Encryption algorithms are commonly used in computer communications, including FTP transfers. Usually they are used to provide secure transfers. If an algorithm is used in a transfer, the file is first translated into a seemingly meaningless cipher text and then transferred in this configuration; the receiving computer uses a key to translate the cipher into its original form. So if the message or file is intercepted before it reaches the receiving computer it is in an unusable (or encrypted) form.

Here are some commonly used algorithms:

DES/3DES or TripleDES

This is an encryption algorithm called Data Encryption Standard that was first used by the U.S. Government in the late 70's. It is commonly used in ATM machines (to encrypt PINs) and is utilized in UNIX password encryption. Triple DES or 3DES has replaced the older versions as a more secure method of encryption, as it encrypts data three times and uses a different key for at least one of the versions.

Blowfish

Blowfish is a symmetric block cipher that is unpatented and free to use. It was developed by Bruce Schneier and introduced in 1993.

AES

Advanced Encryption Standard or Rijndael; it uses the Rijndael block cipher approved by the National Institute of Standards and Technology (NIST). AES was originated by cryptographers Joan Daemen and Vincent Rijmen and replaced DES as the U.S. Government encryption technique in 2000.

Twofish

Twofish is a block cipher designed by Counterpane Labs. It was one of the five Advanced Encryption Standard (AES) finalists and is unpatented and open source.

IDEA

This encryption algorithm was used in Pretty Good Privacy (PGP) Version 2 and is an optional algorithm in OpenPGP. IDEA features 64 bit blocks with a 128 bit key.

MD5

MD5 was developed by Professor Ronald Riverst and was used to create digital signatures. It is a one way hash function and intended for 32 bit machines. It replaced the MD4 algorithm.

SHA 1

SHA 1 is a hashing algorithm similar to MD5, yet SHA 1 may replace MD5 since it offers more security

HMAC

This is a hashing method similar to MD5 and SHA 1, sometimes referred to as HMAC MD5 and HMAC SHA1.

RSA Security

 

  • RC4  RC4 is a variable key size stream cipher based on the use of a random permutation.
  • RC5  This is a parameterized algorithm with a variable block, key size and number of rounds.
  • RC6  This an evolution of RC5, it is also a parameterized algorithm that has variable block, key and a number of rounds. This algorithm has integer multiplication and 4 bit working registers.
  •  At TopTenREVIEWS We Do the Research So You Don t Have To. 

    References

    MyCrypto.net. (n.d.). Encryption algorithms. Retrieved October 25, 2006, from http://www.mycrypto.net/encryption/crypto_algorithms.html

    Webopedia. (2006). What is encryption algorithm?   A Word Definition From the Webopedia Computer Dictionary. Jupitermedia Corporation. Retrieved October 25, 2006, from http://www.webopedia.com/TERM/E/encryption_algorithm.html