, 512/224, 512/256 |
|
| 8. Message Authentication Code (MAC) |
| |
Algorithm |
| 1 |
CMAC |
| 2 |
GMAC |
| 3 |
HMAC |
| 4 |
KMAC |
| 5 |
UMAC |
| 6 |
XCBC-MAC |
| 7 |
Chaskey-12 |
| 8 |
LightMAC |
| 9 |
MDx-MAC |
| 10 |
MDx-MAC-Short |
| 11 |
Poly1305 |
| 12 |
Tsudik's Keymode |
|
| 9. Key Derivation Function (KDF) |
General KDF:
| |
Algorithm |
Key length / Digest length |
| 1 |
One Step HASH-KDF-SHA |
224, 256, 384, 512, 512/224, 512/256 |
| 2 |
One Step HASH-KDF-SHA3 |
224, 256, 384, 512 |
| 3 |
One Step HMAC-KDF-SHA |
224, 256, 384, 512, 512/224, 512/256 |
| 4 |
One Step HMAC-KDF-SHA3 |
224, 256, 384, 512 |
| 5 |
One Step KMAC-KDF |
128, 256 |
| 6 |
Two Step HMAC-KDF-SHA |
224, 256, 384, 512, 512/224, 512/256 |
| 7 |
Two Step HMAC-KDF-SHA3 |
224, 256, 384, 512 |
| 8 |
Two Step AES-CMAC-KDF |
128, 192, 256 |
| 9 |
KMAC-PRF-KDF |
128, 256 |
Password-based KDF:
| |
Algorithm |
Key length / Digest length |
| 1 |
Argon |
2i, 2d, 2id |
| 2 |
bcrypt |
- |
| 3 |
PBKDF2-HMAC-SHA |
224, 256, 384, 512, 512/224, 512/256 |
| 4 |
PBKDF2-HMAC-SHA3 |
224, 256, 384, 512 |
| 5 |
scrypt |
- |
|
| 10. Authenticated Encryption (AE) |
| |
Algorithm |
Variant |
| 1 |
ASCON-AEAD |
128, 128a |
| 2 |
ChaCha20-Poly1305 |
- |
| 3 |
XChaCha20-Poly1305 |
- |
| 4 |
AES-CCM |
128, 192, 256 |
| 5 |
GCM-AES-XPN |
128, 256 |
| 6 |
AES-GCM |
128, 192, 256 |
| 7 |
AES-GCM-SIV |
128, 256 |
| 8 |
Sophie Germain Counter Mode (SGCM) |
- |
| 9 |
AES-SIV-CMAC |
256, 384, 512 |
|
| 11. Homomorphic Encryption |
| 1 |
Exponential ElGamal Encryption |
| 2 |
Paillier Encryption |
| 3 |
Cheon-Kim-Kim-Song (CKKS) Homomorphic Encryption |
|
| 12. Threshold Cryptography |
Threshold Signing:
| 1 |
FROST (Ed25519, SHA-512) |
| 2 |
FROST (Ed448, SHAKE256) |
| 3 |
FROST (Ristretto255, SHA-512) |
| 4 |
FROST (Secp256k1, SHA-256) |
|