Hash (cryptography): Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
(Tied back to what problems they solve, in Information Security, rather than how, which is more cryptography)
imported>Sandy Harris
Line 6: Line 6:


== MD4 and descendants==
== MD4 and descendants==
=== MD4 ===
'''Message Digest''' algorithm number 4 was from [[Ron Rivest]]. It is no longer used, replaced by its descendants. A specification is in RFC 1320.


=== MD5 ===
=== MD5 ===
RFC 1321 gives a specification and RFC 1820 a performance analysis.


=== SHA ===
=== SHA ===
=== SHA-1 ===


=== SHA-2 ===
=== SHA-2 ===

Revision as of 06:46, 1 November 2008

This article is a stub and thus not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.
For more information, see: Cryptography.

Template:TOC-right

In cryptography a hash or message digest is a fixed-size digest which can be calculated from an input text of any size up to some large limit. While cryptographic principles are used, these functions are used in manners quite different than two-way, or even one-way full-text cryptographically protected communications. The primary applications of hashes and message digests are as means of error detection, source authentication, or data integrity protection.

MD4 and descendants

MD4

Message Digest algorithm number 4 was from Ron Rivest. It is no longer used, replaced by its descendants. A specification is in RFC 1320.

MD5

RFC 1321 gives a specification and RFC 1820 a performance analysis.

SHA

SHA-1

SHA-2

Other 20th century hashes

Tiger

Whirlpool

The Advanced Hash Standard

Skein

From Bruce Schneier and others: [1]

MD6

From a team led by Ron Rivest.

CubeHash

From Dan Bernstein, [2]

Essence

From Jason Worth Martin [3]

Sgàil

Peter Maxwell [4]

EnRUPT

Sean O'Neil [5]


Maraca

Robert Jenkins [6]