| Home Page |
| Course Page |
| Hash Algorithm | Output Hash Length (bits) | Security | ||
| Message Digest 4 (MD4) | 128 | Broken | ||
| Message Digest 5 (MD5) | 128 | Broken | ||
| Secure Hash Algorithm 0 (SHA-0) | 160 | Broken | ||
| Secure Hash Algorithm 1 (SHA-1) | 160 | Theoretically broken | ||
| SHA-224 (part of SHA-2) | 224 | Questionable | ||
| SHA-256 (part of SHA-2) | 256 | Questionable | ||
| SHA-384 (part of SHA-2) | 384 | Questionable | ||
| SHA-512 (part of SHA-2) | 512 | Questionable |
David Göthberg,
http://en.wikipedia.org/wiki/Image:Merkle-Damgard_hash_big.svg
A. Menezes, P. van Oorschot, and S. Vanstone,
Handbook of Applied Cryptography
(CRC Press, 1997), page 340.
|
Abacus
ARIRANG AURORA BLAKE Blender Blue Midnight Wish BOOLE Cheetah CHI CRUNCH CubeHash |
DCH
Dynamic SHA Dynamic SHA2 ECHO ECOH EDON-R EnRUPT ESSENCE FSB Fugue Grøstl |
Hamsi
JH Keccak Khichidi-1 LANE Lesamnta Luffa LUX MCSSHA-3 MD6 MeshHash |
NaSHA
SANDstorm Sarmal Sgàil Shabal SHAMATA SHAvite-3 SIMD Skein Spectral Hash StreamHash |
SWIFFTX
Tangle TIB3 Twister Vortex WaMM Waterfall |
|
BLAKE
Blue Midnight Wish CubeHash |
ECHO
Fugue Grøstl |
Hamsi
JH Keccak |
Luffa
Shabal SHAvite-3 |
SIMD
Skein |
| BLAKE | Grøstl | JH | Keccak | Skein |
| BLAKE | Grøstl | JH | Keccak | Skein | |
| Design: | |||||
| Merkle-Damgård | X | X | X | ||
| Sponge | X | X | |||
| Compression function: | |||||
| Not block cipher based | X | ||||
| Block cipher based, Davies-Meyer | X | ||||
| Block cipher based, Matyas-Meyer-Oseas | X | ||||
| Uses cipher pieces: | |||||
| AES | X | ||||
| ChaCha | X | ||||
| Threefish | X | ||||
| Course Page |
| Home Page |