Jump to content

Comparison of cryptographic hash functions

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Tsihonglau (talk | contribs) at 10:52, 26 December 2008 (Created page with 'The following tables compare general and technical information for a number of cryptographic hash functions. Please see the individual functions' articles for f...'). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)

The following tables compare general and technical information for a number of cryptographic hash functions. Please see the individual functions' articles for further information. This article is not all-inclusive or necessarily up-to-date.


General information

Basic general information about the cryptographic hash functions: year, designer, references, etc.

Function Year Designer Derived from Reference
HAVAL 1992 Yuliang Zheng, Josef Pieprzyk, Jennifer Seberry Website
MD2 1989 Ronald Rivest RFC 1319
MD4 1990 Ronald Rivest RFC 1320
MD5 1992 Ronald Rivest MD4 RFC 1321
RIPEMD 1990 The RIPE Consortium MD4
RIPEMD-128/256 1996 Hans Dobbertin, Antoon Bosselaers, Bart Preneel RIPEMD Website
RIPEMD-160/320 1996 Hans Dobbertin, Antoon Bosselaers, Bart Preneel RIPEMD Website
SHA-0 1993 NSA SHA-0
SHA-1 1995 NSA SHA-0 FIPS 180--3
SHA-256/224 2002/2004 NSA FIPS 180--3
SHA-512/384 2002 NSA FIPS 180--3
Tiger(2)-192/160/128 1995 Ross Anderson, Eli Biham Website
Whirlpool 2004 Vincent Rijmen, Paulo Barreto Website