Comparison of cryptographic hash functions: Difference between revisions

Content deleted Content added
No edit summary
Line 254:
=== Notes ===
<references group="cf" />
 
== Cryptanalysis ==
The following tables compare [[cryptanalysis]] status of [[cryptographic hash function]]s. This table is probably out of dated.
{| class="wikitable" style="text-align: center"
|-
! rowspan="2"|Function
! rowspan="2"|Digest<br />size
! rowspan="2"|Rounds
! colspan="3"|Best known attacks<br />Rounds<ref group="c">The omitted rounds are full.</ref>:complexity
|-
! [[Birthday attack|Collision]]
! [[Preimage attack|Second<br />preimage]]
! [[Preimage attack|Preimage]]
|-
| [[MD4]]
| 128
| 48
| [http://www.springerlink.com/content/v6526284mu858v37/ :3]
|
| [http://www.springerlink.com/content/h8q553385534l763/ :2<sup>102</sup>]
|-
| [[MD5]]
| 128
| 64
| [http://eprint.iacr.org/2006/105.pdf :2<sup>29</sup>]
|
| [http://www.springerlink.com/content/q1033484h6t2rj18/ 44:2<sup>96</sup>]
|}
=== Notes ===
<references group="c" />
 
== See also ==
Line 262 ⟶ 292:
# [http://www.hashemall.com/ Hash'em all!] — free online text and file hashing with different algorithms
# [http://www.larc.usp.br/~pbarreto/hflounge.html The Hash Function Lounge] — a list of hash functions and known attacks, by Paulo Barreto
# [http://ehash.iaik.tugraz.at/wiki/The_eHash_Main_Page The eHash Main Page] - a wiki for cryptographic hash functions
 
{{Crypto navbox | hash}}