Hash (cryptography): Difference between revisions
Jump to navigation
Jump to search
imported>Sandy Harris (→MD6) |
imported>Howard C. Berkowitz (Tied back to what problems they solve, in Information Security, rather than how, which is more cryptography) |
||
Line 3: | Line 3: | ||
{{TOC-right}} | {{TOC-right}} | ||
In [[cryptography]] a '''hash''' or '''message digest''' is a fixed-size digest which can be calculated from an input text of any size up to some large limit. | In [[cryptography]] a '''hash''' or '''message digest''' is a fixed-size digest which can be calculated from an input text of any size up to some large limit. While cryptographic principles are used, these functions are used in manners quite different than two-way, or even one-way full-text cryptographically protected communications. The primary applications of hashes and message digests are as means of error detection, [[information security#source authentication|source authentication]], or [[information security#integrity|data integrity protection]]. | ||
== MD4 and descendants== | == MD4 and descendants== |
Revision as of 05:41, 1 November 2008
In cryptography a hash or message digest is a fixed-size digest which can be calculated from an input text of any size up to some large limit. While cryptographic principles are used, these functions are used in manners quite different than two-way, or even one-way full-text cryptographically protected communications. The primary applications of hashes and message digests are as means of error detection, source authentication, or data integrity protection.
MD4 and descendants
MD5
SHA
SHA-2
Other 20th century hashes
Tiger
Whirlpool
The Advanced Hash Standard
Skein
From Bruce Schneier and others: [1]
MD6
From a team led by Ron Rivest.
CubeHash
From Dan Bernstein, [2]
Essence
From Jason Worth Martin [3]
Sgàil
Peter Maxwell [4]
EnRUPT
Sean O'Neil [5]
Maraca
Robert Jenkins [6]