Comparison of cryptographic hash functions
Appearance
The following tables compare general and technical information for a number of cryptographic hash functions. Please see the individual functions' articles for further information. This article is not all-inclusive or necessarily up-to-date.
General information
Basic general information about the cryptographic hash functions: year, designer, references, etc.
Function | Year | Designer | Derived from | Reference |
---|---|---|---|---|
HAVAL | 1992 | Yuliang Zheng, Josef Pieprzyk, Jennifer Seberry | Website | |
MD2 | 1989 | Ronald Rivest | RFC 1319 | |
MD4 | 1990 | Ronald Rivest | RFC 1320 | |
MD5 | 1992 | Ronald Rivest | MD4 | RFC 1321 |
RIPEMD | 1990 | The RIPE Consortium | MD4 | |
RIPEMD-128/256 | 1996 | Hans Dobbertin, Antoon Bosselaers, Bart Preneel | RIPEMD | Website |
RIPEMD-160/320 | 1996 | Hans Dobbertin, Antoon Bosselaers, Bart Preneel | RIPEMD | Website |
SHA-0 | 1993 | NSA | SHA-0 | |
SHA-1 | 1995 | NSA | SHA-0 | FIPS 180--3 |
SHA-256/224 | 2002/2004 | NSA | FIPS 180--3 | |
SHA-512/384 | 2002 | NSA | FIPS 180--3 | |
Tiger(2)-192/160/128 | 1995 | Ross Anderson, Eli Biham | Website | |
Whirlpool | 2004 | Vincent Rijmen, Paulo Barreto | Website |