cryptographic hash functions. Note that not all entries may be up to date. For a summary of other hash function parameters, see comparison of cryptographic hash functions...
17 KB (1,063 words) - 06:46, 25 May 2025
hash function security/cryptanalysis can be found at hash function security summary. Basic general information about the cryptographic hash functions:...
16 KB (806 words) - 04:43, 24 May 2025
Tiger compression function, respectively. Hash function security summary Comparison of cryptographic hash functions List of hash functions Serpent – a block...
9 KB (910 words) - 14:47, 30 September 2023
cryptography, security level is a measure of the strength that a cryptographic primitive — such as a cipher or hash function — achieves. Security level is...
13 KB (1,332 words) - 16:46, 24 June 2025
these functions are already broken, and are no longer in use. See Hash function security summary. Generally, the basic security of cryptographic hash functions...
14 KB (1,823 words) - 18:28, 7 January 2025
The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989. The algorithm is optimized for 8-bit computers....
9 KB (1,053 words) - 04:19, 31 December 2024
checksum. Hash function security summary Secure Hash Algorithms NIST hash function competition Key derivation functions (category) "Hash functions". www.azillionmonkeys...
10 KB (279 words) - 12:52, 24 May 2025
Preimage attack (redirect from Hash function preimage)
Cryptographic hash function Hash function security summary Puzzle friendliness Rainbow table Random oracle RFC 4270: Attacks on Cryptographic Hashes in Internet...
7 KB (895 words) - 15:44, 13 April 2024
from random data. Block cipher Hash function security summary Time/memory/data tradeoff attack Transport Layer Security Bullrun (decryption program) —...
15 KB (801 words) - 01:34, 22 August 2024
SHA-1 (redirect from SHA-1 hash)
SHA-1 function. In cryptography, SHA-1 (Secure Hash Algorithm 1) is a hash function which takes an input and produces a 160-bit (20-byte) hash value known...
50 KB (5,744 words) - 22:35, 2 July 2025
RIPEMD (category Cryptographic hash functions)
Libgcrypt mbed TLS Nettle OpenSSL wolfSSL Hash function security summary Comparison of cryptographic hash functions Comparison of cryptography libraries Topics...
9 KB (884 words) - 16:44, 18 July 2025
Cryptographic Information Security – Hash Function. The equivalent standard used by other member-states of the CIS is GOST 34.311-95. This function must not be confused...
16 KB (2,206 words) - 02:44, 11 July 2024
Panama (cryptography) (redirect from Panama (hash function))
weaknesses that Panama's hash function has. In turn, RadioGatún inspired the new cryptographic standard SHA-3. Hash function security summary Daemen, Joan; Clapp...
4 KB (352 words) - 12:48, 29 July 2024
SHA-2 (category Cryptographic hash functions)
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published...
51 KB (4,982 words) - 07:36, 30 July 2025
HAVAL (category Cryptographic hash functions)
HAVAL is a cryptographic hash function. Unlike MD5, but like most modern cryptographic hash functions, HAVAL can produce hashes of different lengths – 128...
2 KB (265 words) - 07:56, 27 April 2022
Streebog (category Cryptographic hash functions)
hash function defined in the Russian national standard GOST R 34.11-2012 Information Technology – Cryptographic Information Security – Hash Function....
8 KB (854 words) - 13:12, 25 May 2025
SHA-3 (redirect from Advanced Hash Standard)
function, not (yet) standardized by NIST, including a stream cipher, an authenticated encryption system, a "tree" hashing scheme for faster hashing on...
52 KB (5,727 words) - 13:30, 29 July 2025
MD6 (category NIST hash function competition)
Comparison of cryptographic hash functions Hash function security summary Ronald L. Rivest; et al. "The MD6 Hash Function" (PDF). Archived from the original...
6 KB (529 words) - 14:39, 18 July 2025
Perceptual hashing is the use of a fingerprinting algorithm that produces a snippet, hash, or fingerprint of various forms of multimedia. A perceptual hash is...
15 KB (1,710 words) - 11:06, 24 July 2025
use of knowledge gained from the public key. Birthday attack Hash function security summary Rainbow table Black-bag cryptanalysis Man-in-the-middle attack...
44 KB (5,206 words) - 14:03, 20 July 2025
security summary Export of cryptography Comparison of cryptography libraries FBI–Apple encryption dispute Hash function security summary Security level...
22 KB (2,846 words) - 19:45, 6 February 2025
Hardware security module • Harold Keen • Harry Hinsley • Harvest (computer) • HAS-160 • Hash-based cryptography • Hashcash • Hash chain • Hash function security...
66 KB (2,911 words) - 02:58, 27 July 2025
Ascon (cipher) (category Cryptographic hash functions)
Ascon-128a authenticated ciphers; Ascon-Hash cryptographic hash; Ascon-Xof extendable-output function; Ascon-80pq cipher with an "increased" 160-bit key. The...
8 KB (849 words) - 09:53, 27 November 2024
cryptographic algorithms, typically block ciphers and cryptographic hash functions, wherein if an input is changed slightly (for example, flipping a single...
5 KB (568 words) - 14:12, 24 May 2025
Cryptography (redirect from Declarative Security System)
broken in practice. The US National Security Agency developed the Secure Hash Algorithm series of MD5-like hash functions: SHA-0 was a flawed algorithm that...
101 KB (11,138 words) - 15:26, 1 August 2025
internal IV. It derives a hash of the additional authenticated data and plaintext using the POLYVAL Galois hash function. The hash is then encrypted an AES-key...
52 KB (5,830 words) - 02:15, 29 July 2025
Bloom filter (category Hash-based data structures)
different bit-fields of such a hash, so this type of hash can be used to generate multiple "different" hash functions by slicing its output into multiple...
90 KB (10,785 words) - 02:54, 31 July 2025