Difference between revisions of "The Hash Function Zoo"
From The ECRYPT Hash Function Website
Crechberger (talk | contribs) |
Crechberger (talk | contribs) |
||
Line 18: | Line 18: | ||
| [http://ehash.iaik.tugraz.at/index.php/FSB FSB] || Augot, Finiasz, Sendrier || align="center"|2005 || ? | | [http://ehash.iaik.tugraz.at/index.php/FSB FSB] || Augot, Finiasz, Sendrier || align="center"|2005 || ? | ||
|- | |- | ||
− | | [http://ehash.iaik.tugraz.at/index.php/GOST GOST R 34.11-94] || Government Committee of Russia for Standards || align="center"|1990 || | + | | [http://ehash.iaik.tugraz.at/index.php/GOST GOST R 34.11-94] || Government Committee of Russia for Standards || align="center"|1990 || broken |
|- | |- | ||
| [http://ehash.iaik.tugraz.at/index.php/HAVAL HAVAL] || Zheng, Pieprzyk, Seberry || align="center"|1994 || broken | | [http://ehash.iaik.tugraz.at/index.php/HAVAL HAVAL] || Zheng, Pieprzyk, Seberry || align="center"|1994 || broken | ||
Line 32: | Line 32: | ||
| [http://ehash.iaik.tugraz.at/index.php/N-Hash N-Hash] || Miyaguchi, Ohta, Iwata || align="center"|1990 || broken | | [http://ehash.iaik.tugraz.at/index.php/N-Hash N-Hash] || Miyaguchi, Ohta, Iwata || align="center"|1990 || broken | ||
|- | |- | ||
− | | [http://ehash.iaik.tugraz.at/index.php/PANAMA PANAMA] || Daemen, Clapp || align="center"|1998 || | + | | [http://ehash.iaik.tugraz.at/index.php/PANAMA PANAMA] || Daemen, Clapp || align="center"|1998 || broken |
|- | |- | ||
| [http://ehash.iaik.tugraz.at/index.php/ParallelFFT-Hash Parallel FFT-Hash] || Schnorr, Vaudenay || align="center"|1993 || ? | | [http://ehash.iaik.tugraz.at/index.php/ParallelFFT-Hash Parallel FFT-Hash] || Schnorr, Vaudenay || align="center"|1993 || ? | ||
Line 46: | Line 46: | ||
| [http://ehash.iaik.tugraz.at/index.php/SHA0 SHA-0] || NIST/NSA || align="center"|1991 || broken | | [http://ehash.iaik.tugraz.at/index.php/SHA0 SHA-0] || NIST/NSA || align="center"|1991 || broken | ||
|- | |- | ||
− | | [http://ehash.iaik.tugraz.at/index.php/SHA-1 SHA-1] || NIST/NSA || align="center"|1993 || broken | + | | [http://ehash.iaik.tugraz.at/index.php/SHA-1 SHA-1] || NIST/NSA || align="center"|1993 || broken |
|- | |- | ||
| [http://ehash.iaik.tugraz.at/index.php/SHA-224 SHA-224] || NIST/NSA || align="center"|2004 || | | [http://ehash.iaik.tugraz.at/index.php/SHA-224 SHA-224] || NIST/NSA || align="center"|2004 || | ||
Line 64: | Line 64: | ||
| [http://ehash.iaik.tugraz.at/index.php/SubHash SubHash] || Daemen || align="center"|1992 || ? | | [http://ehash.iaik.tugraz.at/index.php/SubHash SubHash] || Daemen || align="center"|1992 || ? | ||
|- | |- | ||
− | | [http://ehash.iaik.tugraz.at/index.php/Tiger Tiger] || Anderson, Biham || align="center"|1996 || | + | | [http://ehash.iaik.tugraz.at/index.php/Tiger Tiger] || Anderson, Biham || align="center"|1996 || broken |
|- | |- | ||
| [http://ehash.iaik.tugraz.at/index.php/Whirlpool Whirlpool] || Barreto and Rijmen || align="center"|2000 || ? | | [http://ehash.iaik.tugraz.at/index.php/Whirlpool Whirlpool] || Barreto and Rijmen || align="center"|2000 || ? | ||
|} | |} |
Revision as of 20:27, 5 March 2008
Hash Function Name | Designer(s) | Issued in | Status Cryptanalysis |
---|---|---|---|
AR | ISO | 1992 | broken |
Boognish | Daemen | 1992 | broken |
Cellhash | Daemen, Govaerts, Vandewalle | 1991 | ? |
FFT-Hash I | Schnorr | 1991 | broken |
FFT-Hash II | Schnorr | 1992 | broken |
FORK-256 | Hong, Chang, Sung, Lee, Hong, Lee, Moon, Chee | 2006 | |
FSB | Augot, Finiasz, Sendrier | 2005 | ? |
GOST R 34.11-94 | Government Committee of Russia for Standards | 1990 | broken |
HAVAL | Zheng, Pieprzyk, Seberry | 1994 | broken |
LASH-n | Bentahar, Page, Saarinen, Silverman, Smart | 2006 | ? |
MD2 | Rivest | 1989 | broken |
MD4 | Rivest | 1990 | broken |
MD5 | Rivest | 1992 | broken |
N-Hash | Miyaguchi, Ohta, Iwata | 1990 | broken |
PANAMA | Daemen, Clapp | 1998 | broken |
Parallel FFT-Hash | Schnorr, Vaudenay | 1993 | ? |
RadioGatun[w] | Bertoni, Daemen, Peeters, van Assche | 2006 | ? |
RIPEMD | The RIPE Consortium | 1990 | broken |
RIPEMD-128 | Dobbertin, Bosselaers, Preneel | 1996 | ? |
RIPEMD-160 | Dobbertin, Bosselaers, Preneel | 1996 | ? |
SHA-0 | NIST/NSA | 1991 | broken |
SHA-1 | NIST/NSA | 1993 | broken |
SHA-224 | NIST/NSA | 2004 | |
SHA-256 | NIST/NSA | 2000 | |
SHA-384 | NIST/NSA | 2000 | |
SHA-512 | NIST/NSA | 2000 | |
SMASH | Knudsen | 2005 | broken |
Snefru-n | Merkle | 1990 | broken |
StepRightUp | Daemen | 1995 | wounded |
SubHash | Daemen | 1992 | ? |
Tiger | Anderson, Biham | 1996 | broken |
Whirlpool | Barreto and Rijmen | 2000 | ? |