Cryptography
Overview
This section contains recommendations for implementing and using functionality related to cryptographic operations.
Main rule of cryptography is do not invent your own cryptography. It can definitely be hacked.
General practices
Scenario | Algorithm (base) | Algorithm (advanced) |
---|---|---|
Key exchange | Diffie-Hellman key exchange, 2048 bit | ECDH Curve25519 |
Message integrity | HMAC-SHA2, 256 bit | HMAC-SHA2, 512 bit |
Message hash | SHA2, 256 bit | SHA2, 512 bit |
Asymmetric encryption | RSA, 2048 bit, SHA-256 | ECC Curve25519 or RSA, 3072 bit, SHA-256 |
Symmetric encryption | AES, 128 bit, GCM | AES, 256 bit, GCM |
Key exchange | Argon2 or PBKDF2 | Argon2 or PBKDF2 |
Last updated