Encryption is supported for files "at rest" using PGP, as well as for passwords using an MD5 or SHA, SHA512, MD4 non-reversible hash.
The use of a PIN and cryptographic algorithms such as DES, Triple-DES, RSA and SHA provide authentication of the card to the processing terminal and the card issuer's host system.
Other hardware-boosted features include additional random number generation and SHA algorithms.
Intel SHA Extensions are set of extensions to the x86 instruction set architecture which support hardware acceleration of Secure Hash Algorithm (SHA) family.
Mainstream symmetric ciphers (such as AES or Twofish) and collision resistant hash functions (such as SHA) are widely conjectured to offer greater security against known quantum computing attacks.
Standard cryptographic hashes, such as the Secure Hash Algorithm series, are very hard to reverse, so an attacker who gets hold of the hash value cannot directly recover the password.
NIST Special Publication 800-90B (draft) recommends several extractors, including the SHA hash family and states that if the amount of entropy input is twice the number of bits output from them, that output can be considered essentially fully random.
algorithm | Secure Shell | RSA (algorithm) | Hash function | Secure Hash Algorithm | Secure Real-time Transport Protocol | Secure Digital | Secure Computing | Schönhage–Strassen algorithm | Luhn algorithm | hash | Earley's Algorithm | Dijkstra's algorithm | CYK algorithm | Cryptographic hash function | Viterbi algorithm | Prim's algorithm | Levenberg–Marquardt algorithm | Kosaraju's algorithm | hash function | Distributed hash table | Yarrow algorithm | sorting algorithm | Secure Socket Tunneling Protocol | Root-finding algorithm | Rampton Secure Hospital | N-Secure | Maher-shalal-hash-baz | Kruskal's algorithm | Hash tree |
RFC 4635 was circulated to allow RFC 3174 Secure Hash Algorithm (SHA1) hashing and FIPS PUB 180-2 SHA-2 hashing to replace MD5.