We give an overview of currently known and practically relevant conventional cryptography algorithms. The list is currently very incomplete, but will be expanded in the future.

AlgorithmTypeUnderlying mathematical problemTypical key lengthKnown quantum computer attacksInformation-theoretically secure
RSAAsymmetric/Public keyPrime factorization1024-4096 bitShor's factoring algorithm
ECCAsymmetric/Public keyDiscrete logarithmShor's discrete log algorithm
AESSymmetric256 bitGrover's algorithm
One-time padSymmetric-as long as messageNoneYes
Lattice-based cryptographyAsymmetricLearning with errors/Finding short vectors8000-32000 bits for Ring-LWE and a factor 10 more for standard LWE