• Thumbnail for Cryptographic hash function
    A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle...
    49 KB (6,300 words) - 10:48, 24 July 2025
  • general and technical information for a number of cryptographic hash functions. See the individual functions' articles for further information. This article...
    16 KB (806 words) - 04:43, 24 May 2025
  • (SM3) is a cryptographic hash function, standardised for use in commercial cryptography in China. It was published by the National Cryptography Administration...
    4 KB (392 words) - 08:48, 19 July 2025
  • In computer science and cryptography, Whirlpool (sometimes styled WHIRLPOOL) is a cryptographic hash function. It was designed by Vincent Rijmen (co-creator...
    11 KB (1,054 words) - 03:57, 19 March 2024
  • The MD2 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1989. The algorithm is optimized for 8-bit computers....
    9 KB (1,053 words) - 04:19, 31 December 2024
  • Thumbnail for Hash collision
    derived from a hash function which takes a data input and returns a fixed length of bits. Although hash algorithms, especially cryptographic hash algorithms...
    9 KB (1,120 words) - 20:01, 19 June 2025
  • Thumbnail for Key derivation function
    password, or a passphrase using a pseudorandom function (which typically uses a cryptographic hash function or block cipher). KDFs can be used to stretch...
    13 KB (1,640 words) - 09:32, 1 August 2025
  • Thumbnail for HMAC
    of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key. As with any MAC, it may be used to simultaneously...
    18 KB (2,327 words) - 01:15, 2 August 2025
  • In cryptography, N-hash is a cryptographic hash function based on the FEAL round function, and is now considered insecure. It was proposed in 1990 in an...
    2 KB (213 words) - 21:43, 31 December 2023
  • BLAKE is a cryptographic hash function based on Daniel J. Bernstein's ChaCha stream cipher, but a permuted copy of the input block, XORed with round constants...
    31 KB (2,941 words) - 12:39, 4 July 2025
  • This is a list of hash functions, including cyclic redundancy checks, checksum functions, and cryptographic hash functions. Adler-32 is often mistaken...
    10 KB (279 words) - 12:52, 24 May 2025
  • other cryptographic primitives); in this case they are described as universal hash functions. Among the typical uses of non-cryptographic hash functions are...
    7 KB (796 words) - 00:45, 28 April 2025
  • The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S...
    3 KB (464 words) - 07:05, 4 October 2024
  • In cryptography, Tiger is a cryptographic hash function designed by Ross Anderson and Eli Biham in 1995 for efficiency on 64-bit platforms. The size of...
    9 KB (910 words) - 14:47, 30 September 2023
  • Thumbnail for Hash function
    output. The values returned by a hash function are called hash values, hash codes, (hash/message) digests, or simply hashes. The values are usually used to...
    50 KB (7,455 words) - 17:15, 31 July 2025
  • cryptography, a preimage attack on cryptographic hash functions tries to find a message that has a specific hash value. A cryptographic hash function...
    7 KB (895 words) - 15:44, 13 April 2024
  • known attacks against cryptographic hash functions. Note that not all entries may be up to date. For a summary of other hash function parameters, see comparison...
    17 KB (1,063 words) - 06:46, 25 May 2025
  • In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend...
    13 KB (1,527 words) - 22:35, 14 June 2025
  • Hash-based cryptography is the generic term for constructions of cryptographic primitives based on the security of hash functions. It is of interest as...
    21 KB (2,347 words) - 22:07, 31 July 2025
  • Thumbnail for Skein (hash function)
    Skein is a cryptographic hash function and one of five finalists in the NIST hash function competition. Entered as a candidate to become the SHA-3 standard...
    9 KB (822 words) - 12:52, 13 April 2025
  • Thumbnail for Merkle tree
    Merkle tree (redirect from Tiger-Tree Hash)
    In cryptography and computer science, a hash tree or Merkle tree is a tree in which every "leaf" node is labelled with the cryptographic hash of a data...
    15 KB (1,787 words) - 20:00, 22 July 2025
  • SHA-1 (redirect from SHA-1 hash)
    SHA-1 function. In cryptography, SHA-1 (Secure Hash Algorithm 1) is a hash function which takes an input and produces a 160-bit (20-byte) hash value known...
    50 KB (5,744 words) - 22:35, 2 July 2025
  • SHA-2 (category Cryptographic hash functions)
    SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published...
    51 KB (4,982 words) - 07:36, 30 July 2025
  • Collision attack (redirect from HashDoS)
    In cryptography, a collision attack on a cryptographic hash tries to find two inputs producing the same hash value, i.e. a hash collision. This is in contrast...
    17 KB (2,056 words) - 23:11, 15 July 2025
  • (or FNV) is a non-cryptographic hash function created by Glenn Fowler, Landon Curt Noll, and Kiem-Phong Vo. The basis of the FNV hash algorithm was taken...
    15 KB (1,453 words) - 07:00, 23 May 2025
  • MD5 (redirect from MD5 Hash)
    a cryptographic hash function; however it has been found to suffer from extensive vulnerabilities. It remains suitable for other non-cryptographic purposes...
    46 KB (4,710 words) - 10:55, 16 June 2025
  • In cryptography, cryptographic hash functions can be divided into two main categories. In the first category are those functions whose designs are based...
    14 KB (1,823 words) - 18:28, 7 January 2025
  • JH is a cryptographic hash function submitted to the NIST hash function competition by Hongjun Wu. Though chosen as one of the five finalists of the competition...
    4 KB (399 words) - 17:35, 7 January 2025
  • not limited to, one-way hash functions and encryption functions. When creating cryptographic systems, designers use cryptographic primitives as their most...
    6 KB (812 words) - 22:05, 1 August 2025
  • hash function competition was an open competition held by the US National Institute of Standards and Technology (NIST) to develop a new hash function...
    27 KB (2,268 words) - 11:21, 19 July 2025