2 # Cryptographic API Configuration
5 menu "Cryptographic options"
8 bool "Cryptographic API"
10 This option provides the core Cryptographic API.
16 HMAC: Keyed-Hashing for Message Authentication (RFC2104).
17 This is required for IPSec.
20 tristate "Null algorithms"
23 These are 'Null' algorithms, used by IPsec, which do nothing.
26 tristate "MD4 digest algorithm"
29 MD4 message digest algorithm (RFC1320).
32 tristate "MD5 digest algorithm"
35 MD5 message digest algorithm (RFC1321).
38 tristate "SHA1 digest algorithm"
41 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
44 tristate "SHA256 digest algorithm"
47 SHA256 secure hash standard (DFIPS 180-2).
49 This version of SHA implements a 256 bit hash with 128 bits of
50 security against collision attacks.
53 tristate "SHA384 and SHA512 digest algorithms"
56 SHA512 secure hash standard (DFIPS 180-2).
58 This version of SHA implements a 512 bit hash with 256 bits of
59 security against collision attacks.
61 This code also includes SHA-384, a 384 bit hash with 192 bits
62 of security against collision attacks.
65 tristate "DES and Triple DES EDE cipher algorithms"
68 DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3).
70 config CRYPTO_BLOWFISH
71 tristate "Blowfish cipher algorithm"
74 Blowfish cipher algorithm, by Bruce Schneier.
76 This is a variable key length cipher which can use keys from 32
77 bits to 448 bits in length. It's fast, simple and specifically
78 designed for use on "large microprocessors".
81 http://www.counterpane.com/blowfish.html
84 tristate "Twofish cipher algorithm"
87 Twofish cipher algorithm.
89 Twofish was submitted as an AES (Advanced Encryption Standard)
90 candidate cipher by researchers at CounterPane Systems. It is a
91 16 round block cipher supporting key sizes of 128, 192, and 256
95 http://www.counterpane.com/twofish.html
98 tristate "Serpent cipher algorithm"
101 Serpent cipher algorithm, by Anderson, Biham & Knudsen.
103 Keys are allowed to be from 0 to 256 bits in length, in steps
107 http://www.cl.cam.ac.uk/~rja14/serpent.html
110 tristate "AES cipher algorithms"
113 AES cipher algorithms (FIPS-197). AES uses the Rijndael
116 Rijndael appears to be consistently a very good performer in
117 both hardware and software across a wide range of computing
118 environments regardless of its use in feedback or non-feedback
119 modes. Its key setup time is excellent, and its key agility is
120 good. Rijndael's very low memory requirements make it very well
121 suited for restricted-space environments, in which it also
122 demonstrates excellent performance. Rijndael's operations are
123 among the easiest to defend against power and timing attacks.
125 The AES specifies three key sizes: 128, 192 and 256 bits
127 See http://csrc.nist.gov/encryption/aes/ for more information.
129 config CRYPTO_DEFLATE
130 tristate "Deflate compression algorithm"
133 This is the Deflate algorithm (RFC1951), specified for use in
134 IPSec with the IPCOMP protocol (RFC3173, RFC2394).
136 You will most probably want this if using IPSec.
139 tristate "Testing module"
142 Quick & dirty crypto test module.