Cryptography

Overview

This section contains recommendations for implementing and using functionality related to cryptographic operations.

General practices

Scenario
Algorithm (base)
Algorithm (advanced)

Key exchange

Diffie-Hellman key exchange, 2048 bit

ECDH Curve25519

Message integrity

HMAC-SHA2, 256 bit

HMAC-SHA2, 512 bit

Message hash

SHA2, 256 bit

SHA2, 512 bit

Asymmetric encryption

RSA, 2048 bit, SHA-256

ECC Curve25519 or RSA, 3072 bit, SHA-256

Symmetric encryption

AES, 128 bit, GCM

AES, 256 bit, GCM

Key exchange

Argon2 or PBKDF2

Argon2 or PBKDF2

Last updated