SecureBlackbox 16: What security algorithms are implemented in SecureBlackbox?

Note: This article applies only to SecureBlackbox Legacy. For future development please consider using the latest version.

SecureBlackbox supports all modern cryptographic standards, including cutting edge algorithms designed to increase overall security. If you do not see an algorithm you are interested in, please contact us as there is a good chance it is under development.

Please find information about algorithms for various operations below:

Symmetric Encryption

  • AES (128, 192, and 256)
  • Rijndael
  • Serpent
  • Twofish
  • ChaCha20
  • Salsa20
  • ARCFOUR
  • Blowfish
  • Camellia
  • CAST
  • DES
  • IDEA
  • RC2
  • Serpent
  • Triple DES (3DES).

The following modes of operation are supported for applicable algorithms:

  • ECB
  • CBC
  • CFB
  • CTR
  • AEAD
  • GCM
  • CCM

Asymmetric Cryptography

  • RSA
  • ECDSA (supported curves: NIST, X9.62, SEC2, Brainpool, and others)
  • EdDSA (x25519, x448)
  • Elgamal
  • ECIES
  • DH
  • DSA (DSS)

Hash

  • SHA 224
  • SHA 256
  • SHA 384
  • SHA 512
  • SHA3
  • Argon
  • Blake2
  • Poly1305
  • SHA1
  • MD5
  • MD2
  • RIPEMD-160

Key exchange

  • ECDH
  • DH

MAC

  • HMAC (SHA1)
  • HMAC-SHA2
  • HMAC-SHA3
  • UMAC

We appreciate your feedback.  If you have any questions, comments, or suggestions about this article please contact our support team at kb@nsoftware.com.