Difference between revisions of "The Hash Function Zoo"

From The ECRYPT Hash Function Website
(link to Paulo Barreto's Hash Function Lounge)
(Update on Vortex)
 
(3 intermediate revisions by one other user not shown)
Line 15: Line 15:
 
|-
 
|-
 
| [[Cellhash]]    || Daemen, Govaerts, Vandewalle || align="center"|1991 || ?
 
| [[Cellhash]]    || Daemen, Govaerts, Vandewalle || align="center"|1991 || ?
 +
|-
 +
| [[DASH]]    || Billet, Robshaw, Seurin, Yin || align="center"|2008 || ?
 
|-
 
|-
 
| [[DHA-256]]      || Lee, Chang, Kim, Lee, Hong || align="center"|2006 || ?
 
| [[DHA-256]]      || Lee, Chang, Kim, Lee, Hong || align="center"|2006 || ?
Line 87: Line 89:
 
|-
 
|-
 
| [[SubHash]]      || Daemen  || align="center"|1992 || ?
 
| [[SubHash]]      || Daemen  || align="center"|1992 || ?
 +
|-
 +
| [[SWIFFT]]      || Lyubashevsky, Micciancio, Peikert, Rosen || align="center"|2008 || ?
 
|-
 
|-
 
| [[Tiger]]      || Anderson, Biham  || align="center"|1996 || broken
 
| [[Tiger]]      || Anderson, Biham  || align="center"|1996 || broken
 
|-
 
|-
| [[VSH]]      || Contini, Lenstra, Steinfeld, || align="center"|2005 || ?
+
| [[Vortex]]      || Gueron, Kounavis  || align="center"|2008 || broken
 +
|-
 +
| [[VSH]]      || Contini, Lenstra, Steinfeld  || align="center"|2005 || ?
 
|-
 
|-
 
| [[Whirlpool]]  || Barreto and Rijmen || align="center"|2000 || ?
 
| [[Whirlpool]]  || Barreto and Rijmen || align="center"|2000 || ?
Line 98: Line 104:
 
As soon as there are results suggesting that an expected property of a hash function is less than ideal, we list it as 'broken'. Resulting attacks may be by no means practical.  
 
As soon as there are results suggesting that an expected property of a hash function is less than ideal, we list it as 'broken'. Resulting attacks may be by no means practical.  
  
Note that the source for most of the data collected here (proposals and analysis results) is published in one of the following venues. Journal of Cryptology, IEEE Transactions on Information Theory, proceedings of IACR conferences like Crypto, Eurocrypt, Asiacrypt, FSE. Additionally also SAC, ISC, CT-RSA, PKCS, FIPS and ISO Standards are used.
+
Note that the source for most of the data collected here (proposals and analysis results) is published in one of the following venues. Journal of Cryptology, IEEE Transactions on Information Theory, proceedings of IACR conferences like Crypto, Eurocrypt, Asiacrypt, Africacrypt, FSE. Additionally also SAC, ISC, CT-RSA, PKCS, FIPS and ISO Standards are used.

Latest revision as of 14:53, 30 July 2009

The Hash Function Zoo, a collection of cryptographic hash functions (in alphabetical order)
Also check out Paulo Barreto's Hash Function Lounge.
For the recent submissions to the SHA-3 competition, there is a separate SHA-3 Zoo
Hash Function Name Designer(s) Issued in Status Cryptanalysis
AR ISO 1992 broken
Boognish Daemen 1992 broken
Cellhash Daemen, Govaerts, Vandewalle 1991 ?
DASH Billet, Robshaw, Seurin, Yin 2008 ?
DHA-256 Lee, Chang, Kim, Lee, Hong 2006 ?
Edon-R Gligoroski, Markovski, Kocarev 2006 ?
FFT-Hash I Schnorr 1991 broken
FFT-Hash II Schnorr 1992 broken
FORK-256 Hong, Chang, Sung, Lee, Hong, Lee, Moon, Chee 2006 broken
FSB Augot, Finiasz, Sendrier 2005 ?
GOST 34.11-94 Government Committee of Russia for Standards 1990 broken
Grindahl-256 Knudsen, Rechberger, Thomsen 2007 broken
Grindahl-512 Knudsen, Rechberger, Thomsen 2007 ?
HAS-160 Telecommunications Technology Association of Korea 2000 ?
HAS-V Park, Hwang, Lee 2000 broken
HAVAL Zheng, Pieprzyk, Seberry 1994 broken
LAKE Aumasson, Meier, Phan 2008 ?
LASH-n Bentahar, Page, Saarinen, Silverman, Smart 2006 broken
MAME Yoshida, Watanabe, Okeya, Kitahara, Wu, Kucuk, Preneel 2007 ?
MD2 Rivest 1989 broken
MD4 Rivest 1990 broken
MD5 Rivest 1992 broken
N-Hash Miyaguchi, Ohta, Iwata 1990 broken
PANAMA Daemen, Clapp 1998 broken
Parallel FFT-Hash Schnorr, Vaudenay 1993 ?
PARSHA-256 Pal, Sarkar 2003 ?
PKC-HASH Shin, Rhee, Ryu, Lee 1998 broken
RadioGatun Bertoni, Daemen, Peeters, van Assche 2006 ?
RC4-HASH Chang, Gupta, Nandi 2006 broken
RIPEMD The RIPE Consortium 1990 broken
RIPEMD-128 Dobbertin, Bosselaers, Preneel 1996 ?
RIPEMD-160 Dobbertin, Bosselaers, Preneel 1996 ?
SHA-0 NIST/NSA 1991 broken
SHA-1 NIST/NSA 1993 broken
SHA-256/224 NIST/NSA 2000 ?
SHA-512/384 NIST/NSA 2000 ?
SMASH Knudsen 2005 broken
Snefru-n Merkle 1990 broken
StepRightUp Daemen 1995 broken
SubHash Daemen 1992 ?
SWIFFT Lyubashevsky, Micciancio, Peikert, Rosen 2008 ?
Tiger Anderson, Biham 1996 broken
Vortex Gueron, Kounavis 2008 broken
VSH Contini, Lenstra, Steinfeld 2005 ?
Whirlpool Barreto and Rijmen 2000 ?

Regarding the column cryptanalysis status, for simplicity reasons we take the following view. As soon as there are results suggesting that an expected property of a hash function is less than ideal, we list it as 'broken'. Resulting attacks may be by no means practical.

Note that the source for most of the data collected here (proposals and analysis results) is published in one of the following venues. Journal of Cryptology, IEEE Transactions on Information Theory, proceedings of IACR conferences like Crypto, Eurocrypt, Asiacrypt, Africacrypt, FSE. Additionally also SAC, ISC, CT-RSA, PKCS, FIPS and ISO Standards are used.