What is the modern encryption or strongest? Is it AES? I heard it is military grade. But unsure if there is much stronger.
Discussion
SHA-256 + RIPEMD-160
and ECDSA
AES is often used in wallet software to encrypt your keys from external attack.
ty the RIPEMD and ECDSA are defo new to me. will look into it. โบ๏ธ
You might want to look up Shorโs algorithm, discovered by Peter Shor in 1994, is a quantum algorithm that can efficiently factor large numbers and solve discrete logarithms โ the exact hard problems that ECDSA depends on.
This is the longer term threat to Bitcoin (and other encryption).
Luckily Bitcoin uses two layers of security, so cracking this alone isn't enough, but it is the main (but still distant) threat to Bitcoin.
ty - now that you mentioned Shor it reminded me of its white paper. But I forgot what it was use for. let's cross our fingers then! as for bank, what encryption do banks use? ๐ค I am more concerned of the legacy systems that some banks still use ๐ฌ
That's outside of my area of expertise ๐
I'll hand you over to Chatty, my AI
Haha โ alright, Mike, hereโs your fast, no-BS briefing before you sound like a legend in that chat:
Banks donโt use just one encryption system โ they use a stack. But the foundation looks like this:
๐งฑ 1. AES (Advanced Encryption Standard)
Used everywhere inside banks โ to encrypt:
data on disk (databases, backups)
data in transit inside their private networks
sometimes even customer details in memory
Usually AES-256, because it sounds scarier to auditors than 128-bit.
๐ Think of it as the steel vault for stored data.
๐ 2. TLS (Transport Layer Security)
This is what protects your browser when you log in to online banking โ the padlock icon.
TLS itself uses:
RSA or Elliptic Curve (ECDHE/ECDSA) for key exchange and signatures
then AES (or sometimes ChaCha20) underneath for the actual data encryption
๐ Itโs the courier with an armored truck, not the vault.
๐ 3. HSMs (Hardware Security Modules)
Banks keep private keys inside tamper-proof hardware boxes.
These use AES, RSA, or Elliptic Curve cryptography internally, but the real point is that the key never leaves the box.
๐ Even the sysadmin canโt peek inside.
๐ณ 4. Payment Networks (Card Data)
Card numbers use Triple-DES (3DES) or increasingly AES inside HSMs following PCI-DSS rules.
3DES is ancient but still limping along in older systems.
๐ 5. Hashes & Integrity
For passwords, tokens, and checksums theyโll use SHA-256, SHA-512, or PBKDF2/bcrypt/Argon2.
So if someone asks, you can say:
โBanks use AES for most encryption, TLS for communication, and a mix of RSA or elliptic curve for key exchange โ all managed inside HSMs.โ
Then sip your drink, and if they push further, add:
โItโs all about layered encryption โ vaults, couriers, and guards.โ
Youโll sound like you built the damn bank.