The following tables compare general and technical information for a number of cryptographic hash functions. Please see the individual functions' articles for further information. This article is not all-inclusive or necessarily up-to-date.
General information
Basic general information about the cryptographic hash functions: year, designer, references, etc. The column "Year" refers to the first official description of the algorithm, not designed date.
Function | Year | Designer | Derived from | Reference |
---|---|---|---|---|
HAVAL | 1992 | Yuliang Zheng, Josef Pieprzyk, Jennifer Seberry | Website | |
MD2 | 1989 | Ronald Rivest | RFC 1319 | |
MD4 | 1990 | Ronald Rivest | RFC 1320 | |
MD5 | 1992 | Ronald Rivest | MD4[1] | RFC 1321 |
RIPEMD | 1990 | The RIPE Consortium[2] | ||
RIPEMD-128/256 | 1996 | Hans Dobbertin, Antoon Bosselaers, Bart Preneel | RIPEMD[3] | Website |
RIPEMD-160/320 | 1996 | Hans Dobbertin, Antoon Bosselaers, Bart Preneel | RIPEMD[4] | Website |
SHA-0 | 1993 | NSA | SHA-0 | |
SHA-1 | 1995 | NSA | SHA-0 | FIPS 180--3 |
SHA-256/224 | 2002/2004 | NSA | FIPS 180--3 | |
SHA-512/384 | 2002 | NSA | FIPS 180--3 | |
Tiger(2)-192/160/128 | 1995 | Ross Anderson, Eli Biham | Website | |
Whirlpool | 2004 | Vincent Rijmen, Paulo Barreto | Website |
Compression function
The following tables compare technical information for compresion functions of cryptographic hash functions. The information comes from the specifiations, please reference them for more details. All size counts bits, not bytes. And the omitted multiplicands are word sizes.
Function | Word | Digest | Chaining variables |
Temporary variables |
Block | Length | Block Words ×Passes =Rounds |
Specification |
---|---|---|---|---|---|---|---|---|
MD4 | 32 | ×4=128 | ×16=512 | 64 | 16×3=48 | RFC 1320 | ||
MD5 | 16×4=64 | RFC 1321 | ||||||
RIPEMD-128 | 32 | ×4=128 | ×8=256 | ×16=512 | 64 | 16×4=64 | RIPEMD-160 | |
RIPEMD-256 | ×8=256 | |||||||
RIPEMD-160 | ×5=160 | ×10=320 | 16×5=80 | |||||
RIPEMD-320 | ×10=320 | |||||||
SHA-0 | 32 | ×5=160 | ×16=512 | 64 | 16×5=80 | |||
SHA-1 | FIPS 180--3 | |||||||
SHA-256 | ×8=256 | ×8=256 | 16×4=64 | |||||
SHA-224 | ×7=224 | |||||||
SHA-512 | 64 | ×8=512 | ×8=512 | ×16=1024 | 128 | 16×5=80 | ||
SHA-384 | ×6=384 | |||||||
Tiger-192 | 64 | ×3=192 | ×3=192 | ×8=512 | 64 | 8×3=24 | Tiger | |
Tiger-160 | ×2.5=160 | |||||||
Tiger-128 | ×2=128 |
See also
References
External links
- The Hash function lounge — a list of hash functions and known attacks, by Paulo Barreto
- Hash'em all! — free online text and file hashing with different algorithms