• cryptographic hash functions. Note that not all entries may be up to date. For a summary of other hash function parameters, see comparison of cryptographic hash functions...
    17 KB (1,063 words) - 06:46, 25 May 2025
  • hash function security/cryptanalysis can be found at hash function security summary. Basic general information about the cryptographic hash functions:...
    16 KB (806 words) - 04:43, 24 May 2025
  • Tiger compression function, respectively. Hash function security summary Comparison of cryptographic hash functions List of hash functions Serpent – a block...
    9 KB (910 words) - 14:47, 30 September 2023
  • cryptography, security level is a measure of the strength that a cryptographic primitive — such as a cipher or hash function — achieves. Security level is...
    13 KB (1,332 words) - 16:46, 24 June 2025
  • these functions are already broken, and are no longer in use. See Hash function security summary. Generally, the basic security of cryptographic hash functions...
    14 KB (1,823 words) - 18:28, 7 January 2025
  • checksum. Hash function security summary Secure Hash Algorithms NIST hash function competition Key derivation functions (category) "Hash functions". www.azillionmonkeys...
    10 KB (279 words) - 12:52, 24 May 2025
  • The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989. The algorithm is optimized for 8-bit computers....
    9 KB (1,053 words) - 04:19, 31 December 2024
  • Cryptographic hash function Hash function security summary Puzzle friendliness Rainbow table Random oracle RFC 4270: Attacks on Cryptographic Hashes in Internet...
    7 KB (895 words) - 15:44, 13 April 2024
  • from random data. Block cipher Hash function security summary Time/memory/data tradeoff attack Transport Layer Security Bullrun (decryption program) —...
    15 KB (801 words) - 01:34, 22 August 2024
  • MD5 (redirect from MD5 Hash)
    Wikifunctions has a function related to this topic. The MD5 message-digest algorithm is a widely used hash function producing a 128-bit hash value. MD5 was...
    46 KB (4,710 words) - 10:55, 16 June 2025
  • SHA-1 (redirect from SHA-1 hash)
    SHA-1 function. In cryptography, SHA-1 (Secure Hash Algorithm 1) is a hash function which takes an input and produces a 160-bit (20-byte) hash value known...
    50 KB (5,744 words) - 22:35, 2 July 2025
  • Thumbnail for RIPEMD
    RIPEMD (category Cryptographic hash functions)
    Libgcrypt mbed TLS Nettle OpenSSL wolfSSL Hash function security summary Comparison of cryptographic hash functions Comparison of cryptography libraries Topics...
    9 KB (884 words) - 16:44, 18 July 2025
  • Cryptographic Information SecurityHash Function. The equivalent standard used by other member-states of the CIS is GOST 34.311-95. This function must not be confused...
    16 KB (2,206 words) - 02:44, 11 July 2024
  • SHA-2 (category Cryptographic hash functions)
    SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published...
    51 KB (4,982 words) - 07:36, 30 July 2025
  • Thumbnail for MD4
    MD4 (redirect from MD4 hash)
    input string, whose length is 64 bytes . Hash function security summary Comparison of cryptographic hash functions MD2 MD5 MD6 Bert den Boer, Antoon Bosselaers:...
    9 KB (879 words) - 05:02, 20 June 2025
  • weaknesses that Panama's hash function has. In turn, RadioGatún inspired the new cryptographic standard SHA-3. Hash function security summary Daemen, Joan; Clapp...
    4 KB (352 words) - 12:48, 29 July 2024
  • SHA-3 (redirect from Advanced Hash Standard)
    function, not (yet) standardized by NIST, including a stream cipher, an authenticated encryption system, a "tree" hashing scheme for faster hashing on...
    52 KB (5,727 words) - 13:30, 29 July 2025
  • Streebog (category Cryptographic hash functions)
    hash function defined in the Russian national standard GOST R 34.11-2012 Information Technology – Cryptographic Information SecurityHash Function....
    8 KB (854 words) - 13:12, 25 May 2025
  • HAVAL (category Cryptographic hash functions)
    HAVAL is a cryptographic hash function. Unlike MD5, but like most modern cryptographic hash functions, HAVAL can produce hashes of different lengths – 128...
    2 KB (265 words) - 07:56, 27 April 2022
  • Thumbnail for Cryptanalysis
    use of knowledge gained from the public key. Birthday attack Hash function security summary Rainbow table Black-bag cryptanalysis Man-in-the-middle attack...
    44 KB (5,206 words) - 14:03, 20 July 2025
  • Perceptual hashing is the use of a fingerprinting algorithm that produces a snippet, hash, or fingerprint of various forms of multimedia. A perceptual hash is...
    15 KB (1,710 words) - 11:06, 24 July 2025
  • MD6 (category NIST hash function competition)
    Comparison of cryptographic hash functions Hash function security summary Ronald L. Rivest; et al. "The MD6 Hash Function" (PDF). Archived from the original...
    6 KB (529 words) - 14:39, 18 July 2025
  • Hardware security module • Harold Keen • Harry Hinsley • Harvest (computer) • HAS-160 • Hash-based cryptography • Hashcash • Hash chain • Hash function security...
    66 KB (2,911 words) - 02:58, 27 July 2025
  • Ascon (cipher) (category Cryptographic hash functions)
    Ascon-128a authenticated ciphers; Ascon-Hash cryptographic hash; Ascon-Xof extendable-output function; Ascon-80pq cipher with an "increased" 160-bit key. The...
    8 KB (849 words) - 09:53, 27 November 2024
  • security summary Export of cryptography Comparison of cryptography libraries FBI–Apple encryption dispute Hash function security summary Security level...
    22 KB (2,846 words) - 19:45, 6 February 2025
  • Thumbnail for Cryptography
    broken in practice. The US National Security Agency developed the Secure Hash Algorithm series of MD5-like hash functions: SHA-0 was a flawed algorithm that...
    101 KB (11,138 words) - 15:26, 1 August 2025
  • Bloom filter (category Hash-based data structures)
    different bit-fields of such a hash, so this type of hash can be used to generate multiple "different" hash functions by slicing its output into multiple...
    90 KB (10,785 words) - 02:54, 31 July 2025
  • Thumbnail for Block cipher mode of operation
    internal IV. It derives a hash of the additional authenticated data and plaintext using the POLYVAL Galois hash function. The hash is then encrypted an AES-key...
    52 KB (5,830 words) - 02:15, 29 July 2025
  • Thumbnail for Avalanche effect
    cryptographic algorithms, typically block ciphers and cryptographic hash functions, wherein if an input is changed slightly (for example, flipping a single...
    5 KB (568 words) - 14:12, 24 May 2025
  • Information technology – Security techniques – Hash-functions – Part 1: General ISO/IEC 9797-1:2011 Information technology – Security techniques – Message...
    23 KB (3,308 words) - 22:09, 21 June 2025