Difference between revisions of "The Hash Function Zoo"

From The ECRYPT Hash Function Website
Line 87: Line 87:
 
|}
 
|}
  
Note that the source for most of the data collected here (proposals and analysis results) is published in one of the following venues. Journal of Cryptology, proceedings of IACR conferences like Crypto, Eurocrypt, Asiacrypt, FSE. Additionally also SAC, FIPS and ISO Standards are used.
+
Note that the source for most of the data collected here (proposals and analysis results) is published in one of the following venues. Journal of Cryptology, IEEE Transactions on information theory, proceedings of IACR conferences like Crypto, Eurocrypt, Asiacrypt, FSE. Additionally also SAC, ISC, CT-RSA,PKCS, and FIPS and ISO Standards are used.

Revision as of 13:03, 3 April 2008

The Hash Function Zoo, a collection of cryptographic hash functions (in alphabetical order)
Hash Function Name Designer(s) Issued in Status Cryptanalysis
AR ISO 1992 broken
Boognish Daemen 1992 broken
Cellhash Daemen, Govaerts, Vandewalle 1991 ?
DHA-256 Lee, Chang, Kim, Lee, Hong 2006 ?
Edon-R Gligoroski, Markovski, Kocarev 2006 ?
FFT-Hash I Schnorr 1991 broken
FFT-Hash II Schnorr 1992 broken
FORK-256 Hong, Chang, Sung, Lee, Hong, Lee, Moon, Chee 2006 ?
FSB Augot, Finiasz, Sendrier 2005 ?
GOST R 34.11-94 Government Committee of Russia for Standards 1990 broken
Grindahl-256 Knudsen, Rechberger, Thomsen 2007 broken
Grindahl-512 Knudsen, Rechberger, Thomsen 2007 ?
HAS-160 Telecommunications Technology Association of Korea 2000 ?
HAS-V Park, Hwang, Lee 2000 broken
HAVAL Zheng, Pieprzyk, Seberry 1994 broken
LASH-n Bentahar, Page, Saarinen, Silverman, Smart 2006 ?
MAME Yoshida, Watanabe, Okeya, Kitahara, Wu, Kucuk, Preneel 2007 ?
MD2 Rivest 1989 broken
MD4 Rivest 1990 broken
MD5 Rivest 1992 broken
N-Hash Miyaguchi, Ohta, Iwata 1990 broken
PANAMA Daemen, Clapp 1998 broken
Parallel FFT-Hash Schnorr, Vaudenay 1993 ?
PARSHA-256 Pal, Sarkar 2003 ?
PKC-HASH Shin, Rhee, Ryu, Lee 1998 broken
RadioGatun Bertoni, Daemen, Peeters, van Assche 2006 ?
RC4-HASH Chang, Gupta, Nandi 2006 ?
RIPEMD The RIPE Consortium 1990 broken
RIPEMD-128 Dobbertin, Bosselaers, Preneel 1996 ?
RIPEMD-160 Dobbertin, Bosselaers, Preneel 1996 ?
SHA-0 NIST/NSA 1991 broken
SHA-1 NIST/NSA 1993 wounded
SHA-256/224 NIST/NSA 2000
SHA-512/384 NIST/NSA 2000
SMASH Knudsen 2005 broken
Snefru-n Merkle 1990 broken
StepRightUp Daemen 1995 wounded
SubHash Daemen 1992 ?
Tiger Anderson, Biham 1996 broken
VSH Contini, Lenstra, Steinfeld, 2005 ?
Whirlpool Barreto and Rijmen 2000 ?

Note that the source for most of the data collected here (proposals and analysis results) is published in one of the following venues. Journal of Cryptology, IEEE Transactions on information theory, proceedings of IACR conferences like Crypto, Eurocrypt, Asiacrypt, FSE. Additionally also SAC, ISC, CT-RSA,PKCS, and FIPS and ISO Standards are used.