Comparison of cryptographic hash functions

This is an old revision of this page, as edited by Tsihonglau (talk | contribs) at 01:51, 27 December 2008. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

The following tables compare general and technical information for a number of cryptographic hash functions. Please see the individual functions' articles for further information. This article is not all-inclusive or necessarily up-to-date.


General information

Basic general information about the cryptographic hash functions: year, designer, references, etc. The column "Year" refers to the first official description of the algorithm, not designed date.

Function Year Designer Derived from Reference
HAVAL 1992 Yuliang Zheng, Josef Pieprzyk, Jennifer Seberry Website
MD2 1989 Ronald Rivest RFC 1319
MD4 1990 Ronald Rivest RFC 1320
MD5 1992 Ronald Rivest MD4[1] RFC 1321
RIPEMD 1990 The RIPE Consortium[2]
RIPEMD-128/256 1996 Hans Dobbertin, Antoon Bosselaers, Bart Preneel RIPEMD[3] Website
RIPEMD-160/320 1996 Hans Dobbertin, Antoon Bosselaers, Bart Preneel RIPEMD[4] Website
SHA-0 1993 NSA SHA-0
SHA-1 1995 NSA SHA-0 FIPS 180--3
SHA-256/224 2002/2004 NSA FIPS 180--3
SHA-512/384 2002 NSA FIPS 180--3
Tiger(2)-192/160/128 1995 Ross Anderson, Eli Biham Website
Whirlpool 2004 Vincent Rijmen, Paulo Barreto Website

Compression function

The following tables compare technical information for compresion functions of cryptographic hash functions. The information comes from the specifiations, please reference them for more details. All size counts bits, not bytes. And the omitted multiplicands are word sizes.

Function Word Digest Chaining
variables
Temporary
variables
Block Length Block Words
×Passes
=Rounds
Specification
MD4 32 ×4=128 ×16=512 64 16×3=48 RFC 1320
MD5 16×4=64 RFC 1321
RIPEMD-128 32 ×4=128 ×8=256 ×16=512 64 16×4=64 RIPEMD-160
RIPEMD-256 ×8=256
RIPEMD-160 ×5=160 ×10=320 16×5=80
RIPEMD-320 ×10=320
SHA-0 32 ×5=160 ×16=512 64 16×5=80
SHA-1 FIPS 180--3
SHA-256 ×8=256 ×8=256 16×4=64
SHA-224 ×7=224
SHA-512 64 ×8=512 ×8=512 ×16=1024 128 16×5=80
SHA-384 ×6=384
Tiger-192 64 ×3=192 ×3=192 ×8=512 64 8×3=24 Tiger
Tiger-160 ×2.5=160
Tiger-128 ×2=128

See also

References

  1. The Hash function lounge — a list of hash functions and known attacks, by Paulo Barreto
  2. Hash'em all! — free online text and file hashing with different algorithms