Comparison of cryptographic hash functions: Difference between revisions
Jump to navigation
Jump to search
imported>Laura240406 →Parameters: add note about limited size of 2<sup>64</sup> bytes |
(No difference)
|
Latest revision as of 21:08, 6 August 2024
Template:Short description The following tables compare general and technical information for a number of cryptographic hash functions. See the individual functions' articles for further information. This article is not all-inclusive or necessarily up-to-date. An overview of hash function security/cryptanalysis can be found at hash function security summary.
General information
Basic general information about the cryptographic hash functions: year, designer, references, etc.
Parameters
| Algorithm | Output size (bits) | Internal state sizeTemplate:Notetag | Block size | Length size | Word size | Rounds |
|---|---|---|---|---|---|---|
| BLAKE2b | 512 | 512 | 1024 | 128Template:Notetag | 64 | 12 |
| BLAKE2s | 256 | 256 | 512 | 64Template:Notetag | 32 | 10 |
| BLAKE3 | UnlimitedTemplate:Notetag | 256Template:Notetag | 512 | 64 | 32 | 7 |
| GOST | 256 | 256 | 256 | 256 | 32 | 32 |
| HAVAL | 256/224/192/160/128 | 256 | 1024 | 64 | 32 | 3/4/5 |
| MD2 | 128 | 384 | 128 | – | 32 | 18 |
| MD4 | 128 | 128 | 512 | 64 | 32 | 3 |
| MD5 | 128 | 128 | 512 | 64 | 32 | 64 |
| PANAMA | 256 | 8736 | 256 | – | 32 | – |
| RadioGatún | UnlimitedTemplate:Notetag | 58 words | 19 wordsTemplate:Notetag | – | 1–64Template:Notetag | 18Template:Notetag |
| RIPEMD | 128 | 128 | 512 | 64 | 32 | 48 |
| RIPEMD-128, -256 | 128/256 | 128/256 | 512 | 64 | 32 | 64 |
| RIPEMD-160 | 160 | 160 | 512 | 64 | 32 | 80 |
| RIPEMD-320 | 320 | 320 | 512 | 64 | 32 | 80 |
| SHA-0 | 160 | 160 | 512 | 64 | 32 | 80 |
| SHA-1 | 160 | 160 | 512 | 64 | 32 | 80 |
| SHA-224, -256 | 224/256 | 256 | 512 | 64 | 32 | 64 |
| SHA-384, -512, -512/224, -512/256 | 384/512/224/256 | 512 | 1024 | 128 | 64 | 80 |
| SHA-3 | 224/256/384/512Template:Notetag | 1600 | 1600 - 2*bits | –Template:Notetag | 64 | 24 |
| SHA3-224 | 224 | 1600 | 1152 | – | 64 | 24 |
| SHA3-256 | 256 | 1600 | 1088 | – | 64 | 24 |
| SHA3-384 | 384 | 1600 | 832 | – | 64 | 24 |
| SHA3-512 | 512 | 1600 | 576 | – | 64 | 24 |
| Tiger(2)-192/160/128 | 192/160/128 | 192 | 512 | 64 | 64 | 24 |
| Whirlpool | 512 | 512 | 512 | 256 | 8 | 10 |
Notes
Compression function
The following tables compare technical information for compression functions of cryptographic hash functions. The information comes from the specifications, please refer to them for more details.
Notes
See also
References
External links
- ECRYPT Benchmarking of Cryptographic Hashes – measurements of hash function speed on various platforms
- The ECRYPT Hash Function Website – A wiki for cryptographic hash functions
- SHA-3 Project – Information about SHA-3 competition