| Home Page |
| Course Page |
Hash Algorithm | Date | Output Digest Length (bits) | Security | |||
Message Digest 4 (MD4) | 1990 | 128 | Broken | |||
Message Digest 5 (MD5) | 1991 | 128 | Broken | |||
Secure Hash Algorithm 0 (SHA-0) | 1993 | 160 | Broken | |||
Secure Hash Algorithm 1 (SHA-1) | 1995 | 160 | Broken | |||
Secure Hash Algorithm 2 (SHA-2) | 2002 | 224, 256, 384, 512 | Questionable | |||
Secure Hash Algorithm 3 (SHA-3) | 2015 | 224, 256, 384, 512 | Secure |
David Göthberg,
http://en.wikipedia.org/wiki/Image:Merkle-Damgard_hash_big.svg
A. Menezes, P. van Oorschot, and S. Vanstone,
Handbook of Applied Cryptography
(CRC Press, 1997), page 340.
Abacus
ARIRANG AURORA BLAKE Blender Blue Midnight Wish BOOLE Cheetah CHI CRUNCH CubeHash |
DCH
Dynamic SHA Dynamic SHA2 ECHO ECOH EDON-R EnRUPT ESSENCE FSB Fugue Grøstl |
Hamsi
JH Keccak Khichidi-1 LANE Lesamnta Luffa LUX MCSSHA-3 MD6 MeshHash |
NaSHA
SANDstorm Sarmal Sgàil Shabal SHAMATA SHAvite-3 SIMD Skein Spectral Hash StreamHash |
SWIFFTX
Tangle TIB3 Twister Vortex WaMM Waterfall |
BLAKE
Blue Midnight Wish CubeHash |
ECHO
Fugue Grøstl |
Hamsi
JH Keccak |
Luffa
Shabal SHAvite-3 |
SIMD
Skein |
BLAKE | Grøstl | JH | Keccak | Skein |
BLAKE | Grøstl | JH | Keccak | Skein | |
Design: | |||||
Merkle-Damgård | X | X | X | ||
Sponge | X | X | |||
Compression function: | |||||
Not block cipher based | X | ||||
Block cipher based, Davies-Meyer | X | ||||
Block cipher based, Matyas-Meyer-Oseas | X | ||||
Uses cipher pieces: | |||||
AES | X | ||||
ChaCha | X | ||||
Threefish | X |
AntCrypt
Argon battcrypt Catena |
Catfish
Centrifuge EARWORM Gambit |
Lanarea
Lyra2 M3lcrypt Makwa |
MCS_PHS
Omega Crypt Parallel PolyPassHash |
POMELO
Pufferfish RIG Schvrch |
Tortuga
TwoCats Yarn yescrypt |
Argon
battcrypt |
Catena
Lyra2 |
Makwa
Parallel |
POMELO
Pufferfish |
yescrypt |
| Course Page |
| Home Page |