Encryption
When there is requirement to hash or encrypt data then the most secure and up-to-date methods and standards must be used. The recommended algorithms include Triple DES (3DES), AES-256, AES-128, blowfish, twofish. If other stronger algorithms are available such as SHA-224, SHA-256, SHA-384, or SHA-512, it is encouraged to use them. Do not ever use MD5. |