Difference between revisions of "The Hash Function Zoo"
From The ECRYPT Hash Function Website
Crechberger (talk | contribs) (Update on Vortex) |
|||
(8 intermediate revisions by 2 users not shown) | |||
Line 2: | Line 2: | ||
|+'''The Hash Function Zoo, a collection of cryptographic hash functions (in alphabetical order)''' | |+'''The Hash Function Zoo, a collection of cryptographic hash functions (in alphabetical order)''' | ||
+ | <br> | ||
+ | Also check out Paulo Barreto's [http://paginas.terra.com.br/informatica/paulobarreto/hflounge.html Hash Function Lounge]. | ||
<br> | <br> | ||
For the recent submissions to the SHA-3 competition, there is a separate [[The_SHA-3_Zoo| SHA-3 Zoo]] | For the recent submissions to the SHA-3 competition, there is a separate [[The_SHA-3_Zoo| SHA-3 Zoo]] | ||
− | |||
|- style="background:#efefef;" | |- style="background:#efefef;" | ||
Line 14: | Line 15: | ||
|- | |- | ||
| [[Cellhash]] || Daemen, Govaerts, Vandewalle || align="center"|1991 || ? | | [[Cellhash]] || Daemen, Govaerts, Vandewalle || align="center"|1991 || ? | ||
+ | |- | ||
+ | | [[DASH]] || Billet, Robshaw, Seurin, Yin || align="center"|2008 || ? | ||
|- | |- | ||
| [[DHA-256]] || Lee, Chang, Kim, Lee, Hong || align="center"|2006 || ? | | [[DHA-256]] || Lee, Chang, Kim, Lee, Hong || align="center"|2006 || ? | ||
Line 19: | Line 22: | ||
| [[Edon-R]] || Gligoroski, Markovski, Kocarev || align="center"|2006 || ? | | [[Edon-R]] || Gligoroski, Markovski, Kocarev || align="center"|2006 || ? | ||
|- | |- | ||
− | | [[FFT- | + | | [[FFT-Hash I]] || Schnorr || align="center"|1991 || broken |
|- | |- | ||
− | | [[FFT-Hash | + | | [[FFT-Hash II]] || Schnorr || align="center"|1992 || broken |
|- | |- | ||
− | | [[ | + | | [[FORK-256]] || Hong, Chang, Sung, Lee, Hong, Lee, Moon, Chee || align="center"|2006 || broken |
|- | |- | ||
| [[FSB]] || Augot, Finiasz, Sendrier || align="center"|2005 || ? | | [[FSB]] || Augot, Finiasz, Sendrier || align="center"|2005 || ? | ||
|- | |- | ||
− | | [[GOST]] || Government Committee of Russia for Standards || align="center"|1990 || broken | + | | [[GOST | GOST 34.11-94]] || Government Committee of Russia for Standards || align="center"|1990 || broken |
|- | |- | ||
| [[Grindahl-256]] || Knudsen, Rechberger, Thomsen || align="center"|2007 || broken | | [[Grindahl-256]] || Knudsen, Rechberger, Thomsen || align="center"|2007 || broken | ||
Line 55: | Line 58: | ||
| [[PANAMA]] || Daemen, Clapp || align="center"|1998 || broken | | [[PANAMA]] || Daemen, Clapp || align="center"|1998 || broken | ||
|- | |- | ||
− | | [[ | + | | [[Parallel FFT-Hash]] || Schnorr, Vaudenay || align="center"|1993 || ? |
|- | |- | ||
| [[PARSHA-256]] || Pal, Sarkar || align="center"|2003 || ? | | [[PARSHA-256]] || Pal, Sarkar || align="center"|2003 || ? | ||
Line 75: | Line 78: | ||
| [[SHA-1]] || NIST/NSA || align="center"|1993 || broken | | [[SHA-1]] || NIST/NSA || align="center"|1993 || broken | ||
|- | |- | ||
− | | [[SHA-256]] || NIST/NSA || align="center"|2000 || ? | + | | [[SHA-256/224]] || NIST/NSA || align="center"|2000 || ? |
|- | |- | ||
− | | [[SHA-512]] || NIST/NSA || align="center"|2000 || ? | + | | [[SHA-512/384]] || NIST/NSA || align="center"|2000 || ? |
|- | |- | ||
| [[SMASH]] || Knudsen || align="center"|2005 || broken | | [[SMASH]] || Knudsen || align="center"|2005 || broken | ||
Line 86: | Line 89: | ||
|- | |- | ||
| [[SubHash]] || Daemen || align="center"|1992 || ? | | [[SubHash]] || Daemen || align="center"|1992 || ? | ||
+ | |- | ||
+ | | [[SWIFFT]] || Lyubashevsky, Micciancio, Peikert, Rosen || align="center"|2008 || ? | ||
|- | |- | ||
| [[Tiger]] || Anderson, Biham || align="center"|1996 || broken | | [[Tiger]] || Anderson, Biham || align="center"|1996 || broken | ||
|- | |- | ||
− | | [[VSH]] || Contini, Lenstra, Steinfeld | + | | [[Vortex]] || Gueron, Kounavis || align="center"|2008 || broken |
+ | |- | ||
+ | | [[VSH]] || Contini, Lenstra, Steinfeld || align="center"|2005 || ? | ||
|- | |- | ||
| [[Whirlpool]] || Barreto and Rijmen || align="center"|2000 || ? | | [[Whirlpool]] || Barreto and Rijmen || align="center"|2000 || ? | ||
Line 97: | Line 104: | ||
As soon as there are results suggesting that an expected property of a hash function is less than ideal, we list it as 'broken'. Resulting attacks may be by no means practical. | As soon as there are results suggesting that an expected property of a hash function is less than ideal, we list it as 'broken'. Resulting attacks may be by no means practical. | ||
− | Note that the source for most of the data collected here (proposals and analysis results) is published in one of the following venues. Journal of Cryptology, IEEE Transactions on Information Theory, proceedings of IACR conferences like Crypto, Eurocrypt, Asiacrypt, FSE. Additionally also SAC, ISC, CT-RSA, PKCS, FIPS and ISO Standards are used. | + | Note that the source for most of the data collected here (proposals and analysis results) is published in one of the following venues. Journal of Cryptology, IEEE Transactions on Information Theory, proceedings of IACR conferences like Crypto, Eurocrypt, Asiacrypt, Africacrypt, FSE. Additionally also SAC, ISC, CT-RSA, PKCS, FIPS and ISO Standards are used. |
Latest revision as of 14:53, 30 July 2009
Hash Function Name | Designer(s) | Issued in | Status Cryptanalysis |
---|---|---|---|
AR | ISO | 1992 | broken |
Boognish | Daemen | 1992 | broken |
Cellhash | Daemen, Govaerts, Vandewalle | 1991 | ? |
DASH | Billet, Robshaw, Seurin, Yin | 2008 | ? |
DHA-256 | Lee, Chang, Kim, Lee, Hong | 2006 | ? |
Edon-R | Gligoroski, Markovski, Kocarev | 2006 | ? |
FFT-Hash I | Schnorr | 1991 | broken |
FFT-Hash II | Schnorr | 1992 | broken |
FORK-256 | Hong, Chang, Sung, Lee, Hong, Lee, Moon, Chee | 2006 | broken |
FSB | Augot, Finiasz, Sendrier | 2005 | ? |
GOST 34.11-94 | Government Committee of Russia for Standards | 1990 | broken |
Grindahl-256 | Knudsen, Rechberger, Thomsen | 2007 | broken |
Grindahl-512 | Knudsen, Rechberger, Thomsen | 2007 | ? |
HAS-160 | Telecommunications Technology Association of Korea | 2000 | ? |
HAS-V | Park, Hwang, Lee | 2000 | broken |
HAVAL | Zheng, Pieprzyk, Seberry | 1994 | broken |
LAKE | Aumasson, Meier, Phan | 2008 | ? |
LASH-n | Bentahar, Page, Saarinen, Silverman, Smart | 2006 | broken |
MAME | Yoshida, Watanabe, Okeya, Kitahara, Wu, Kucuk, Preneel | 2007 | ? |
MD2 | Rivest | 1989 | broken |
MD4 | Rivest | 1990 | broken |
MD5 | Rivest | 1992 | broken |
N-Hash | Miyaguchi, Ohta, Iwata | 1990 | broken |
PANAMA | Daemen, Clapp | 1998 | broken |
Parallel FFT-Hash | Schnorr, Vaudenay | 1993 | ? |
PARSHA-256 | Pal, Sarkar | 2003 | ? |
PKC-HASH | Shin, Rhee, Ryu, Lee | 1998 | broken |
RadioGatun | Bertoni, Daemen, Peeters, van Assche | 2006 | ? |
RC4-HASH | Chang, Gupta, Nandi | 2006 | broken |
RIPEMD | The RIPE Consortium | 1990 | broken |
RIPEMD-128 | Dobbertin, Bosselaers, Preneel | 1996 | ? |
RIPEMD-160 | Dobbertin, Bosselaers, Preneel | 1996 | ? |
SHA-0 | NIST/NSA | 1991 | broken |
SHA-1 | NIST/NSA | 1993 | broken |
SHA-256/224 | NIST/NSA | 2000 | ? |
SHA-512/384 | NIST/NSA | 2000 | ? |
SMASH | Knudsen | 2005 | broken |
Snefru-n | Merkle | 1990 | broken |
StepRightUp | Daemen | 1995 | broken |
SubHash | Daemen | 1992 | ? |
SWIFFT | Lyubashevsky, Micciancio, Peikert, Rosen | 2008 | ? |
Tiger | Anderson, Biham | 1996 | broken |
Vortex | Gueron, Kounavis | 2008 | broken |
VSH | Contini, Lenstra, Steinfeld | 2005 | ? |
Whirlpool | Barreto and Rijmen | 2000 | ? |
Regarding the column cryptanalysis status, for simplicity reasons we take the following view. As soon as there are results suggesting that an expected property of a hash function is less than ideal, we list it as 'broken'. Resulting attacks may be by no means practical.
Note that the source for most of the data collected here (proposals and analysis results) is published in one of the following venues. Journal of Cryptology, IEEE Transactions on Information Theory, proceedings of IACR conferences like Crypto, Eurocrypt, Asiacrypt, Africacrypt, FSE. Additionally also SAC, ISC, CT-RSA, PKCS, FIPS and ISO Standards are used.