Symmetric9 shown / 97 total4 recommended150 sources citedReviewed April 2026
Select cards to compare algorithms side by side.
AES-256-GCMNIST Standard✅Recommended default
matureNISTPQ-ready
AES·🇧🇪 BelgiumApril 2026
General-purpose authenticated encryption. TLS 1.3, disk encryption, government classified data.
2 sources·Standards-backed⚷Ask → AES-256-GCM-SIVIETF RFC 8452✅Recommended default
establishedIETFPQ-ready
AES·🇺🇸/🇮🇱 US/IsraelApril 2026
Nonce-misuse-resistant authenticated encryption. Systems where nonce uniqueness cannot be guaranteed — distributed systems, cloud KMS, at-rest encryption.
2 sources·Standards-backed⚷Ask → ARIA-256Korean Standard KS X 1213⚠️Acceptable (constrained)
ARIA·🇰🇷 South KoreaApril 2026
Korean government and financial systems.
2 sources·Standards-backed⚷Ask → Camellia-256CRYPTREC / ISO / IETF⚠️Acceptable (constrained)
Camellia·🇯🇵 JapanApril 2026
Japanese government, TLS suites, NESSIE-approved applications.
2 sources·Standards-backed⚷Ask → ChaCha20-Poly1305IETF RFC 8439✅Recommended default
matureIETFPQ-ready
ChaCha·🇺🇸 United StatesApril 2026
Authenticated encryption without AES hardware. Mobile, TLS 1.3 fallback, WireGuard.
1 source·Standards-backed⚷Ask → KuznyechikGOST R 34.12-2015⚠️Acceptable (constrained)
GOST·🇷🇺 RussiaApril 2026
Russian government and military systems.
2 sources·Standards-backed⚷Ask → SM4GB/T 32907 / ISO 18033-3⚠️Acceptable (constrained)
SM4·🇨🇳 ChinaApril 2026
Chinese government, banking, wireless LAN (WAPI).
2 sources·Standards-backed⚷Ask → SNOW-V3GPP / ISO/IEC 18033-4⚠️Acceptable (constrained)
SNOW·🇸🇪 SwedenApril 2026
5G confidentiality and integrity (3GPP). High-throughput stream encryption. Successor to SNOW 3G used in 4G/LTE.
4 sources·Standards-backed⚷Ask → XChaCha20-Poly1305IETF Draft / libsodium✅Recommended default
establishedIETFPQ-ready
ChaCha·🇺🇸 United StatesApril 2026
File/at-rest encryption needing random nonces safely. libsodium default.
2 sources·Standards-backed⚷Ask →