Location>code7788 >text

Classification of encryption algorithms

Popularity:583 ℃/2025-04-07 10:23:03

Table of contents
  • 1. Divided by encryption algorithm type
  • 2. Divided by application scenario
  • 3. Divided by key management method
  • 4. Hybrid encryption system
  • 5. Physical layer encryption
  • 6. Frontier encryption technology


The following is a classification and sorting out encryption technology, divided into six categories according to the main application areas and technical characteristics:

  • Algorithm type

    • symmetry
      • Group encryption
      • Sequence password
    • Asymmetric
    • Hash
  • Application scenarios

    • transmission
    • storage
    • identity
    • privacy
  • Key Management

    • Centralized
    • distributed
    • Exchange Agreement
  • Hybrid system

    • RSA+AES and other combinations
    • PKI
  • Physical layer encryption

    • QKD
    • Optical communication
  • Frontier Technology

    • Quantum resistance
    • FHE
    • ABE

1. Divided by encryption algorithm type

  1. Symmetric encryption

    • Features: Encryption and decryption use the same key
    • Algorithm example:
      • AES (Advanced Encryption Standard)
      • DES (data encryption standard, gradually eliminated)
      • 3DES (Triple DES)
      • ChaCha20 (Mobile Efficient Algorithm)
  2. Asymmetric encryption

    • Features: Public key encryption, private key decryption
    • Algorithm example:
      • RSA (based on large numbers decomposition)
      • ECC (elliptic curve encryption, low resource usage)
      • ElGamal (Discrete Logarithm Problem)
  3. Hash algorithm (one-way encryption)

    • Features: Irreversible, generates a fixed-length summary
    • Algorithm example:
      • SHA-256/SHA-3 (Safe hash)
      • MD5 (Not recommended for safe scenarios)
      • BLAKE3 (High performance hash)

2. Divided by application scenario

  1. Data transmission encryption
    • Protocol: TLS/SSL (Basic HTTPS), IPSec (commonly used in VPN)
  2. Data storage encryption
    • Technology: Disk encryption (BitLocker), Database Field Encryption (AES-GCM)
  3. Identity Authentication
    • Applications: Digital Signature (RSA/ECDSA), JWT Token (HMAC Encryption)
  4. Privacy protection
    • Technology: Homomorphic encryption (directly processing encrypted data), zero-knowledge proof

3. Divided by key management method

  1. Centralized key management
    • Tools: HSM (hardware security module), KMS (key management system)
  2. Distributed key management
    • Technology: Shamir secret sharing, blockchain multi-signature mechanism
  3. Key Exchange Protocol
    • Algorithms: Diffie-Hellman (classic key exchange), SPAKE2 (anti-man-in-the-middle attack)

4. Hybrid encryption system

  1. Typical Solution
    • Asymmetric encryption passes symmetric keys (such as RSA+AES)
    • Application scenarios: SSL/TLS handshake process, PGP email encryption

5. Physical layer encryption

  1. Quantum Key Distribution (QKD)
    • Principle: Quantum entangled state transmission key
    • Agreement: BB84, E91
  2. Optical communication encryption
    • Technology: Chaos laser encryption, OTN layer encryption

6. Frontier encryption technology

  1. Anti-quantum encryption
    • Algorithm: Kyber (based on grid theory), SPHINCS+ (hash signature scheme)
  2. Fully homomorphic encryption (FHE)
    • Features: Supports direct calculation of encrypted data
    • Application: Privacy AI training, encrypted database query
  3. Attribute-based encryption (ABE)
    • Features: Dynamically control decryption permissions based on attributes