Asymmetric (public key) encryption:
- DSA
- ElGamal
- Elliptic curve cryptography
- NTRUEncrypt
- RSA
Cryptographic hash functions:
- HMAC: keyed-hash message authentication
- MD5 – Note that there is now a method of generating
collisions for MD5
- RIPEMD-160
- SHA-1
- SHA-2 (SHA-224, SHA-256, SHA-384, SHA-512)
- Tiger (TTH), usually used in Tiger tree hashes
Cryptographically secure
pseudo-random number generators
- Blum Blum Shub - based on the hardness of factorization
- Fortuna, intended as an improvement on Yarrow algorithm
- Linear feedback shift register
- Yarrow algorithm
- Key exchange
- Diffie–Hellman key exchange
- Secret sharing, Secret Splitting, Key Splitting, M of N
algorithms
- Blakey's Scheme
- Shamir's Scheme
Symmetric (secret key) encryption:
- Advanced Encryption Standard (AES), winner of NIST
competition, also known as Rijndael
- Blowfish
- Data Encryption Standard (DES), sometimes DE Algorithm,
winner of NBS selection competition, replaced by AES for most purposes
- IDEA
- RC4 (cipher)
- Tiny Encryption Algorithm