Difference between revisions of "The Hash Function Zoo"
From The ECRYPT Hash Function Website
Crechberger (talk | contribs) |
Crechberger (talk | contribs) |
||
Line 34: | Line 34: | ||
| [http://ehash.iaik.tugraz.at/index.php/HAVAL HAVAL] || Zheng, Pieprzyk, Seberry || align="center"|1994 || broken | | [http://ehash.iaik.tugraz.at/index.php/HAVAL HAVAL] || Zheng, Pieprzyk, Seberry || align="center"|1994 || broken | ||
|- | |- | ||
− | | [http://ehash.iaik.tugraz.at/index.php/LASH-n LASH-n] || Bentahar, Page, Saarinen, Silverman, Smart || align="center"|2006 || | + | | [http://ehash.iaik.tugraz.at/index.php/LASH-n LASH-n] || Bentahar, Page, Saarinen, Silverman, Smart || align="center"|2006 || wounded |
|- | |- | ||
| [http://ehash.iaik.tugraz.at/index.php/MAME MAME] || Yoshida, Watanabe, Okeya, Kitahara, Wu, Kucuk, Preneel || align="center"|2007 || ? | | [http://ehash.iaik.tugraz.at/index.php/MAME MAME] || Yoshida, Watanabe, Okeya, Kitahara, Wu, Kucuk, Preneel || align="center"|2007 || ? | ||
Line 56: | Line 56: | ||
| [http://ehash.iaik.tugraz.at/index.php/RadioGatun RadioGatun] || Bertoni, Daemen, Peeters, van Assche || align="center"|2006 || ? | | [http://ehash.iaik.tugraz.at/index.php/RadioGatun RadioGatun] || Bertoni, Daemen, Peeters, van Assche || align="center"|2006 || ? | ||
|- | |- | ||
− | | [http://ehash.iaik.tugraz.at/index.php/RC4-HASH RC4-HASH] || Chang, Gupta, Nandi || align="center"|2006 || | + | | [http://ehash.iaik.tugraz.at/index.php/RC4-HASH RC4-HASH] || Chang, Gupta, Nandi || align="center"|2006 || broken |
|- | |- | ||
| [http://ehash.iaik.tugraz.at/index.php/RIPEMD RIPEMD] || The RIPE Consortium || align="center"|1990 || broken | | [http://ehash.iaik.tugraz.at/index.php/RIPEMD RIPEMD] || The RIPE Consortium || align="center"|1990 || broken |
Revision as of 17:18, 28 August 2008
Hash Function Name | Designer(s) | Issued in | Status Cryptanalysis |
---|---|---|---|
AR | ISO | 1992 | broken |
Boognish | Daemen | 1992 | broken |
Cellhash | Daemen, Govaerts, Vandewalle | 1991 | ? |
DHA-256 | Lee, Chang, Kim, Lee, Hong | 2006 | ? |
Edon-R | Gligoroski, Markovski, Kocarev | 2006 | ? |
FFT-Hash I | Schnorr | 1991 | broken |
FFT-Hash II | Schnorr | 1992 | broken |
FORK-256 | Hong, Chang, Sung, Lee, Hong, Lee, Moon, Chee | 2006 | ? |
FSB | Augot, Finiasz, Sendrier | 2005 | ? |
GOST R 34.11-94 | Government Committee of Russia for Standards | 1990 | broken |
Grindahl-256 | Knudsen, Rechberger, Thomsen | 2007 | broken |
Grindahl-512 | Knudsen, Rechberger, Thomsen | 2007 | ? |
HAS-160 | Telecommunications Technology Association of Korea | 2000 | ? |
HAS-V | Park, Hwang, Lee | 2000 | broken |
HAVAL | Zheng, Pieprzyk, Seberry | 1994 | broken |
LASH-n | Bentahar, Page, Saarinen, Silverman, Smart | 2006 | wounded |
MAME | Yoshida, Watanabe, Okeya, Kitahara, Wu, Kucuk, Preneel | 2007 | ? |
MD2 | Rivest | 1989 | broken |
MD4 | Rivest | 1990 | broken |
MD5 | Rivest | 1992 | broken |
N-Hash | Miyaguchi, Ohta, Iwata | 1990 | broken |
PANAMA | Daemen, Clapp | 1998 | broken |
Parallel FFT-Hash | Schnorr, Vaudenay | 1993 | ? |
PARSHA-256 | Pal, Sarkar | 2003 | ? |
PKC-HASH | Shin, Rhee, Ryu, Lee | 1998 | broken |
RadioGatun | Bertoni, Daemen, Peeters, van Assche | 2006 | ? |
RC4-HASH | Chang, Gupta, Nandi | 2006 | broken |
RIPEMD | The RIPE Consortium | 1990 | broken |
RIPEMD-128 | Dobbertin, Bosselaers, Preneel | 1996 | ? |
RIPEMD-160 | Dobbertin, Bosselaers, Preneel | 1996 | ? |
SHA-0 | NIST/NSA | 1991 | broken |
SHA-1 | NIST/NSA | 1993 | wounded |
SHA-256/224 | NIST/NSA | 2000 | |
SHA-512/384 | NIST/NSA | 2000 | |
SMASH | Knudsen | 2005 | broken |
Snefru-n | Merkle | 1990 | broken |
StepRightUp | Daemen | 1995 | wounded |
SubHash | Daemen | 1992 | ? |
Tiger | Anderson, Biham | 1996 | broken |
VSH | Contini, Lenstra, Steinfeld, | 2005 | ? |
Whirlpool | Barreto and Rijmen | 2000 | ? |
Note that the source for most of the data collected here (proposals and analysis results) is published in one of the following venues. Journal of Cryptology, IEEE Transactions on information theory, proceedings of IACR conferences like Crypto, Eurocrypt, Asiacrypt, FSE. Additionally also SAC, ISC, CT-RSA, PKCS, FIPS and ISO Standards are used.