<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=Comparison_of_cryptographic_hash_functions</id>
	<title>Comparison of cryptographic hash functions - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=Comparison_of_cryptographic_hash_functions"/>
	<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=Comparison_of_cryptographic_hash_functions&amp;action=history"/>
	<updated>2026-05-15T09:22:09Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.32.0</generator>
	<entry>
		<id>http://en.zaoniao.it/index.php?title=Comparison_of_cryptographic_hash_functions&amp;diff=4181&amp;oldid=prev</id>
		<title>Admin: Created page with &quot;{{#seo: |title=Comparison of cryptographic hash functions - zaoniaoWiki |keywords=Comparison of cryptographic hash functions, comparison, hash, functions, compare, table, list...&quot;</title>
		<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=Comparison_of_cryptographic_hash_functions&amp;diff=4181&amp;oldid=prev"/>
		<updated>2019-05-04T02:42:53Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;{{#seo: |title=Comparison of cryptographic hash functions - zaoniaoWiki |keywords=Comparison of cryptographic hash functions, comparison, hash, functions, compare, table, list...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{#seo:&lt;br /&gt;
|title=Comparison of cryptographic hash functions - zaoniaoWiki&lt;br /&gt;
|keywords=Comparison of cryptographic hash functions, comparison, hash, functions, compare, table, list, cryptographic, keys&lt;br /&gt;
|description=The following tables compare general and technical information for a number of cryptographic hash functions. An overview of hash function security/cryptanalysis can be found at hash function security summary.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
The following tables compare general and technical information for a number of cryptographic hash functions. An overview of hash function security/cryptanalysis can be found at hash function security summary.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Basic general information about the [[cryptographic hash function]]s: year, designer, references, etc. &lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot; style=&amp;quot;text-align: center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Function&lt;br /&gt;
! Year&lt;br /&gt;
! Designer&lt;br /&gt;
! Derived from&lt;br /&gt;
! Reference&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE (hash function)|BLAKE]]&lt;br /&gt;
| 2008&lt;br /&gt;
| Jean-Philippe Aumasson&amp;lt;br /&amp;gt;Luca Henzen&amp;lt;br /&amp;gt;Willi Meier&amp;lt;br /&amp;gt;Raphael C.-W. Phan&lt;br /&gt;
| [[Salsa20#ChaCha_variant|ChaCha20]]&lt;br /&gt;
| [https://131002.net/blake/ Website]&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE (hash function)#BLAKE2|BLAKE2]]&lt;br /&gt;
| 2012&lt;br /&gt;
| Jean-Philippe Aumasson&amp;lt;br /&amp;gt;Samuel Neves&amp;lt;br /&amp;gt;[[Zooko_Wilcox-O'Hearn]]&amp;lt;br /&amp;gt;Christian Winnerlein&lt;br /&gt;
| [[BLAKE (hash function)|BLAKE]]&lt;br /&gt;
| [https://blake2.net Website]&lt;br /&gt;
|-&lt;br /&gt;
| [[GOST (hash function)|GOST R 34.11-94]]&lt;br /&gt;
| 1994&lt;br /&gt;
| FAPSI and VNIIstandart&lt;br /&gt;
| [[GOST (block cipher)|GOST 28147-89]]&lt;br /&gt;
| RFC 5831, RFC 4357&lt;br /&gt;
|-&lt;br /&gt;
| [[HAVAL]]&lt;br /&gt;
| 1992&lt;br /&gt;
| Yuliang Zheng&amp;lt;br /&amp;gt;Josef Pieprzyk&amp;lt;br /&amp;gt;Jennifer Seberry&lt;br /&gt;
|&lt;br /&gt;
| [https://web.archive.org/web/20150111210116/http://labs.calyptix.com/haval.php Website]&lt;br /&gt;
|-&lt;br /&gt;
| KangarooTwelve (Keccak family)&lt;br /&gt;
| 2016 [http://keccak.noekeon.org/KangarooTwelve.pdf Kangaroo Twelve main document]&lt;br /&gt;
| Guido Bertoni&amp;lt;br /&amp;gt;Joan Daemen&amp;lt;br /&amp;gt;Michaël Peeters&amp;lt;br /&amp;gt;Gilles Van Assche&lt;br /&gt;
| [[Keccak]]&lt;br /&gt;
| [http://keccak.noekeon.org/kangarootwelve.html Website]&lt;br /&gt;
|-&lt;br /&gt;
| [[MD2 (cryptography)|MD2]]&lt;br /&gt;
| 1989&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot;|Ronald Rivest&lt;br /&gt;
| &lt;br /&gt;
| RFC 1319&lt;br /&gt;
|-&lt;br /&gt;
| [[MD4]]&lt;br /&gt;
| 1990&lt;br /&gt;
| &lt;br /&gt;
| RFC 1320&lt;br /&gt;
|-&lt;br /&gt;
| [[MD5]]&lt;br /&gt;
| 1992&lt;br /&gt;
| [[MD4]]&amp;lt;br /&amp;gt;RFC 1321 page 1&lt;br /&gt;
| RFC 1321&lt;br /&gt;
|-&lt;br /&gt;
| [[MD6]]&lt;br /&gt;
| 2008&lt;br /&gt;
|&lt;br /&gt;
| [http://groups.csail.mit.edu/cis/md6/submitted-2008-10-27/Supporting_Documentation/md6_report.pdf md6_report.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| [[RIPEMD]]&lt;br /&gt;
| 1990&lt;br /&gt;
| The RIPE Consortium [http://homes.esat.kuleuven.be/~bosselae/ripemd160.html#What]&lt;br /&gt;
| [[MD4]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[RIPEMD-128]]&amp;lt;br /&amp;gt;[[RIPEMD-256]]&amp;lt;br /&amp;gt;[[RIPEMD-160]]&amp;lt;br /&amp;gt;[[RIPEMD-320]]&lt;br /&gt;
| 1996&lt;br /&gt;
| Hans Dobbertin&amp;lt;br /&amp;gt;Antoon Bosselaers&amp;lt;br /&amp;gt;Bart Preneel&lt;br /&gt;
| [[RIPEMD]][http://homes.esat.kuleuven.be/~bosselae/ripemd160.html#What]&lt;br /&gt;
| [http://homes.esat.kuleuven.be/~bosselae/ripemd160.html Website]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHA-0]]&lt;br /&gt;
| 1993&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot;|National Security Agency&lt;br /&gt;
|&lt;br /&gt;
| [http://w2.eff.org/Privacy/Digital_signature/?f=fips_sha_shs.info.txt SHA-0]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHA-1]]&lt;br /&gt;
| 1995&lt;br /&gt;
| [[SHA-0]]&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot;|[http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf]&lt;br /&gt;
|-&lt;br /&gt;
| [[SHA-256]]&amp;lt;br /&amp;gt;[[SHA-512]]&amp;lt;br /&amp;gt;[[SHA-384]]&lt;br /&gt;
| 2002&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
| [[SHA-224]]&lt;br /&gt;
| 2004&lt;br /&gt;
|-&lt;br /&gt;
| [[SHA-3]] (Keccak)&lt;br /&gt;
| 2008&lt;br /&gt;
| Guido Bertoni&amp;lt;br /&amp;gt;Joan Daemen&amp;lt;br /&amp;gt;Michaël Peeters&amp;lt;br /&amp;gt;Gilles Van Assche&lt;br /&gt;
| RadioGatún&lt;br /&gt;
| [http://keccak.noekeon.org Website]&lt;br /&gt;
|-&lt;br /&gt;
| [[Streebog]]&lt;br /&gt;
| 2012&lt;br /&gt;
| Federal Security Service, InfoTeCS JSC&lt;br /&gt;
|&lt;br /&gt;
| RFC 6986&lt;br /&gt;
|-&lt;br /&gt;
| [[Tiger (cryptography)|Tiger]]&lt;br /&gt;
| 1995&lt;br /&gt;
| Ross Anderson&amp;lt;br /&amp;gt;Eli Biham&lt;br /&gt;
|&lt;br /&gt;
| [http://www.cs.technion.ac.il/~biham/Reports/Tiger/ Website]&lt;br /&gt;
|-&lt;br /&gt;
| [[Whirlpool (cryptography)|Whirlpool]]&lt;br /&gt;
| 2004&lt;br /&gt;
| Vincent Rijmen&amp;lt;br /&amp;gt;Paulo Barreto&lt;br /&gt;
|&lt;br /&gt;
| [http://www.larc.usp.br/~pbarreto/WhirlpoolPage.html Website]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Parameters ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable sortable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Algorithm&lt;br /&gt;
! Output size (bits)&lt;br /&gt;
! Internal state size&lt;br /&gt;
! Block size&lt;br /&gt;
! Length size&lt;br /&gt;
! Word size&lt;br /&gt;
! Rounds&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[BLAKE (hash function)#BLAKE2|BLAKE2b]]'''&lt;br /&gt;
| 512&lt;br /&gt;
| 1024&lt;br /&gt;
| 512&lt;br /&gt;
| –&lt;br /&gt;
| 64&lt;br /&gt;
| 12&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[BLAKE (hash function)#BLAKE2|BLAKE2s]]'''&lt;br /&gt;
| 256&lt;br /&gt;
| 512&lt;br /&gt;
| 256&lt;br /&gt;
| –&lt;br /&gt;
| 32&lt;br /&gt;
| 10&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[GOST (hash function)|GOST]]'''&lt;br /&gt;
| 256&lt;br /&gt;
| 256&lt;br /&gt;
| 256&lt;br /&gt;
| 256&lt;br /&gt;
| 32&lt;br /&gt;
| 32&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[HAVAL]]'''&lt;br /&gt;
| 256/224/192/160/128&lt;br /&gt;
| 256&lt;br /&gt;
| 1,024&lt;br /&gt;
| 64&lt;br /&gt;
| 32&lt;br /&gt;
| 3/4/5&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[MD2 (cryptography)|MD2]]'''&lt;br /&gt;
| 128&lt;br /&gt;
| 384&lt;br /&gt;
| 128&lt;br /&gt;
| –&lt;br /&gt;
| 32&lt;br /&gt;
| 18&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[MD4]]'''&lt;br /&gt;
| 128&lt;br /&gt;
| 128&lt;br /&gt;
| 512&lt;br /&gt;
| 64&lt;br /&gt;
| 32&lt;br /&gt;
| 3&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[MD5]]'''&lt;br /&gt;
| 128&lt;br /&gt;
| 128&lt;br /&gt;
| 512&lt;br /&gt;
| 64&lt;br /&gt;
| 32&lt;br /&gt;
| 64&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[Panama (cryptography)|PANAMA]]'''&lt;br /&gt;
| 256&lt;br /&gt;
| 8,736&lt;br /&gt;
| 256&lt;br /&gt;
| –&lt;br /&gt;
| 32&lt;br /&gt;
| –&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[RadioGatún]]'''&lt;br /&gt;
| Unlimited&lt;br /&gt;
| 58 words&lt;br /&gt;
| 19 words&lt;br /&gt;
| –&lt;br /&gt;
| 1–64&lt;br /&gt;
| 18&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[RIPEMD]]'''&lt;br /&gt;
| 128&lt;br /&gt;
| 128&lt;br /&gt;
| 512&lt;br /&gt;
| 64&lt;br /&gt;
| 32&lt;br /&gt;
| 48&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[RIPEMD|RIPEMD-128/256]]'''&lt;br /&gt;
| 128/256&lt;br /&gt;
| 128/256&lt;br /&gt;
| 512&lt;br /&gt;
| 64&lt;br /&gt;
| 32&lt;br /&gt;
| 64&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[RIPEMD|RIPEMD-160]]'''&lt;br /&gt;
| 160&lt;br /&gt;
| 160&lt;br /&gt;
| 512&lt;br /&gt;
| 64&lt;br /&gt;
| 32&lt;br /&gt;
| 80&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[RIPEMD|RIPEMD-320]]'''&lt;br /&gt;
| 320&lt;br /&gt;
| 320&lt;br /&gt;
| 512&lt;br /&gt;
| 64&lt;br /&gt;
| 32&lt;br /&gt;
| 80&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[SHA-1|SHA-0]]'''&lt;br /&gt;
| 160&lt;br /&gt;
| 160&lt;br /&gt;
| 512&lt;br /&gt;
| 64&lt;br /&gt;
| 32&lt;br /&gt;
| 80&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[SHA-1]]'''&lt;br /&gt;
| 160&lt;br /&gt;
| 160&lt;br /&gt;
| 512&lt;br /&gt;
| 64&lt;br /&gt;
| 32&lt;br /&gt;
| 80&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[SHA-2|SHA-224, SHA-256]]'''&lt;br /&gt;
| 224/256&lt;br /&gt;
| 256&lt;br /&gt;
| 512&lt;br /&gt;
| 64&lt;br /&gt;
| 32&lt;br /&gt;
| 64&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[SHA-2|SHA-384, SHA-512, SHA-512/224, SHA-512/256]]'''&lt;br /&gt;
| 384/512/224/256&lt;br /&gt;
| 512&lt;br /&gt;
| 1,024&lt;br /&gt;
| 128&lt;br /&gt;
| 64&lt;br /&gt;
| 80&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[SHA-3]]'''&lt;br /&gt;
| 224/256/384/512&lt;br /&gt;
| 1600&lt;br /&gt;
| 1600-2*bits&lt;br /&gt;
| –&lt;br /&gt;
| 64&lt;br /&gt;
| 24&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[SHA-3|SHA3]]'''-224&lt;br /&gt;
| 224&lt;br /&gt;
| 1600&lt;br /&gt;
| 1152&lt;br /&gt;
| –&lt;br /&gt;
| 64&lt;br /&gt;
| 24&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[SHA-3|SHA3]]'''-256&lt;br /&gt;
| 256&lt;br /&gt;
| 1600&lt;br /&gt;
| 1088&lt;br /&gt;
| –&lt;br /&gt;
| 64&lt;br /&gt;
| 24&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[SHA-3|SHA3]]'''-384&lt;br /&gt;
| 384&lt;br /&gt;
| 1600&lt;br /&gt;
| 832&lt;br /&gt;
| –&lt;br /&gt;
| 64&lt;br /&gt;
| 24&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[SHA-3|SHA3]]'''-512&lt;br /&gt;
| 512&lt;br /&gt;
| 1600&lt;br /&gt;
| 576&lt;br /&gt;
| –&lt;br /&gt;
| 64&lt;br /&gt;
| 24&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[Tiger (cryptography)|Tiger(2)-192/160/128]]'''&lt;br /&gt;
| 192/160/128&lt;br /&gt;
| 192&lt;br /&gt;
| 512&lt;br /&gt;
| 64&lt;br /&gt;
| 64&lt;br /&gt;
| 24&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;text-align:center;&amp;quot;&lt;br /&gt;
| '''[[Whirlpool (cryptography)|WHIRLPOOL]]'''&lt;br /&gt;
| 512&lt;br /&gt;
| 512&lt;br /&gt;
| 512&lt;br /&gt;
| 256&lt;br /&gt;
| 8&lt;br /&gt;
| 10&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[List of hash functions]]&lt;br /&gt;
* [[Hash function security summary]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Software comparisons]]&lt;/div&gt;</summary>
		<author><name>Admin</name></author>
		
	</entry>
</feed>