(FIPS), including: SHA-0: A retronym applied to the original version of the 160-bit hash function published in 1993 under the name "SHA". It was withdrawn...
3 KB (464 words) - 07:05, 4 October 2024
SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. Although part...
52 KB (5,727 words) - 13:30, 29 July 2025
Like SHA-2, there are two variants differing in the word size. ChaCha operates on a 4×4 array of words. BLAKE repeatedly combines an 8-word hash value...
31 KB (2,941 words) - 12:39, 4 July 2025
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published...
51 KB (4,982 words) - 07:36, 30 July 2025
has a SHA-1 function. In cryptography, SHA-1 (Secure Hash Algorithm 1) is a hash function which takes an input and produces a 160-bit (20-byte) hash value...
50 KB (5,744 words) - 22:35, 2 July 2025
authentication code (MAC). SipHash, however, is not a general purpose key-less hash function such as Secure Hash Algorithms (SHA) and therefore must always...
14 KB (1,342 words) - 17:18, 17 February 2025
HMAC (redirect from Keyed-Hashing Message Authentication)
hash functions: SHA-1, MD5, RIPEMD-128.: §2 function hmac is input: key: Bytes // Array of bytes message: Bytes // Array of bytes to be hashed hash:...
18 KB (2,327 words) - 01:15, 2 August 2025
constructions using hash functions can be provably secure if the underlying hash function is secure. Also, many hash functions (including SHA-1 and SHA-2) are built...
49 KB (6,300 words) - 10:48, 24 July 2025
technical information for a number of cryptographic hash functions. See the individual functions' articles for further information. This article is not...
16 KB (806 words) - 04:43, 24 May 2025
cryptographic hash functions. Note that not all entries may be up to date. For a summary of other hash function parameters, see comparison of cryptographic hash functions...
17 KB (1,063 words) - 06:46, 25 May 2025
Hash function security summary Comparison of cryptographic hash functions MD4 MD5 MD6 SHA-1 Linn, John (August 1989). "RSA-MD2 Message Digest Algorithm"...
9 KB (1,053 words) - 04:19, 31 December 2024
computer science, a hash collision or hash clash is when two distinct pieces of data in a hash table share the same hash value. The hash value in this case...
9 KB (1,120 words) - 20:01, 19 June 2025
particular hash size. Unlike the SHA-2 family, no distinguishing initialization values are defined; they are simply prefixes of the full Tiger/192 hash value...
9 KB (910 words) - 14:47, 30 September 2023
SHA-3 hash algorithm. The winning hash function has been published as NIST FIPS 202 the "SHA-3 Standard", to complement FIPS 180-4, the Secure Hash Standard...
27 KB (2,268 words) - 11:21, 19 July 2025
Merkle–Damgård construction (redirect from Merkle-Damgard hash function)
Merkle–Damgård hash function is a method of building collision-resistant cryptographic hash functions from collision-resistant one-way compression functions.: 145 ...
15 KB (1,904 words) - 15:25, 10 January 2025
compression functions are for instance used in the Merkle–Damgård construction inside cryptographic hash functions. One-way compression functions are often...
24 KB (3,977 words) - 11:37, 24 March 2025
cryptographic hash function and one of five finalists in the NIST hash function competition. Entered as a candidate to become the SHA-3 standard, the...
9 KB (822 words) - 12:52, 13 April 2025
techniques—SM3 cryptographic hash algorithm ISO/IEC 10118-3:2018—IT Security techniques—Hash-functions—Part 3: Dedicated hash-functions IETF RFC draft-sca-cfrg-sm3-02...
4 KB (392 words) - 08:48, 19 July 2025
Hilarie Orman for the NIST SHA-3 competition. The SANDstorm hash was accepted into the first round of the NIST hash function competition, but was not accepted...
3 KB (247 words) - 17:36, 7 January 2025
Shebang (Unix) (redirect from Hash-bang)
known as sharp or hash) and exclamation mark (also known as bang), at the beginning of a script. It is also called sharp-exclamation, sha-bang, hashbang...
25 KB (3,233 words) - 14:31, 31 July 2025
Collision attack (redirect from HashDoS)
The NIST hash function competition was largely induced by published collision attacks against two very commonly used hash functions, MD5 and SHA-1. The...
17 KB (2,056 words) - 23:11, 15 July 2025
Merkle tree (redirect from Tiger-Tree Hash)
under each node. Usually, a cryptographic hash function such as SHA-2 is used for the hashing. If the hash tree only needs to protect against unintentional...
15 KB (1,787 words) - 20:00, 22 July 2025
JH is a cryptographic hash function submitted to the NIST hash function competition by Hongjun Wu. Though chosen as one of the five finalists of the competition...
4 KB (399 words) - 17:35, 7 January 2025
The GOST hash function, defined in the standards GOST R 34.11-94 and GOST 34.311-95 is a 256-bit cryptographic hash function. It was initially defined...
16 KB (2,206 words) - 02:44, 11 July 2024
Length extension attack (redirect from Hash length extension attack)
end of the message and produce a valid hash without knowing the secret. Algorithms like MD5, SHA-1 and most of SHA-2 that are based on the Merkle–Damgård...
8 KB (1,082 words) - 12:51, 23 April 2025
cryptographic primitives, including cryptographic hashes, message authentication codes, mask generation functions, stream ciphers, pseudo-random number generators...
7 KB (846 words) - 09:04, 19 April 2025
This is a list of hash functions, including cyclic redundancy checks, checksum functions, and cryptographic hash functions. Adler-32 is often mistaken...
10 KB (279 words) - 12:52, 24 May 2025
The elliptic curve only hash (ECOH) algorithm was submitted as a candidate for SHA-3 in the NIST hash function competition. However, it was rejected in...
11 KB (1,846 words) - 17:39, 7 January 2025
RIPEMD (category Cryptographic hash functions)
security level is sufficient but longer hash result is necessary. While RIPEMD functions are less popular than SHA-1 and SHA-2, they are used, among others, in...
9 KB (884 words) - 16:44, 18 July 2025