Supported Algorithms

Complete reference of cryptographic algorithms supported by 4Quays

4Quays supports a range of classical and post-quantum cryptographic algorithms. This page provides a complete reference.

Symmetric Encryption

AES-256-GCM

PropertyValue
AlgorithmAdvanced Encryption Standard
ModeGalois/Counter Mode
Key Size256 bits
Block Size128 bits
IV Size96 bits (12 bytes)
Tag Size128 bits (16 bytes)

Use cases:

  • Payload encryption
  • All protect/unprotect operations

Quantum resistance: Secure against known quantum attacks (256-bit key provides 128-bit post-quantum security).

Key Wrapping (Classical)

RSA-2048

PropertyValue
AlgorithmRSA with OAEP padding
Key Size2048 bits
HashSHA-256
MGFMGF1-SHA-256

Use cases:

  • Wrapping symmetric keys
  • Legacy integration

Quantum resistance: Vulnerable to Shor's algorithm. Plan migration to PQC.

RSA-4096

PropertyValue
AlgorithmRSA with OAEP padding
Key Size4096 bits
HashSHA-256
MGFMGF1-SHA-256

Use cases:

  • Higher security requirements
  • Longer key validity periods

Quantum resistance: Vulnerable to Shor's algorithm. Provides more time before migration.

Key Encapsulation (Post-Quantum)

ML-KEM-512

PropertyValue
AlgorithmModule-Lattice KEM
Security LevelNIST Level 1
Public Key Size800 bytes
Ciphertext Size768 bytes
Shared Secret32 bytes

Use cases:

  • Lightweight PQC requirements
  • Performance-sensitive applications

ML-KEM-768

PropertyValue
AlgorithmModule-Lattice KEM
Security LevelNIST Level 3
Public Key Size1184 bytes
Ciphertext Size1088 bytes
Shared Secret32 bytes

Use cases:

  • Recommended default for PQC
  • Balanced security and performance

ML-KEM-1024

PropertyValue
AlgorithmModule-Lattice KEM
Security LevelNIST Level 5
Public Key Size1568 bytes
Ciphertext Size1568 bytes
Shared Secret32 bytes

Use cases:

  • Highest security requirements
  • Long-term data protection

Digital Signatures (Classical)

RSA-SHA256

PropertyValue
AlgorithmRSASSA-PKCS1-v1_5
Key Size2048 or 4096 bits
HashSHA-256
Signature Size256 or 512 bytes

Use cases:

  • Document signing
  • Data integrity verification

RSA-SHA384

PropertyValue
HashSHA-384
Other propertiesSame as RSA-SHA256

RSA-SHA512

PropertyValue
HashSHA-512
Other propertiesSame as RSA-SHA256

ECDSA-P256

PropertyValue
AlgorithmECDSA
CurveNIST P-256 (secp256r1)
HashSHA-256
Signature Size~64 bytes

Use cases:

  • Compact signatures
  • Performance-sensitive signing

ECDSA-P384

PropertyValue
CurveNIST P-384 (secp384r1)
HashSHA-384
Signature Size~96 bytes

Digital Signatures (Post-Quantum)

ML-DSA-44

PropertyValue
AlgorithmModule-Lattice DSA
Security LevelNIST Level 2
Public Key Size1312 bytes
Signature Size2420 bytes

Use cases:

  • PQC signatures for standard use
  • Migration from RSA-2048

ML-DSA-65

PropertyValue
AlgorithmModule-Lattice DSA
Security LevelNIST Level 3
Public Key Size1952 bytes
Signature Size3293 bytes

Use cases:

  • Recommended default for PQC signatures
  • Migration from RSA-3072

ML-DSA-87

PropertyValue
AlgorithmModule-Lattice DSA
Security LevelNIST Level 5
Public Key Size2592 bytes
Signature Size4595 bytes

Use cases:

  • Highest security signing requirements
  • Long-term signature validity

Hash Functions

SHA-256

PropertyValue
Output Size256 bits (32 bytes)
Block Size512 bits

SHA-384

PropertyValue
Output Size384 bits (48 bytes)
Block Size1024 bits

SHA-512

PropertyValue
Output Size512 bits (64 bytes)
Block Size1024 bits

Algorithm Selection Guide

For Encryption

RequirementRecommended
Standard securityAES-256-GCM + RSA-2048
High securityAES-256-GCM + RSA-4096
Post-quantum readyAES-256-GCM + ML-KEM-768
Maximum securityAES-256-GCM + ML-KEM-1024

For Signing

RequirementRecommended
Compact signaturesECDSA-P256
Standard securityRSA-SHA256
Post-quantum readyML-DSA-65
Maximum securityML-DSA-87

Algorithm Comparison

Key Size Comparison

AlgorithmPublic KeyCiphertext/Signature
RSA-2048256 bytes256 bytes
RSA-4096512 bytes512 bytes
ML-KEM-7681184 bytes1088 bytes
ML-KEM-10241568 bytes1568 bytes
ECDSA-P25665 bytes64 bytes
ML-DSA-651952 bytes3293 bytes

Performance Comparison

OperationRSA-2048ML-KEM-768
Key Generation~100ms~1ms
Encrypt/Encap~1ms~0.1ms
Decrypt/Decap~10ms~0.1ms
OperationECDSA-P256ML-DSA-65
Key Generation~1ms~1ms
Sign~1ms~1ms
Verify~2ms~1ms

Standards Compliance

StandardAlgorithms
NIST FIPS 197AES-256
NIST FIPS 180-4SHA-2 family
NIST FIPS 186-5RSA, ECDSA
NIST FIPS 203ML-KEM
NIST FIPS 204ML-DSA

What's Next