Sponsor of the Day:
Jerkmate
https://www.techtarget.com/searchsecurity/feature/Cryptography-basics-Symmetric-key-encryption-algorithms
Symmetric key encryption algorithms and security: A guide | TechTarget
Approved for use since the 1970s, symmetric key encryption algorithms are just one way to keep confidential data secure. Take a look at the different...
symmetric keyencryption algorithmsguide techtargetsecurity
https://www.appdome.com/how-to/securing-workplace-apps/enterprise-mobile-app-security/upload-an-appdome-encrypted-app-to-testflight/
Encryption Algorithms Used by Appdome-Protected Apps
Sep 28, 2023 - Learn which encryption algorithms apply when you upload an Appdome-protected app to TestFlight. no code, no sdk Cyber Defense Automation
encryption algorithmsusedappdomeprotectedapps
https://axcrypt.net/information/technical-details/
AxCrypt Technical Details – Encryption Algorithms & File Formats
Explore AxCrypt's encryption standards: AES-256, RSA-4096, HMAC-SHA512, and file formats. Learn about key management, security features, and open-source code.
technical detailsencryption algorithmsfile formatsaxcrypt
https://www.iso.org/standard/86890.html
ISO/IEC 18033-2:2006/FDAmd 2 - Information technology — Security techniques — Encryption algorithms...
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 2
iso iec2 2006information technologysecurity techniquesencryption algorithms
https://axcrypt.net/en/information/technical-details/
AxCrypt Technical Details – Encryption Algorithms & File Formats
technical detailsencryption algorithmsfile formatsaxcrypt
https://peps.python.org/pep-0272/
PEP 272 – API for Block Encryption Algorithms v1.0 | peps.python.org
This document specifies a standard API for secret-key block encryption algorithms such as DES or Rijndael, making it easier to switch between different...
v1 0 pepsencryption algorithms272apiblock
https://hide.me/en/blog/all-you-need-to-know-about-vpn-encryption-algorithms/
All You Need to Know About VPN Encryption Algorithms - hide.me
VPN encryption is essential for securing data. Encryption algorithms ensure that your data remains confidential. Read all about them.
vpn encryptionneedknowalgorithmshide
https://www.blocksandfiles.com/security/2025/06/11/commvault-bulks-up-on-post-quantum-encryption-algorithms/1612576
Commvault bulks up on post quantum encryption algorithms
Jun 11, 2025 - Data protection vendor adds fifth NIST-approved algo
post quantum encryptioncommvaultbulksalgorithms
https://www.encryptionconsulting.com/category/education-center/common-encryption-algorithms/
Common Encryption Algorithms | Encryption Consulting
Get to know the most commonly used symmetric and asymmetric encryption algorithms.
common encryptionalgorithmsconsulting
https://datatracker.ietf.org/doc/draft-irtf-cfrg-aegis-aead/
draft-irtf-cfrg-aegis-aead-18 - The AEGIS Family of Authenticated Encryption Algorithms
This document describes the AEGIS-128L, AEGIS-256, AEGIS-128X, and AEGIS-256X AES-based authenticated encryption algorithms designed for high-performance...
draft irtf cfrgauthenticated encryptionaegisaead18
https://datatracker.ietf.org/doc/html/rfc5116
RFC 5116 - An Interface and Algorithms for Authenticated Encryption
An Interface and Algorithms for Authenticated Encryption (RFC 5116, )
authenticated encryptionrfc5116interfacealgorithms
https://datatracker.ietf.org/doc/rfc9864/
RFC 9864 - Fully-Specified Algorithms for JSON Object Signing and Encryption (JOSE) and CBOR Object...
This specification refers to cryptographic algorithm identifiers that fully specify the cryptographic operations to be performed, including any curve, key...
rfc 9864 fullyjson object signingencryption jose cborspecified algorithms
https://datatracker.ietf.org/doc/html/rfc9053
RFC 9053 - CBOR Object Signing and Encryption (COSE): Initial Algorithms
CBOR Object Signing and Encryption (COSE): Initial Algorithms (RFC 9053, )
cbor object signingrfc 9053encryption coseinitialalgorithms
https://datatracker.ietf.org/doc/html/rfc9864
RFC 9864 - Fully-Specified Algorithms for JSON Object Signing and Encryption (JOSE) and CBOR Object...
Fully-Specified Algorithms for JSON Object Signing and Encryption (JOSE) and CBOR Object Signing and Encryption (COSE) (RFC 9864, )
rfc 9864 fullyjson object signingencryption jose cborspecified algorithms
https://openjdk.org/jeps/121
JEP 121: Stronger Algorithms for Password-Based Encryption
password basedjep121strongeralgorithms
https://www.comparitech.com/blog/information-security/encryption-types-explained/
Common Encryption Types, Protocols and Algorithms Explained
Apr 4, 2026 - Comparitech breaks down the concepts behind encryption, explaining the most common algorithms, security protocols and their uses.
common encryptionalgorithms explainedtypesprotocols
https://www.rfc-editor.org/rfc/rfc9053
RFC 9053: CBOR Object Signing and Encryption (COSE): Initial Algorithms
Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic...
cbor object signingrfc 9053encryption coseinitialalgorithms
https://www.rfc-editor.org/rfc/rfc9864.html
RFC 9864: Fully-Specified Algorithms for JSON Object Signing and Encryption (JOSE) and CBOR Object...
This specification refers to cryptographic algorithm identifiers that fully specify the cryptographic operations to be performed, including any curve, key...
rfc 9864 fullyjson object signingencryption jose cborspecified algorithms