Encryption has turned into a buzzword. We hear all the time how encryption can protect various communications from snooping. Many internet users have discovered encrypted email or messaging apps and VPNs to secure their connection. .

Contents

Meanwhile, governments have their own worries about encrypted services — they want the ability to access various accounts in the matter of emergency. That's why they are demanding backdoor access to encrypted services through legislation. Naturally, these new laws get loads of media attention, putting encryption into the spotlight.

And this is when we start to see a lot of random letters and numbers specifying encryption — like ECC, XChacha20, AES-256, RC6, 2DES, QUAD, or DSA. But if you're just a regular guy concerned about your privacy and security online, all these abbreviations can be difficult to digest. We hope that this article will help you understand them better.

## What are the different types of encryption algorithms?

There are many different encryption algorithms. Below we’ve covered the most common ones.

**ECC (Elliptic Curve Cryptography)**is a new generation asymmetric encryption algorithm. It is also used to generate encryption keys and establish safe connections for secure data transferring. However, even though it does the same thing, ECC is both faster and safer than RSA or DSA. It uses shorter keys than RSA, but they are just as hard to crack. For example, 512-bit ECC key is just as secure as 15360-bit RSA key, but since it’s much shorter, it uses substantially less computational power to generate it. ECC is not as commonly used as RSA because it’s relatively new to the industry and RSA is easier to implement.**XChaCha20**is a symmetric encryption algorithm developed by Daniel J. Bernstein. Like ECC, it’s relatively new but already proven to be a very safe, reliable, and fast algorithm. ChaCha is a stream cipher, which means that it encrypts the data bit by bit as it streams by. Because of that, ChaCha is much faster than any block cipher and doesn’t need hardware or a lot of computational power. That’s also the reason why ChaCha is immune to timing attacks, unlike some block ciphers.**RC6**(previous versions are RC4 and RC5) is a symmetric (private key) encryption algorithm. Ron Rivest, Matt Robshaw, Ray Sidney, and Yiqun Lisa Yin designed it for the AES competition. The recipient of the encrypted data can only access it with a private key shared by the sender. RC6 was not designed for general use and has limits on the amount of data that can be encrypted. There are no known attacks which weaken RC6 to the point that breaking was doable in reality.**The Advanced Encryption Standard (AES)**is another symmetric algorithm, which encrypts data in one fixed-size block at a time. AES may have keys of different length, such as AES-128, AES-192, or AES-256. Although 128-bit is both efficient and safe, encrypted services use AES-192 or AES-256 more often to ensure maximum security.**Triple Data Encryption Standard (Triple DES)**is a newer version of the Data Encryption Standard (DES) and is widely used by financial services. This algorithm uses a 56-bit key but encrypts data three times, turning it into a 168-bit key. However, some experts argue that it's more like a 112-bit key. The triple encryption process makes it much slower compared to other algorithms. Also, because it uses shorter data blocks, it may be easier to decrypt and leak data. As more modern and faster technologies emerge, this one is being slowly phased out.**Blowfish**is a private key encryption method designed by Bruce Schneier. It was introduced in 1993 as a fast, license-free alternative to other popular encryption algorithms at the time. Many cryptographers are still examining this algorithm and trying to confirm that it is hack-proof.**RSA**is named after Ron Rivest, Adi Shamir, and Len Adelman. As an asymmetric encryption (public key) algorithm, it uses two keys: public and private. The public key is used to encrypt the data and the private one to decrypt it. RSA is common but not for encoding the actual data that passes through the internet. Instead, it is used to encrypt the keys of another algorithm, especially when you need to share your private key. A 768-bit RSA key has reportedly been broken, but nowadays most RSA keys are 2048-bit and 4096-bit. That makes it a secure solution for private key encryption, although it's also the reason why it’s very slow.**A Diffie-Hellman**algorithm is named after its creators Whitfield Diffie and Martin Hellman. It's one of the first protocols for exchanging keys securely over a public channel. Like RSA, Diffie-Hellman relies on the extreme difficulty of factoring the product of large prime numbers. It is normally used for SSL, SSH, PGP, and other PKI (Public Key Infrastructure) systems. So every time you go on a website with a padlock icon next to its URL, your device has used Diffie-Hellman.**The Digital Signature Algorithm (DSA)**is another public key algorithm. The National Institute of Standards and Technology (NIST) proposed it for secure electronic signatures back in 1991. Like all asymmetric encryption methods, this algorithm has private and public parts in its encoding process. The person who signs is the private part, and the person who verifies the signature is the public one. DSA is the US national standard, now used in both unclassified and classified communications.**El Gamal**is a public key encryption algorithm created in 1984 by Taher ElGamal. It's a simplified Diffie-Hellman algorithm's option that allows encryption in one direction without the necessity of active participation of the second part. It's a common alternative for RSA. The key disadvantage of this algorithm is that the ciphertext is twice as long as the plaintext. And the biggest advantage is that the same text produces a different ciphertext each time it's encrypted. It has repeatedly been proven to be a safe encryption method.

## So which types of encryption algorithms are the most secure?

There is no easy answer to this question. Most cybersecurity experts would tell you that it depends on where and how each algorithm is used. Each encryption method has its advantages and disadvantages. Therefore, in many cases, asymmetric encryption needs to be used in conjunction with symmetric encryption.

Currently, AES is the most popular symmetric algorithm, used in many encrypted services. It's also recognized as a U.S. Government standard by the National Institute of Standards and Technology. However, more and more tech giants are starting to use newer algorithms, like ChaCha. Our users’ vaults are also protected by this algorithm, because we, too, believe it is the future of encryption.

However, symmetric encryption has its downsides – the private key needs to be sent to the recipient. This is where asymmetric algorithms come into play. We use ECC in combination with ChaCha to provide the highest level of security to our users.

Staying ahead of the game means constantly searching for new ideas and ways to improve our service. With our newer, safer, and faster algorithms, you can enjoy bulletproof security and peace of mind.