Content deleted Content added
that table! |
Tag: |
||
(26 intermediate revisions by 17 users not shown) | |||
Line 1:
{{WikiProject banner shell|class=List|
{{WikiProject Cryptography|importance=Low}}
}}
{{Merged-to|Hash function security summary|{{date|2014-10-23}}}}
{{Merged-from|Cryptographic hash function|{{date|2014-10-23}}}}
== Table Parameters wrong ==
Round parameters were wrong, I corrected some. I suggest there are more wrong. [[Comparison_of_cryptographic_hash_functions#Parameters]] <small class="autosigned">— Preceding [[Wikipedia:Signatures|unsigned]] comment added by [[Special:Contributions/2001:4CA0:4103:3:F94D:F82B:17C9:4611|2001:4CA0:4103:3:F94D:F82B:17C9:4611]] ([[User talk:2001:4CA0:4103:3:F94D:F82B:17C9:4611|talk]]) 16:52, 15 January 2016 (UTC)</small><!-- Template:Unsigned IP --> <!--Autosigned by SineBot-->
== Patent information ==
It would be very interesting if someone would take the time to gather license/patent information about the algorithms :)▼
-LM <span style="font-size: smaller;" class="autosigned">— Preceding [[Wikipedia:Signatures|unsigned]] comment added by [[Special:Contributions/213.100.57.46|213.100.57.46]] ([[User talk:213.100.57.46|talk]]) 18:24, 31 July 2010 (UTC)</span><!-- Template:Unsigned IP -->
== Updating related pages ==
I'm curious if there is some way to either split a few pages or some method to keep pages with the same content up to date. For instance there is at least:
Cryptographic_hash_function
Line 7 ⟶ 21:
[[User:Quelrod|Quelrod]] ([[User talk:Quelrod|talk]]) 18:24, 31 July 2010 (UTC)
== Reduced round versions ==
▲It would be very interesting if someone would take the time to gather license/patent information about the algorithms :)
Putting attack on the complete algorithm and attack on reduced rounds versions in the same table is completely unreadable, mixing practical weaknesses and irrelevant to practical security ones... <small><span class="autosigned">— Preceding [[Wikipedia:Signatures|unsigned]] comment added by [[User:JidGom|JidGom]] ([[User talk:JidGom|talk]] • [[Special:Contributions/JidGom|contribs]]) 11:03, 30 March 2011 (UTC)</span></small><!-- Template:Unsigned -->▼
:I think the attacks on reduced step versions of RIPE and SHA1 should be listed separately in the table of best attacks. 24 step SHA1 is NOT SHA1 and the strength of 24 step SHA1 is not something that many readers are going to be able to use as an indicator of the strength of actual SHA1. [[Special:Contributions/108.7.229.221|108.7.229.221]] ([[User talk:108.7.229.221|talk]]) 21:14, 13 November 2012 (UTC)
== RIPEMD ==
From a causality point of view - RIPEMD can not be derived from RIPEMD-160, since the latter was in fact developed after the first. <span style="font-size: smaller;" class="autosigned">— Preceding [[Wikipedia:Signatures|unsigned]] comment added by [[Special:Contributions/91.206.174.166|91.206.174.166]] ([[User talk:91.206.174.166|talk]]) 10:25, 12 January 2012 (UTC)</span><!-- Template:Unsigned IP --> <!--Autosigned by SineBot-->
== Needs more info on Whirlpool ==
Dearth of info on Whirlpool to other function comparison. <span style="font-size: smaller;" class="autosigned">— Preceding [[Wikipedia:Signatures|unsigned]] comment added by [[Special:Contributions/150.135.211.226|150.135.211.226]] ([[User talk:150.135.211.226|talk]]) 16:41, 6 September 2013 (UTC)</span><!-- Template:Unsigned IP --> <!--Autosigned by SineBot-->
== Maximum input length ==
Theoretically there is no size limit for this algorithms. They work with stream and insert at end to stream data int64 of stream length. If stream length is greater than 2^64-1 bytes they add 2^64 remainder of actual length. <small class="autosigned">— Preceding [[Wikipedia:Signatures|unsigned]] comment added by [[Special:Contributions/193.169.234.6|193.169.234.6]] ([[User talk:193.169.234.6|talk]]) 15:30, 19 November 2015 (UTC)</small><!-- Template:Unsigned IP --> <!--Autosigned by SineBot-->
== Include Tiny Encryption Algorithm (TEA)? ==
I'm not a hash function expert, but was led here when investigating the [[Tiny Encryption Algorithm]]. Apparently it was used (and hacked) in the MS Xbox. Is there a reason it was not included? [[User:Nerfer|Nerfer]] ([[User talk:Nerfer|talk]]) 16:30, 5 January 2016 (UTC)
:{{Ping|Nerfer}} No, TEA is a cipher, not a hash function. Any block cipher can be adapted to be a hash function, but in the case of TEA, that produces a weak hash. The usage of TEA in Xbox was a made-up amateur hash, not a real one. -- [[user:intgr|intgr]] <small>[[user talk:intgr|[talk]]]</small> 06:47, 6 January 2016 (UTC)
== External links modified ==
Hello fellow Wikipedians,
I have just modified {{plural:3|one external link|3 external links}} on [[Comparison of cryptographic hash functions]]. Please take a moment to review [https://en.wikipedia.org/w/index.php?diff=prev&oldid=752029353 my edit]. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit [[User:Cyberpower678/FaQs#InternetArchiveBot|this simple FaQ]] for additional information. I made the following changes:
*Added archive http://www.webcitation.org/6aO95FVW7?url=https://web.archive.org/web/20100216055807/http://homes.esat.kuleuven.be/~cosicart/pdf/AB-9601/AB-9601.pdf to http://homes.esat.kuleuven.be/~cosicart/pdf/AB-9601/AB-9601.pdf
*Added archive https://web.archive.org/web/20150111210116/http://labs.calyptix.com/haval.php to http://labs.calyptix.com/haval.php
*Corrected formatting/usage for http://homes.esat.kuleuven.be/~cosicart/pdf/AB-9601/AB-9601.pdf
When you have finished reviewing my changes, please set the ''checked'' parameter below to '''true''' or '''failed''' to let others know (documentation at {{tlx|Sourcecheck}}).
{{sourcecheck|checked=false}}
Cheers.—[[User:InternetArchiveBot|'''<span style="color:darkgrey;font-family:monospace">InternetArchiveBot</span>''']] <span style="color:green;font-family:Rockwell">([[User talk:InternetArchiveBot|Report bug]])</span> 03:03, 29 November 2016 (UTC)
== External links modified ==
Hello fellow Wikipedians,
I have just modified 4 external links on [[Comparison of cryptographic hash functions]]. Please take a moment to review [https://en.wikipedia.org/w/index.php?diff=prev&oldid=795043083 my edit]. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit [[User:Cyberpower678/FaQs#InternetArchiveBot|this simple FaQ]] for additional information. I made the following changes:
*Corrected formatting/usage for http://homes.esat.kuleuven.be/~cosicart/pdf/AB-9601/AB-9601.pdf
*Added archive https://web.archive.org/web/20150111210116/http://labs.calyptix.com/haval.php to http://labs.calyptix.com/haval.php
*Added archive https://web.archive.org/web/20080905132936/http://labs.calyptix.com/files/haval-paper.pdf to http://labs.calyptix.com/files/haval-paper.pdf
*Corrected formatting/usage for http://homes.esat.kuleuven.be/~cosicart/pdf/AB-9601/AB-9601.pdf
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
{{sourcecheck|checked=false|needhelp=}}
Cheers.—[[User:InternetArchiveBot|'''<span style="color:darkgrey;font-family:monospace">InternetArchiveBot</span>''']] <span style="color:green;font-family:Rockwell">([[User talk:InternetArchiveBot|Report bug]])</span> 16:54, 11 August 2017 (UTC)
== Need South Korea's LSH ==
It is part of South Korea's standard portfolio. [https://pdfs.semanticscholar.org/567d/09feb818cc156d2b1e8def1b4bfff63f8e91.pdf LSH: A New Fast Secure Hash Function Family].
[[User:Noloader|Jeffrey Walton ]] ([[User talk:Noloader|talk]]) 03:31, 8 October 2018 (UTC)
:224bd635147ee534b5806a0910ef234c [[Special:Contributions/1.53.243.126|1.53.243.126]] ([[User talk:1.53.243.126|talk]]) 09:24, 15 June 2023 (UTC)
▲Putting attack on the complete algorithm and attack on reduced rounds versions in the same table is completely unreadable, mixing practical weaknesses and irrelevant to practical security ones...
|