A cryptographic algorithm is the means of altering data from a readable form to a protected form and back to the readable form. Cryptographic algorithms are also known as ciphers. The Roman Empire first used cryptography using a non-complex letter substitution cipher to transmit sensitive messages. Today’s cryptographic algorithms are used for essential tasks such as data encryption, authentication, and digital signatures. According to NIST, cryptographic services must use either FIPS-approved or NIST-recommended cryptographic algorithms. FIPS-approved and NIST-recommended cryptographic algorithms undergo extensive security analysis and are continually tested to ensure that they provide adequate security. Cryptographic algorithms usually use cryptographic keys, and the algorithms can be strengthened as needed by using larger keys. There are three NIST-approved cryptographic algorithm classes: hash function, symmetric-key, and asymmetric-key.
Want to learn more? Check out our FREE Bugcrowd University to sharpen your hacking skills.
Organizations the world over need your help! Join our researcher community to connect with hundreds of organization programs focused on finding their security vulnerabilities. Our vast directory includes programs for all skill levels, across many industries and from around the world.
Get started with Bugcrowd
Hackers aren’t waiting, so why should you? See how Bugcrowd can quickly improve your security posture.