Comparison of cryptographic hash functions: Difference between revisions

Content deleted Content added
m Disambiguate MD2 to MD2 (cryptography) using popups
clean up using AWB
Line 1:
{{Orphan|date=February 2009}}
The following tables compare general and technical information for a number of [[cryptographic hash function]]s. Please see the individual functions' articles for further information. This article is not all-inclusive or necessarily up-to-date.
 
 
== General information ==
Line 91 ⟶ 90:
! rowspan="2"|Specification
|-
! [[Word_Word (computing)|Word]]
! [[Cryptographic hash function|Digest]]
! [[Merkle–Damgård construction|Chaining<br />values]]<ref group="cf">The size of message digest equals to the size of chaining values usually. In truncated versions of certain cryptographic hash functions such as SHA-384, the former is less than the latter.</ref>
Line 268 ⟶ 267:
! [[Preimage attack|Second<br />preimage]]
! [[Preimage attack|Preimage]]
 
|-
| [[RIPEMD]]
Line 344 ⟶ 342:
 
== See also ==
*[[List of hash functions]]
*[[List_of_hash_functions]]
*[[Word_Word (computing)]]
 
==References==
{{Reflist}}
 
== External links ==