Symmetric9 shown / 97 total4 recommended150 sources citedReviewed April 2026
What are you trying to protect?
Choose your use case for safe defaults, or use the decision wizard for a tailored recommendation.
Symmetric Encryption
The padlock on your data. One key locks it, same key unlocks it.
⚷Ask the Counsel →Select cards to compare algorithms side by side.
9 algorithms shown
AES-256-GCMNIST Standard✅Recommended default
matureNISTPQ-ready
AES·🇧🇪 BelgiumMarch 2026
General-purpose authenticated encryption. TLS 1.3, disk encryption, government classified data.
2 sources·Standards-backed⚷Ask → AES-256-GCM-SIVIETF RFC 8452✅Recommended default
establishedIETFPQ-ready
AES·🇺🇸/🇮🇱 US/IsraelApril 2026
Nonce-misuse-resistant authenticated encryption. Systems where nonce uniqueness cannot be guaranteed — distributed systems, cloud KMS, at-rest encryption.
2 sources·Standards-backed⚷Ask → ARIA-256Korean Standard KS X 1213⚠️Acceptable (constrained)
ARIA·🇰🇷 South KoreaMarch 2026
Korean government and financial systems.
2 sources·Standards-backed⚷Ask → Camellia-256CRYPTREC / ISO / IETF⚠️Acceptable (constrained)
Camellia·🇯🇵 JapanMarch 2026
Japanese government, TLS suites, NESSIE-approved applications.
2 sources·Standards-backed⚷Ask → ChaCha20-Poly1305IETF RFC 8439✅Recommended default
matureIETFPQ-ready
ChaCha·🇺🇸 United StatesMarch 2026
Authenticated encryption without AES hardware. Mobile, TLS 1.3 fallback, WireGuard.
1 source·Standards-backed⚷Ask → KuznyechikGOST R 34.12-2015⚠️Acceptable (constrained)
GOST·🇷🇺 RussiaMarch 2026
Russian government and military systems.
2 sources·Standards-backed⚷Ask → SM4GB/T 32907 / ISO 18033-3⚠️Acceptable (constrained)
SM4·🇨🇳 ChinaMarch 2026
Chinese government, banking, wireless LAN (WAPI).
2 sources·Standards-backed⚷Ask → SNOW-V3GPP / ISO/IEC 18033-4⚠️Acceptable (constrained)
SNOW·🇸🇪 SwedenApril 2026
5G confidentiality and integrity (3GPP). High-throughput stream encryption. Successor to SNOW 3G used in 4G/LTE.
4 sources·Standards-backed⚷Ask → XChaCha20-Poly1305IETF Draft / libsodium✅Recommended default
establishedIETFPQ-ready
ChaCha·🇺🇸 United StatesMarch 2026
File/at-rest encryption needing random nonces safely. libsodium default.
2 sources·Standards-backed⚷Ask → References & terminology
Source links and definitions for the algorithms currently visible in the results grid.
9 Visible results19 Unique sources3 Curated demos
Terminology guide
Classical security
Estimated resistance against the best known non-quantum attacks, usually expressed in bits of work.
PQ security
Expected security if a cryptographically relevant quantum computer exists. Zero means Shor's algorithm breaks it outright.
KEM
A key encapsulation mechanism: public-key crypto used to establish a shared secret for later symmetric encryption.
AEAD
Authenticated encryption with associated data. It encrypts data and detects tampering in one construction.
MAC
A message authentication code. It proves integrity and key possession, but not public verifiability like a signature.
KDF
A key derivation function. It turns existing secret material into new, purpose-separated keys.
Forward secrecy
Past sessions stay confidential even if a long-term private key is later compromised.
Trusted setup
A setup ceremony some proof systems require. If it is compromised, proofs may be forgeable.
Threshold
A scheme where some minimum number of parties or shares is required before a secret or signature can be reconstructed.
Constant-time
Implementation discipline that avoids data-dependent timing differences which could leak secrets.