<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=Hash_function_security_summary</id>
	<title>Hash function security summary - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://en.zaoniao.it/index.php?action=history&amp;feed=atom&amp;title=Hash_function_security_summary"/>
	<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=Hash_function_security_summary&amp;action=history"/>
	<updated>2026-05-15T19:54:17Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.32.0</generator>
	<entry>
		<id>http://en.zaoniao.it/index.php?title=Hash_function_security_summary&amp;diff=2409&amp;oldid=prev</id>
		<title>Admin: Created page with &quot;This article summarizes publicly known attacks against cryptographic hash functions. Note that not all entries may be up to date. For a summary of other...&quot;</title>
		<link rel="alternate" type="text/html" href="http://en.zaoniao.it/index.php?title=Hash_function_security_summary&amp;diff=2409&amp;oldid=prev"/>
		<updated>2019-03-21T04:07:10Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;This article summarizes publicly known &lt;a href=&quot;/index.php?title=Cryptanalysis&amp;amp;action=edit&amp;amp;redlink=1&quot; class=&quot;new&quot; title=&quot;Cryptanalysis (page does not exist)&quot;&gt;attacks&lt;/a&gt; against &lt;a href=&quot;/Cryptographic_hash_function&quot; title=&quot;Cryptographic hash function&quot;&gt;cryptographic hash functions&lt;/a&gt;. Note that not all entries may be up to date. For a summary of other...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;This article summarizes publicly known [[cryptanalysis|attacks]] against [[cryptographic hash function]]s. Note that not all entries may be up to date. For a summary of other hash function parameters, see [[comparison of cryptographic hash functions]].&lt;br /&gt;
&lt;br /&gt;
== Table color key ==&lt;br /&gt;
&lt;br /&gt;
==Common hash functions==&lt;br /&gt;
&lt;br /&gt;
===Collision resistance===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Hash function&lt;br /&gt;
! Security claim&lt;br /&gt;
! Best attack&lt;br /&gt;
! Publish date&lt;br /&gt;
! Comment&lt;br /&gt;
|- style=&amp;quot;background: #ff9090; color: black&amp;quot;&lt;br /&gt;
| [[MD5]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;18&amp;lt;/sup&amp;gt; time&lt;br /&gt;
| 2013-03-25&lt;br /&gt;
| This attack takes seconds on a regular PC. Two-block collisions in 2&amp;lt;sup&amp;gt;18&amp;lt;/sup&amp;gt;, single-block collisions in 2&amp;lt;sup&amp;gt;41&amp;lt;/sup&amp;gt;.&lt;br /&gt;
|- style=&amp;quot;background: #ff9090; color: black&amp;quot;&lt;br /&gt;
| [[SHA-1]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;80&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;63.1&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 2017-02-23&lt;br /&gt;
| Paper.&lt;br /&gt;
|-&lt;br /&gt;
| [[SHA256]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;128&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 31 of 64 rounds (2&amp;lt;sup&amp;gt;65.5&amp;lt;/sup&amp;gt;)&lt;br /&gt;
| 2013-05-28&lt;br /&gt;
| Two-block collision.&lt;br /&gt;
|-&lt;br /&gt;
| [[SHA512]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;256&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 24 of 80 rounds (2&amp;lt;sup&amp;gt;32.5&amp;lt;/sup&amp;gt;)&lt;br /&gt;
| 2008-11-25&lt;br /&gt;
| Paper.&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE (hash function)#BLAKE2|BLAKE2s]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;128&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 2.5 of 10 rounds (2&amp;lt;sup&amp;gt;112&amp;lt;/sup&amp;gt;)&lt;br /&gt;
| 2009-05-26&lt;br /&gt;
| Paper.&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE (hash function)#BLAKE2|BLAKE2b]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;256&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 2.5 of 12 rounds (2&amp;lt;sup&amp;gt;224&amp;lt;/sup&amp;gt;)&lt;br /&gt;
| 2009-05-26&lt;br /&gt;
| Paper.&lt;br /&gt;
|- style=&amp;quot;background: #ffff90; color: black&amp;quot;&lt;br /&gt;
| [[SHA-1]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;80&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;77.1&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 2012-06-19&lt;br /&gt;
| Paper.&lt;br /&gt;
|-&lt;br /&gt;
| [[SHA256]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;128&amp;lt;/sup&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[SHA512]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;256&amp;lt;/sup&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE (hash function)#BLAKE2|BLAKE2s]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;128&amp;lt;/sup&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[BLAKE (hash function)#BLAKE2|BLAKE2b]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;256&amp;lt;/sup&amp;gt;&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Preimage resistance===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Hash function&lt;br /&gt;
! Security claim&lt;br /&gt;
! Best attack&lt;br /&gt;
! Publish date&lt;br /&gt;
! Comment&lt;br /&gt;
|- style=&amp;quot;background: #ffff90; color: black&amp;quot;&lt;br /&gt;
| [[MD5]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;128&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;123.4&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 2009-04-27&lt;br /&gt;
| Paper.&lt;br /&gt;
|-&lt;br /&gt;
| [[SHA-1]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;160&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 45 of 80 rounds&lt;br /&gt;
| 2008-08-17&lt;br /&gt;
| Paper.&lt;br /&gt;
|-&lt;br /&gt;
| [[SHA256]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;256&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 43 of 64 rounds (2&amp;lt;sup&amp;gt;254.9&amp;lt;/sup&amp;gt; time, 2&amp;lt;sup&amp;gt;6&amp;lt;/sup&amp;gt; memory)&lt;br /&gt;
| 2009-12-10&lt;br /&gt;
| Paper.&lt;br /&gt;
|-&lt;br /&gt;
| [[SHA512]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;512&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 46 of 80 rounds (2&amp;lt;sup&amp;gt;511.5&amp;lt;/sup&amp;gt; time, 2&amp;lt;sup&amp;gt;6&amp;lt;/sup&amp;gt; memory)&lt;br /&gt;
| 2008-11-25&lt;br /&gt;
| Paper, updated version.&lt;br /&gt;
|- style=&amp;quot;background: #ff9090; color: black&amp;quot;&lt;br /&gt;
| [[HAVAL]]-128&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;7&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 2004-08-17&lt;br /&gt;
| Collisions originally reported in 2004, followed up by cryptanalysis paper in 2005.&lt;br /&gt;
|-&lt;br /&gt;
| [[MD2 (cryptography)|MD2]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt;&lt;br /&gt;
| &lt;br /&gt;
| 2009&lt;br /&gt;
| Slightly less computationally expensive than a birthday attack, but for practical purposes, memory requirements make it more expensive.&lt;br /&gt;
|- style=&amp;quot;background: #ff9090; color: black&amp;quot;&lt;br /&gt;
| [[MD4]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 3 operations&lt;br /&gt;
| 2007-03-22&lt;br /&gt;
| Finding collisions almost as fast as verifying them.&lt;br /&gt;
|- style=&amp;quot;background: #ff9090; color: black&amp;quot;&lt;br /&gt;
| [[Panama (cryptography)|PANAMA]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;128&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;6&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 2007-04-04&lt;br /&gt;
| Paper, improvement of an earlier theoretical attack from 2001.&lt;br /&gt;
|- style=&amp;quot;background: #ff9090; color: black&amp;quot;&lt;br /&gt;
| [[RIPEMD]] (original)&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;18&amp;lt;/sup&amp;gt; time&lt;br /&gt;
| 2004-08-17&lt;br /&gt;
| Collisions originally reported in 2004,&lt;br /&gt;
|-&lt;br /&gt;
| [[RadioGatún]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;608&amp;lt;/sup&amp;gt; *&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;704&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 2008-12-04&lt;br /&gt;
| For a word size ''w'' between 1-64 bits, the hash provides a collision security claim of 2&amp;lt;sup&amp;gt;8.5''w''&amp;lt;/sup&amp;gt;. For any value, the attack can find a collision in 2&amp;lt;sup&amp;gt;11''w''&amp;lt;/sup&amp;gt; time.&lt;br /&gt;
|-&lt;br /&gt;
| RIPEMD-160&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;80&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 48 of 80 rounds (2&amp;lt;sup&amp;gt;51&amp;lt;/sup&amp;gt; time)&lt;br /&gt;
| 2006&lt;br /&gt;
| Paper.&lt;br /&gt;
|- style=&amp;quot;background: #ff9090; color: black&amp;quot;&lt;br /&gt;
| [[SHA-0]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;80&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;33.6&amp;lt;/sup&amp;gt; time&lt;br /&gt;
| 2008-02-11&lt;br /&gt;
| Two-block collisions using [[boomerang attack]]. Attack takes estimated 1 hour on an average PC.&lt;br /&gt;
|-&lt;br /&gt;
| [[Streebog]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;256&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 9.5 rounds of 12 (2&amp;lt;sup&amp;gt;176&amp;lt;/sup&amp;gt; time, 2&amp;lt;sup&amp;gt;128&amp;lt;/sup&amp;gt; memory)&lt;br /&gt;
| 2013-09-10&lt;br /&gt;
| [[Rebound attack]].&lt;br /&gt;
|-&lt;br /&gt;
| [[Whirlpool (cryptography)|Whirlpool]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;256&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 4.5 of 10 rounds (2&amp;lt;sup&amp;gt;120&amp;lt;/sup&amp;gt; time)&lt;br /&gt;
| 2009-02-24&lt;br /&gt;
| Rebound attack.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Preimage resistance===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Hash function&lt;br /&gt;
! Security claim&lt;br /&gt;
! Best attack&lt;br /&gt;
! Publish date&lt;br /&gt;
! Comment&lt;br /&gt;
|- style=&amp;quot;background: #ffff90; color: black&amp;quot;&lt;br /&gt;
| [[GOST (hash function)|GOST]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;256&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;192&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 2008-08-18&lt;br /&gt;
| Paper.&lt;br /&gt;
|- style=&amp;quot;background: #ffff90; color: black&amp;quot;&lt;br /&gt;
| [[MD4]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;128&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;102&amp;lt;/sup&amp;gt; time, 2&amp;lt;sup&amp;gt;33&amp;lt;/sup&amp;gt; memory&lt;br /&gt;
| 2008-02-10&lt;br /&gt;
| Paper.&lt;br /&gt;
|-&lt;br /&gt;
| [[RIPEMD]] (original)&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;128&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 35 of 48 rounds&lt;br /&gt;
| rowspan=3 | 2011&lt;br /&gt;
| rowspan=3 | Paper.&lt;br /&gt;
|-&lt;br /&gt;
| RIPEMD-128&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;128&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 35 of 64 rounds&lt;br /&gt;
|-&lt;br /&gt;
| RIPEMD-160&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;160&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 31 of 80 rounds&lt;br /&gt;
|- style=&amp;quot;background: #ffff90; color: black&amp;quot;&lt;br /&gt;
| [[Streebog]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;512&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;266&amp;lt;/sup&amp;gt; time, 2&amp;lt;sup&amp;gt;259&amp;lt;/sup&amp;gt; data&lt;br /&gt;
| 2014-08-29&lt;br /&gt;
| The paper presents two second-preimage attacks with variable data requirements.&lt;br /&gt;
|- style=&amp;quot;background: #ffff90; color: black&amp;quot;&lt;br /&gt;
| [[Tiger (cryptography)|Tiger]]&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;192&amp;lt;/sup&amp;gt;&lt;br /&gt;
| 2&amp;lt;sup&amp;gt;188.8&amp;lt;/sup&amp;gt; time, 2&amp;lt;sup&amp;gt;8&amp;lt;/sup&amp;gt; memory&lt;br /&gt;
| 2010-12-06&lt;br /&gt;
| Paper.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* [[Comparison of cryptographic hash functions]]&lt;br /&gt;
* [[Cryptographic hash function]]&lt;br /&gt;
* [[Collision attack]]&lt;br /&gt;
&lt;br /&gt;
==Source==&lt;br /&gt;
&lt;br /&gt;
[http://wikipedia.org/ http://wikipedia.org/]&lt;br /&gt;
&lt;br /&gt;
[[Category:Cryptography]]&lt;/div&gt;</summary>
		<author><name>Admin</name></author>
		
	</entry>
</feed>