Hash (cryptography): Difference between revisions
imported>Howard C. Berkowitz (Tied back to what problems they solve, in Information Security, rather than how, which is more cryptography) |
imported>Sandy Harris |
||
Line 6: | Line 6: | ||
== MD4 and descendants== | == MD4 and descendants== | ||
=== MD4 === | |||
'''Message Digest''' algorithm number 4 was from [[Ron Rivest]]. It is no longer used, replaced by its descendants. A specification is in RFC 1320. | |||
=== MD5 === | === MD5 === | ||
RFC 1321 gives a specification and RFC 1820 a performance analysis. | |||
=== SHA === | === SHA === | ||
=== SHA-1 === | |||
=== SHA-2 === | === SHA-2 === |
Revision as of 05:46, 1 November 2008
In cryptography a hash or message digest is a fixed-size digest which can be calculated from an input text of any size up to some large limit. While cryptographic principles are used, these functions are used in manners quite different than two-way, or even one-way full-text cryptographically protected communications. The primary applications of hashes and message digests are as means of error detection, source authentication, or data integrity protection.
MD4 and descendants
MD4
Message Digest algorithm number 4 was from Ron Rivest. It is no longer used, replaced by its descendants. A specification is in RFC 1320.
MD5
RFC 1321 gives a specification and RFC 1820 a performance analysis.
SHA
SHA-1
SHA-2
Other 20th century hashes
Tiger
Whirlpool
The Advanced Hash Standard
Skein
From Bruce Schneier and others: [1]
MD6
From a team led by Ron Rivest.
CubeHash
From Dan Bernstein, [2]
Essence
From Jason Worth Martin [3]
Sgàil
Peter Maxwell [4]
EnRUPT
Sean O'Neil [5]
Maraca
Robert Jenkins [6]