• (FIPS), including: SHA-0: A retronym applied to the original version of the 160-bit hash function published in 1993 under the name "SHA". It was withdrawn...
    3 KB (464 words) - 07:05, 4 October 2024
  • SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. Although part...
    52 KB (5,727 words) - 13:30, 29 July 2025
  • Like SHA-2, there are two variants differing in the word size. ChaCha operates on a 4×4 array of words. BLAKE repeatedly combines an 8-word hash value...
    31 KB (2,941 words) - 12:39, 4 July 2025
  • SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published...
    51 KB (4,982 words) - 07:36, 30 July 2025
  • has a SHA-1 function. In cryptography, SHA-1 (Secure Hash Algorithm 1) is a hash function which takes an input and produces a 160-bit (20-byte) hash value...
    50 KB (5,744 words) - 22:35, 2 July 2025
  • authentication code (MAC). SipHash, however, is not a general purpose key-less hash function such as Secure Hash Algorithms (SHA) and therefore must always...
    14 KB (1,342 words) - 17:18, 17 February 2025
  • Thumbnail for HMAC
    hash functions: SHA-1, MD5, RIPEMD-128.: §2  function hmac is input: key: Bytes // Array of bytes message: Bytes // Array of bytes to be hashed hash:...
    18 KB (2,327 words) - 01:15, 2 August 2025
  • Thumbnail for Cryptographic hash function
    constructions using hash functions can be provably secure if the underlying hash function is secure. Also, many hash functions (including SHA-1 and SHA-2) are built...
    49 KB (6,300 words) - 10:48, 24 July 2025
  • technical information for a number of cryptographic hash functions. See the individual functions' articles for further information. This article is not...
    16 KB (806 words) - 04:43, 24 May 2025
  • cryptographic hash functions. Note that not all entries may be up to date. For a summary of other hash function parameters, see comparison of cryptographic hash functions...
    17 KB (1,063 words) - 06:46, 25 May 2025
  • Hash function security summary Comparison of cryptographic hash functions MD4 MD5 MD6 SHA-1 Linn, John (August 1989). "RSA-MD2 Message Digest Algorithm"...
    9 KB (1,053 words) - 04:19, 31 December 2024
  • Thumbnail for Hash collision
    computer science, a hash collision or hash clash is when two distinct pieces of data in a hash table share the same hash value. The hash value in this case...
    9 KB (1,120 words) - 20:01, 19 June 2025
  • particular hash size. Unlike the SHA-2 family, no distinguishing initialization values are defined; they are simply prefixes of the full Tiger/192 hash value...
    9 KB (910 words) - 14:47, 30 September 2023
  • SHA-3 hash algorithm. The winning hash function has been published as NIST FIPS 202 the "SHA-3 Standard", to complement FIPS 180-4, the Secure Hash Standard...
    27 KB (2,268 words) - 11:21, 19 July 2025
  • Thumbnail for Merkle–Damgård construction
    Merkle–Damgård hash function is a method of building collision-resistant cryptographic hash functions from collision-resistant one-way compression functions.: 145 ...
    15 KB (1,904 words) - 15:25, 10 January 2025
  • Thumbnail for One-way compression function
    compression functions are for instance used in the Merkle–Damgård construction inside cryptographic hash functions. One-way compression functions are often...
    24 KB (3,977 words) - 11:37, 24 March 2025
  • Thumbnail for Skein (hash function)
    cryptographic hash function and one of five finalists in the NIST hash function competition. Entered as a candidate to become the SHA-3 standard, the...
    9 KB (822 words) - 12:52, 13 April 2025
  • techniques—SM3 cryptographic hash algorithm ISO/IEC 10118-3:2018—IT Security techniques—Hash-functions—Part 3: Dedicated hash-functions IETF RFC draft-sca-cfrg-sm3-02...
    4 KB (392 words) - 08:48, 19 July 2025
  • MD5 (redirect from MD5 Hash)
    Comparison of cryptographic hash functions Hash function security summary HashClash MD5Crypt md5deep md5sum MD6 SHA-1 SHA-2 Rivest, R. (April 1992). "Step...
    46 KB (4,710 words) - 10:55, 16 June 2025
  • Hilarie Orman for the NIST SHA-3 competition. The SANDstorm hash was accepted into the first round of the NIST hash function competition, but was not accepted...
    3 KB (247 words) - 17:36, 7 January 2025
  • Shebang (Unix) (redirect from Hash-bang)
    known as sharp or hash) and exclamation mark (also known as bang), at the beginning of a script. It is also called sharp-exclamation, sha-bang, hashbang...
    25 KB (3,233 words) - 14:31, 31 July 2025
  • Collision attack (redirect from HashDoS)
    The NIST hash function competition was largely induced by published collision attacks against two very commonly used hash functions, MD5 and SHA-1. The...
    17 KB (2,056 words) - 23:11, 15 July 2025
  • Thumbnail for Merkle tree
    Merkle tree (redirect from Tiger-Tree Hash)
    under each node. Usually, a cryptographic hash function such as SHA-2 is used for the hashing. If the hash tree only needs to protect against unintentional...
    15 KB (1,787 words) - 20:00, 22 July 2025
  • JH is a cryptographic hash function submitted to the NIST hash function competition by Hongjun Wu. Though chosen as one of the five finalists of the competition...
    4 KB (399 words) - 17:35, 7 January 2025
  • The GOST hash function, defined in the standards GOST R 34.11-94 and GOST 34.311-95 is a 256-bit cryptographic hash function. It was initially defined...
    16 KB (2,206 words) - 02:44, 11 July 2024
  • end of the message and produce a valid hash without knowing the secret. Algorithms like MD5, SHA-1 and most of SHA-2 that are based on the Merkle–Damgård...
    8 KB (1,082 words) - 12:51, 23 April 2025
  • Thumbnail for Sponge function
    cryptographic primitives, including cryptographic hashes, message authentication codes, mask generation functions, stream ciphers, pseudo-random number generators...
    7 KB (846 words) - 09:04, 19 April 2025
  • This is a list of hash functions, including cyclic redundancy checks, checksum functions, and cryptographic hash functions. Adler-32 is often mistaken...
    10 KB (279 words) - 12:52, 24 May 2025
  • The elliptic curve only hash (ECOH) algorithm was submitted as a candidate for SHA-3 in the NIST hash function competition. However, it was rejected in...
    11 KB (1,846 words) - 17:39, 7 January 2025
  • Thumbnail for RIPEMD
    RIPEMD (category Cryptographic hash functions)
    security level is sufficient but longer hash result is necessary. While RIPEMD functions are less popular than SHA-1 and SHA-2, they are used, among others, in...
    9 KB (884 words) - 16:44, 18 July 2025