File: gpgme.info, Node: Algorithms, Next: Error Handling, Prev: Protocols and Engines, Up: Top 4 Algorithms ************ The crypto backends support a variety of algorithms used in public key cryptography.(1) The following sections list the identifiers used to denote such an algorithm. * Menu: * Public Key Algorithms:: A list of all public key algorithms. * Hash Algorithms:: A list of all hash algorithms. ---------- Footnotes ---------- (1) Some engines also provide symmetric only encryption; see the description of the encryption function on how to use this.